# Linux Basics

# Welcome to week 2; introduction to linux

Welcome back! We have another important topic to explore.  
Previously, you learned aboutoperating systems and user interfaces.  
You learned how operating systems work and how resources are allocated in computers.  
We also reviewed several common operating systems.  
You may already have a favorite operating system.  
It's common to hear that people are fans of one over another, but in the security world,  
Linux is commonly used.  
In this section, you'll be learning more about the Linux operating system and how  
it's used in everyday tasks in security.  
First, you'll learn about the architecture of Linux.  
After this, we'll compare the different distributions of Linux that are available.  
Lastly, you'll explore the shell, a key Linux component that allows you to communicate with the system.  
I remember when I first learned about the Linux OS, and I'm really happy to explore it with you now.

# Introduction to Linux

<div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-you-might-have-seen-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from You might have seen or heard the name Linux in the past." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You might have seen or heard the name Linux in the past. </span></div><div aria-label="toggle video from But did you know Linux is the most-used operating system in security today?" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">But did you know Linux is the most-used operating system in security today? </span></div><div aria-label="toggle video from current lecture segment: Let's start by taking a look at Linux and how it's used in security." class="rc-Phrase active css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Let's start by taking a look at Linux and how it's used in security. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-linux-is-an-open-sou"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Linux is an open-source operating system." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Linux is an open-source operating system. </span></div><div aria-label="toggle video from It was created in two parts." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It was created in two parts. </span></div><div aria-label="toggle video from In the early 1990s, two different people were working separately on projects to" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In the early 1990s, two different people were working separately on projects to </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">improve computer engineering. </span></div><div aria-label="toggle video from The first person was Linus Torvalds." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The first person was Linus Torvalds. </span></div><div aria-label="toggle video from At the time, the UNIX operating system was already in use." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">At the time, the UNIX operating system was already in use. </span></div><div aria-label="toggle video from He wanted to improve it and make it open source and accessible to anyone." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">He wanted to improve it and make it open source and accessible to anyone. </span></div><div aria-label="toggle video from What was revolutionary was his introduction of the Linux kernel." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">What was revolutionary was his introduction of the Linux kernel. </span></div><div aria-label="toggle video from We're going to learn what the kernel does later." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We're going to learn what the kernel does later. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--1"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-around-the-same-time"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Around the same time, Richard Stallman started working on GNU." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Around the same time, Richard Stallman started working on GNU. </span></div><div aria-label="toggle video from GNU was also an operating system based on UNIX." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">GNU was also an operating system based on UNIX. </span></div><div aria-label="toggle video from Stallman shared Torvalds' goal of creating software that was free and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Stallman shared Torvalds' goal of creating software that was free and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">open to anyone. </span></div><div aria-label="toggle video from After working on GNU for a few years, the missing element for" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">After working on GNU for a few years, the missing element for </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the software was a kernel. </span></div><div aria-label="toggle video from Together, Torvalds' and Stallman’s innovations made what is commonly referred" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Together, Torvalds' and Stallman’s innovations made what is commonly referred </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">to as Linux. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--2"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-now-that-you%27ve-lear"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that you've learned the history behind Linux," class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Now that you've learned the history behind Linux, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">let's take a look at what makes Linux unique. </span></div><div aria-label="toggle video from As mentioned before, Linux is open source," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As mentioned before, Linux is open source, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">meaning anyone can have access to the operating system and the source code. </span></div><div aria-label="toggle video from Linux and many of the programs that come with Linux are licensed under the terms" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Linux and many of the programs that come with Linux are licensed under the terms </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">of the GNU Public License, which allow you to use, share, and modify them freely. </span></div><div aria-label="toggle video from Thanks to Linux's open-source philosophy as well as a strong feature set," class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Thanks to Linux's open-source philosophy as well as a strong feature set, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">an entire community of developers has adopted this operating system. </span></div><div aria-label="toggle video from These developers are able to collaborate on projects and" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">These developers are able to collaborate on projects and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">advance computing together. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As a security analyst, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">you'll discover that Linux is used at different organizations. </span></div><div aria-label="toggle video from More specifically, Linux is used in many security programs." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">More specifically, Linux is used in many security programs. </span></div><div aria-label="toggle video from Another unique feature about Linux is the different distributions, or" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Another unique feature about Linux is the different distributions, or </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">varieties, that have been developed. </span></div><div aria-label="toggle video from Because of the large community contribution," class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Because of the large community contribution, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">there are over 600 distributions of Linux. </span></div><div aria-label="toggle video from Later you'll learn more about distributions." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Later you'll learn more about distributions. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--3"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-finally%2C-let%27s-take-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Finally, let's take a look at how you would use Linux in an entry-level" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Finally, let's take a look at how you would use Linux in an entry-level </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">security position. </span></div><div aria-label="toggle video from As a security analyst, you'll use many tools and programs in everyday work." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As a security analyst, you'll use many tools and programs in everyday work. </span></div><div aria-label="toggle video from As a security analyst, you'll use many tools and programs in everyday work." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You might examine different types of logs to identify what's going on in the system. </span></div><div aria-label="toggle video from For example," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">For example, </span></div><div aria-label="toggle video from you might find yourself looking at an error log when investigating an issue." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">you might find yourself looking at an error log when investigating an issue. </span></div><div aria-label="toggle video from Another place where you will use Linux is to verify access and" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Another place where you will use Linux is to verify access and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">authorization in an identity and access management system. </span></div><div aria-label="toggle video from In security, managing access is key in order to ensure a secure system." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In security, managing access is key in order to ensure a secure system. </span></div><div aria-label="toggle video from We'll take a closer look into access and authorization later." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We'll take a closer look into access and authorization later. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--4"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-finally%2C-as-an-analy"><div aria-label="toggle video from Finally, as an analyst, you might find yourself working" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Finally, as an analyst, you might find yourself working </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">with specific distributions designed for a particular task. </span></div><div aria-label="toggle video from For example, you might use a distribution that has a digital forensic tool" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">For example, you might use a distribution that has a digital forensic tool </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">to investigate what happened in an event alert. </span></div><div aria-label="toggle video from You might also use a distribution that's for" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You might also use a distribution that's for </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">pen testing in offensive security to look for vulnerabilities in the system. </span></div><div aria-label="toggle video from Distributions are created to fit the needs of their users." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Distributions are created to fit the needs of their users. </span></div><div aria-label="toggle video from I hope you're excited to learn more about Linux." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">I hope you're excited to learn more about Linux. </span></div><div aria-label="toggle video from This will be a very useful skill in the security field." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">This will be a very useful skill in the security field. </span></div></div>

# Linux architecture

<div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-let-me-start-with-a-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let me start with a quick question that may" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Let me start with a quick question that may </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">seem unrelated to security. </span></div><div aria-label="toggle video from Do you have a favorite building?" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Do you have a favorite building? </span></div><div aria-label="toggle video from And what is it about" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">And what is it about </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">its architecture that impresses you the most? </span></div><div aria-label="toggle video from current lecture segment: The windows? The structure of the walls?" class="rc-Phrase active css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The windows? The structure of the walls? </span></div><div aria-label="toggle video from current lecture segment: The windows? The structure of the walls?" class="rc-Phrase active css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Just like buildings, operating systems also have </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">an architecture and are made up of </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">discrete components that work together to form the whole. </span></div><div aria-label="toggle video from In this video, we're going to look at" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In this video, we're going to look at </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">all the components that together make up Linux. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-the-components-of-li"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The components of Linux include the user, applications," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The components of Linux include the user, applications, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the shell, the Filesystem Hierarchy Standard, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the kernel, and the hardware. </span></div><div aria-label="toggle video from Don't worry—we'll go into" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Don't worry—we'll go into </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">these components one by one together. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--1"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-first%2C-you-are-the-u"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from First, you are the user." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">First, you are the user. </span></div><div aria-label="toggle video from The user is the person interacting with the computer." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The user is the person interacting with the computer. </span></div><div aria-label="toggle video from The user is the person interacting with the computer." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">In Linux, you're the first element </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">to the architecture of the operating system. </span></div><div aria-label="toggle video from You're initiating the tasks or" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You're initiating the tasks or </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">commands that the OS is going to execute. </span></div><div aria-label="toggle video from Linux is a multi-user system." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Linux is a multi-user system. </span></div><div aria-label="toggle video from This means that more than one user can" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">This means that more than one user can </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">use the system's resources at the same time. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--2"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-the-second-element-o"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The second element of the architecture" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The second element of the architecture </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">is the applications within a system. </span></div><div aria-label="toggle video from An application is a program" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">An application is a program </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">that performs a specific task, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">such as a word processor or a calculator. </span></div><div aria-label="toggle video from You might hear the word "applications"" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You might hear the word "applications" </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">and "programs" used interchangeably. </span></div><div aria-label="toggle video from As an example," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As an example, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">one popular Linux application that </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">we'll learn more about later is Nano. </span></div><div aria-label="toggle video from Nano is a text editor." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Nano is a text editor. </span></div><div aria-label="toggle video from This simple application helps" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">This simple application helps </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">you keep notes on the screen. </span></div><div aria-label="toggle video from Linux applications are commonly" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Linux applications are commonly </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">distributed through package managers. </span></div><div aria-label="toggle video from We'll learn more about this process later." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We'll learn more about this process later. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--3"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-the-next-component-i"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The next component in the architecture" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The next component in the architecture </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">of Linux is the shell. </span></div><div aria-label="toggle video from This is an important element because" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">This is an important element because </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">it is how you will communicate with the system. </span></div><div aria-label="toggle video from The shell is a command line interpreter." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The shell is a command line interpreter. </span></div><div aria-label="toggle video from It processes commands and outputs the results." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It processes commands and outputs the results. </span></div><div aria-label="toggle video from This might sound familiar." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">This might sound familiar. </span></div><div aria-label="toggle video from Previously, we learned" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Previously, we learned </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">about the two types of user interfaces: </span></div><div aria-label="toggle video from Previously, we learned" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the GUI and the CLI. </span></div><div aria-label="toggle video from You can think of the shell as a CLI." class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You can think of the shell as a CLI. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--4"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-another-element-of-t"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another element of the architecture of" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Another element of the architecture of </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Linux is the Filesystem Hierarchy Standard, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">or FHS. It's </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the component of the Linux OS that organizes data. </span></div><div aria-label="toggle video from An easy way for you to think about" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">An easy way for you to think about </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the FHS is to think about it as a filing cabinet of data. </span></div><div aria-label="toggle video from The FHS is how data is stored in a system." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The FHS is how data is stored in a system. </span></div><div aria-label="toggle video from The FHS is how data is stored in a system." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It's a way to organize data so that it can be </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">found when the data is accessed by the system. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--5"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-that-brings-us-to-th"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from That brings us to the kernel." class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">That brings us to the kernel. </span></div><div aria-label="toggle video from The kernel is a component of" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The kernel is a component of </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the Linux OS that manages processes and memory. </span></div><div aria-label="toggle video from The kernel communicates with the hardware" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The kernel communicates with the hardware </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">to execute the commands sent by the shell. </span></div><div aria-label="toggle video from The kernel uses drivers to enable" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The kernel uses drivers to enable </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">applications to execute tasks. </span></div><div aria-label="toggle video from The Linux kernel helps ensure that the system" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The Linux kernel helps ensure that the system </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">allocates resources more efficiently </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">and makes the system work faster. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--6"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-finally%2C-the-last-co"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Finally, the last component of" class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Finally, the last component of </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the architecture is the hardware. </span></div><div aria-label="toggle video from Hardware refers to the physical components of a computer." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Hardware refers to the physical components of a computer. </span></div><div aria-label="toggle video from You can compare this to software applications" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You can compare this to software applications </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">which can be downloaded into a system. </span></div><div aria-label="toggle video from The hardware in your computer are things" class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The hardware in your computer are things </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">like the CPU, mouse, and keyboard. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--7"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-congratulations%21-we%27"><div aria-label="toggle video from Congratulations!" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Congratulations! </span></div><div aria-label="toggle video from We've now covered the architecture" class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We've now covered the architecture </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">of Linux.</span></div><div aria-label="toggle video from We've now covered the architecture" class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803"> An understanding of </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">these components will help you </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">become increasingly familiar with Linux. </span></div></div>

# Linux architecture explained

Understanding the Linux architecture is important for a security analyst. When you understand how a system is organized, it makes it easier to understand how it functions. In this reading, you’ll learn more about the individual components in the Linux architecture. A request to complete a task starts with the user and then flows through applications, the shell, the Filesystem Hierarchy Standard, the kernel, and the hardware.

## User

The **user** is the person interacting with a computer. They initiate and manage computer tasks. Linux is a multi-user system, which means that multiple users can use the same resources at the same time.

## Applications

An **application** is a program that performs a specific task. There are many different applications on your computer. Some applications typically come pre-installed on your computer, such as calculators or calendars. Other applications might have to be installed, such as some web browsers or email clients. In Linux, you'll often use a package manager to install applications. A **package manager** is a tool that helps users install, manage, and remove packages or applications. A **package** is a piece of software that can be combined with other packages to form an application.

## Shell

The **shell** is the command-line interpreter. Everything entered into the shell is text based. The shell allows users to give commands to the kernel and receive responses from it. You can think of the shell as a translator between you and your computer. The shell translates the commands you enter so that the computer can perform the tasks you want.

## Filesystem Hierarchy Standard (FHS)

The **Filesystem Hierarchy Standard (FHS)** is the component of the Linux OS that organizes data. It specifies the location where data is stored in the operating system.

A **directory** is a file that organizes where other files are stored. Directories are sometimes called “folders,” and they can contain files or other directories. The FHS defines how directories, directory contents, and other storage is organized so the operating system knows where to find specific data.

## Kernel

The **kernel** is the component of the Linux OS that manages processes and memory. It communicates with the applications to route commands. The Linux kernel is unique to the Linux OS and is critical for allocating resources in the system. The kernel controls all major functions of the hardware, which can help get tasks expedited more efficiently.

## Hardware

The **hardware** is the physical components of a computer. You might be familiar with some hardware components, such as hard drives or CPUs. Hardware is categorized as either peripheral or internal.

### **Peripheral devices**

**Peripheral devices** are hardware components that are attached and controlled by the computer system. They are not core components needed to run the computer system. Peripheral devices can be added or removed freely. Examples of peripheral devices include monitors, printers, the keyboard, and the mouse.

### **Internal hardware**

**Internal hardware** are the components required to run the computer. Internal hardware includes a main circuit board and all components attached to it. This main circuit board is also called the motherboard. Internal hardware includes the following:

<div class="rc-CML" dir="auto" id="bkmrk-the-central-processi"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- The **Central Processing Unit (CPU)** is a computer’s main processor, which is used to perform general computing tasks on a computer. The CPU executes the instructions provided by programs, which enables these programs to run.
- **Random Access Memory (RAM)** is a hardware component used for short-term memory. It’s where data is stored temporarily as you perform tasks on your computer. For example, if you’re writing a report on your computer, the data needed for this is stored in RAM. After you’ve finished writing the report and closed down that program, this data is deleted from RAM. Information in RAM cannot be accessed once the computer has been turned off. The CPU takes the data from RAM to run programs.
- The **hard drive** is a hardware component used for long-term memory. It’s where programs and files are stored for the computer to access later. Information on the hard drive can be accessed even after a computer has been turned off and on again. A computer can have multiple hard drives.

</div></div></div></div></div>## Key takeaways

It’s important for security analysts to understand the Linux architecture and how these components are organized. The components of the Linux architecture are the user, applications, shell, Filesystem Hierarchy Standard, kernel, and hardware. Each of these components is important in how Linux functions.

# Linux distributions

<div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-let%27s-learn-a-little"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's learn a little bit more about Linux and" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Let's learn a little bit more about Linux and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">what you need to know about this operating system when working as a security analyst. </span></div><div aria-label="toggle video from Linux is a very customizable operating system." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Linux is a very customizable operating system. </span></div><div aria-label="toggle video from Unlike other operating systems, there are different versions available for" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Unlike other operating systems, there are different versions available for </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">you to use. </span></div><div aria-label="toggle video from These different versions of Linux are called distributions." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">These different versions of Linux are called distributions. </span></div><div aria-label="toggle video from You might also hear them called distros or flavors of Linux." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">You might also hear them called distros or flavors of Linux. </span></div><div aria-label="toggle video from It's essential for you to understand the distribution that you're using" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">It's essential for you to understand the distribution that you're using </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">so you know what tools and apps are available to you. </span></div><div aria-label="toggle video from For example," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">For example, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Debian is a distro that has different tools than the Ubuntu distribution. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-let%27s-use-an-analogy"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's use an analogy to describe Linux distributions." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Let's use an analogy to describe Linux distributions. </span></div><div aria-label="toggle video from Think of the OS as a vehicle." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Think of the OS as a vehicle. </span></div><div aria-label="toggle video from First, we'll start with its engine—that would be the kernel. Just as the engine" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">First, we'll start with its engine—that would be the kernel. Just as the engine </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">makes a vehicle run, the kernel is the most important component of the Linux OS. </span></div><div aria-label="toggle video from Because the Linux kernel is open source, anyone can take the kernel and" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Because the Linux kernel is open source, anyone can take the kernel and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">modify it to build a new distribution. </span></div><div aria-label="toggle video from This is comparable to a vehicle manufacturer taking an engine and" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">This is comparable to a vehicle manufacturer taking an engine and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">creating different types of vehicles: trucks, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">cars, vans, convertibles, busses, airplanes, and so on. </span></div><div aria-label="toggle video from These different types of vehicles can be compared to different Linux distributions." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">These different types of vehicles can be compared to different Linux distributions. </span></div><div aria-label="toggle video from A bus is used to transport lots of people." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">A bus is used to transport lots of people. </span></div><div aria-label="toggle video from A truck is used to transport a large number of goods across vast distances." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">A truck is used to transport a large number of goods across vast distances. </span></div><div aria-label="toggle video from An aircraft transports passengers or goods by air." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">An aircraft transports passengers or goods by air. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--1"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-just-as-each-vehicle"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Just as each vehicle serves its own purpose," class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Just as each vehicle serves its own purpose, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">different distributions are used for different reasons. </span></div><div aria-label="toggle video from Additionally, vehicles all have different components which distinguish them from" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Additionally, vehicles all have different components which distinguish them from </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">each other. </span></div><div aria-label="toggle video from Aircrafts have control panels with buttons and knobs." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Aircrafts have control panels with buttons and knobs. </span></div><div aria-label="toggle video from Regular cars have four tires, but trucks can have more." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Regular cars have four tires, but trucks can have more. </span></div><div aria-label="toggle video from Similarly, different Linux distributions contain different preinstalled programs," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Similarly, different Linux distributions contain different preinstalled programs, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">user interfaces, and much more. </span></div><div aria-label="toggle video from A lot of this is based on what the Linux user needs, but" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">A lot of this is based on what the Linux user needs, but </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">some distros are also chosen based on preference—the </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">same way a sports car might be chosen as a vehicle. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--2"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-the-advantage-of-usi"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The advantage of using Linux as an OS is that you can customize it." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The advantage of using Linux as an OS is that you can customize it. </span></div><div aria-label="toggle video from Distributions include the Linux kernel, utilities," class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Distributions include the Linux kernel, utilities, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">a package management system, and an installer. </span></div><div aria-label="toggle video from We learned earlier that Linux is open source, and" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">We learned earlier that Linux is open source, and </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">anyone can contribute to adding to the source code. </span></div><div aria-label="toggle video from That is how new distributions are created." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">That is how new distributions are created. </span></div><div aria-label="toggle video from That is how new distributions are created." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk-all-distros-are-deri"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item"><div class="phrases"><div aria-label="toggle video from All distros are derived from another distro, but" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">All distros are derived from another distro, but </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">there are a few that are considered parent distributions. </span></div><div aria-label="toggle video from Red Hat® is the parent of CentOS, and Slackware® is the parent of SUSE®." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Red Hat® is the parent of CentOS, and Slackware® is the parent of SUSE®. </span></div><div aria-label="toggle video from Both Ubuntu and KALI LINUX™ are derived from Debian." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">Both Ubuntu and KALI LINUX™ are derived from Debian. </span></div></div></div></div><div class="cds-1665 css-xl5mb3 cds-1666" id="bkmrk--3"><div class="cds-1665 rc-Paragraph css-1lz62pp cds-1667 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-as-we-continue%2C-we%27r"><div aria-label="toggle video from current lecture segment: As we continue, we're going to take a look at some of the distributions most commonly" class="rc-Phrase active css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">As we continue, we're going to take a look at some of the distributions most commonly </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">used by security analysts. </span></div><div aria-label="toggle video from The more you understand these distributions," class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">The more you understand these distributions, </span><span aria-hidden="true" class="cds-1801 css-80vnnb cds-1803">the easier your work will be. </span></div></div>

# KALI LINUX ™

<div class="cds-206 css-xl5mb3 cds-207" id="bkmrk-in-this-section%2C-we%27"><div class="cds-206 rc-Paragraph css-1lz62pp cds-208 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this section, we're going to cover a Linux distribution that's widely used in" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">In this section, we're going to cover a Linux distribution that's widely used in </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">security and discuss KALI LINUX™. </span></div><div aria-label="toggle video from KALI LINUX™ is a trademark of Offensive Security and is Debian derived." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">KALI LINUX™ is a trademark of Offensive Security and is Debian derived. </span></div><div aria-label="toggle video from This open-source distro was made specifically with penetration testing and" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">This open-source distro was made specifically with penetration testing and </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">digital forensics in mind. </span></div><div aria-label="toggle video from There are many tools pre-installed into KALI LINUX™." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">There are many tools pre-installed into KALI LINUX™. </span></div><div aria-label="toggle video from It's important to note that KALI LINUX™ should be used on a virtual machine." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">It's important to note that KALI LINUX™ should be used on a virtual machine. </span></div><div aria-label="toggle video from This prevents damage to your system in the event its tools are used improperly." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">This prevents damage to your system in the event its tools are used improperly. </span></div><div aria-label="toggle video from An additional benefit is that using a virtual machine gives you the ability to" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">An additional benefit is that using a virtual machine gives you the ability to </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">revert to a previous state. </span></div></div></div></div><div class="cds-206 css-xl5mb3 cds-207" id="bkmrk-"><div class="cds-206 rc-Paragraph css-1lz62pp cds-208 cds-grid-item">  
</div></div><div class="cds-206 css-xl5mb3 cds-207" id="bkmrk-as-security-professi"><div class="cds-206 rc-Paragraph css-1lz62pp cds-208 cds-grid-item"><div class="phrases"><div aria-label="toggle video from As security professionals advance in their careers, some specialize in penetration testing." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">As security professionals advance in their careers, some specialize in penetration testing. </span></div><div aria-label="toggle video from A penetration test is a simulated attack that helps identify vulnerabilities in" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">A penetration test is a simulated attack that helps identify vulnerabilities in </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">systems, networks, websites, applications, and processes. </span></div><div aria-label="toggle video from KALI LINUX™ has numerous tools that are useful during penetration testing." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">KALI LINUX™ has numerous tools that are useful during penetration testing. </span></div><div aria-label="toggle video from Let's look at a few examples." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">Let's look at a few examples. </span></div></div></div></div><div class="cds-206 css-xl5mb3 cds-207" id="bkmrk--1"><div class="cds-206 rc-Paragraph css-1lz62pp cds-208 cds-grid-item">  
</div></div><div class="cds-206 css-xl5mb3 cds-207" id="bkmrk-to-begin%2C-metasploit"><div class="cds-206 rc-Paragraph css-1lz62pp cds-208 cds-grid-item"><div class="phrases"><div aria-label="toggle video from To begin, Metasploit can be used to look for and exploit vulnerabilities on machines." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">To begin, Metasploit can be used to look for and exploit vulnerabilities on machines. </span></div><div aria-label="toggle video from Burp Suite is another tool that helps to test for weaknesses in web applications." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">Burp Suite is another tool that helps to test for weaknesses in web applications. </span></div><div aria-label="toggle video from And finally, John the Ripper is a tool used to guess passwords." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">And finally, John the Ripper is a tool used to guess passwords. </span></div><div aria-label="toggle video from As a security analyst, your work might involve digital forensics." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">As a security analyst, your work might involve digital forensics. </span></div><div aria-label="toggle video from Digital forensics is the process of collecting and" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">Digital forensics is the process of collecting and </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">analyzing data to determine what has happened after an attack. </span></div><div aria-label="toggle video from For example," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">For example, </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">you might take an investigative look at data related to network activity. </span></div><div aria-label="toggle video from KALI LINUX™ is also a useful distribution for" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">KALI LINUX™ is also a useful distribution for </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">security professionals who are involved in digital forensic work. </span></div><div aria-label="toggle video from It has a large number of tools that can be used for this. As one example," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">It has a large number of tools that can be used for this. As one example, </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">tcpdump is a command-line packet analyzer. It's used to capture network traffic. </span></div><div aria-label="toggle video from Another tool commonly used in the security profession is Wireshark." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">Another tool commonly used in the security profession is Wireshark. </span></div><div aria-label="toggle video from It has a graphical user interface that can be used to analyze live and" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">It has a graphical user interface that can be used to analyze live and </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">captured network traffic. </span></div><div aria-label="toggle video from And as a final example," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">And as a final example, </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">Autopsy is a forensic tool used to analyze hard drives and smartphones. </span></div><div aria-label="toggle video from These are just a few tools included with KALI LINUX™." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">These are just a few tools included with KALI LINUX™. </span></div><div aria-label="toggle video from This distribution has many tools used to conduct pen testing and digital forensics." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">This distribution has many tools used to conduct pen testing and digital forensics. </span></div></div></div></div><div class="cds-206 css-xl5mb3 cds-207" id="bkmrk--2"><div class="cds-206 rc-Paragraph css-1lz62pp cds-208 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-we%27ve-explored-how-k"><div aria-label="toggle video from We've explored how KALI LINUX™ is an important distribution that's widely" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">We've explored how KALI LINUX™ is an important distribution that's widely </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">used in security, </span><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">but there are other distributions that security professionals use as well. </span></div><div aria-label="toggle video from Next we'll explore a few more distributions." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-342 css-80vnnb cds-344">Next we'll explore a few more distributions.   
  
quick note from the student.. the course says to use it on a VM, however you can use it as your own flavor of Linux for your desktop. its not recommended unless you know what you are doing or willing to wipe the machine :p  
</span></div></div>

# More Linux distributions

Previously, you were introduced to the different distributions of Linux. This included KALI LINUX ™. (KALI LINUX ™ is a trademark of OffSec.) In addition to KALI LINUX ™, there are multiple other Linux distributions that security analysts should be familiar with. In this reading, you’ll learn about additional Linux distributions.

## KALI LINUX ™

**KALI LINUX ™** is an open-source distribution of Linux that is widely used in the security industry. This is because KALI LINUX ™, which is Debian-based, is pre-installed with many useful tools for penetration testing and digital forensics. A **penetration test** is a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. **Digital forensics** is the practice of collecting and analyzing data to determine what has happened after an attack. These are key activities in the security industry.

However, KALI LINUX ™ is not the only Linux distribution that is used in cybersecurity.

## Ubuntu

**Ubuntu** is an open-source, user-friendly distribution that is widely used in security and other industries. It has both a command-line interface (CLI) and a graphical user interface (GUI). Ubuntu is also Debian-derived and includes common applications by default. Users can also download many more applications from a package manager, including security-focused tools. Because of its wide use, Ubuntu has an especially large number of community resources to support users.

Ubuntu is also widely used for cloud computing. As organizations migrate to cloud servers, cybersecurity work may more regularly involve Ubuntu derivatives.

## Parrot

**Parrot** is an open-source distribution that is commonly used for security. Similar to KALI LINUX ™, Parrot comes with pre-installed tools related to penetration testing and digital forensics. Like both KALI LINUX ™ and Ubuntu, it is based on Debian.

Parrot is also considered to be a user-friendly Linux distribution. This is because it has a GUI that many find easy to navigate. This is in addition to Parrot’s CLI.

## Red Hat® Enterprise Linux®

**Red Hat Enterprise Linux** is a subscription-based distribution of Linux built for enterprise use. Red Hat is not free\*, which is a major difference from the previously mentioned distributions. Because it’s built and supported for enterprise use, Red Hat also offers a dedicated support team for customers to call about issues.

with my personal experience, you can use RHEL9 for personal use. also as of July of 2023, its parent company may be trying to break copyright law by limiting access to source code, and close sourcing the project. if they succeed many other distros might die or become less secure or die, like centOS. I likely wont update this but you can google it yourself to see how that went.

## CentOS

**CentOS** is an open-source distribution that is closely related to Red Hat. It uses source code published by Red Hat to provide a similar platform. However, CentOS does not offer the same enterprise support that Red Hat provides and is supported through the community.   
p.s. CentOS may be dead because its parent company is trying to kill it at the time of posting this page, google it to see if it has died LOL

### Arch Linux

**Arch Linux** is an open-source distribution known for its simplicity and user-focused design. It adheres to the "Keep It Simple, Stupid" (KISS) principle, offering a minimal base system that users can customize to their needs, reducing potential security risks, provides more control over the system, rolling-release model ensures up-to-date security updates.

A key feature is the Arch User Repository (AUR), a community-driven repository that lets users compile and install packages from source using the Arch package manager, pacman.

## Key takeaways

KALI LINUX ™, Ubuntu, Parrot, Red Hat, and CentOS are all widely used Linux distributions. It’s important for security analysts to be aware of these distributions that they might encounter in their career.

# Package managers for installing applications

Previously, you learned about Linux distributions and that different distributions derive from different sources, such as Debian or Red Hat Enterprise Linux distribution. You were also introduced to package managers, and learned that Linux applications are commonly distributed through package managers. In this reading, you’ll apply this knowledge to learn more about package managers.

## Introduction to package managers

A **package** is a piece of software that can be combined with other packages to form an application. Some packages may be large enough to form applications on their own.

Packages contain the files necessary for an application to be installed. These files include dependencies, which are supplemental files used to run an application.

Package managers can help resolve any issues with dependencies and perform other management tasks. A **package manager** is a tool that helps users install, manage, and remove packages or applications. Linux uses multiple package managers.

**Note:** It’s important to use the most recent version of a package when possible. The most recent version has the most up-to-date bug fixes and security patches. These help keep your system more secure.

## Types of package managers

Many commonly used Linux distributions are derived from the same parent distribution. For example, KALI LINUX ™, Ubuntu, and Parrot all come from Debian. CentOS comes from Red Hat.

This knowledge is useful when installing applications because certain package managers work with certain distributions. For example, the Red Hat Package Manager (RPM) can be used for Linux distributions derived from Red Hat, and package managers such as dpkg can be used for Linux distributions derived from Debian.

Different package managers typically use different file extensions. For example, Red Hat Package Manager (RPM) has files which use the <var>.rpm</var> file extension, such as <var>Package-Version-Release\_Architecture.rpm</var>. Package managers for Debian-derived Linux distributions, such as dpkg, have files which use the <var>.deb</var> file extension, such as <var>Package\_Version-Release\_Architecture.deb</var>.

## Package management tools

In addition to package managers like RPM and dpkg, there are also package management tools that allow you to easily work with packages through the shell. Package management tools are sometimes utilized instead of package managers because they allow users to more easily perform basic tasks, such as installing a new package. Two notable tools are the Advanced Package Tool (APT) and Yellowdog Updater Modified (YUM).

### **Advanced Package Tool (APT)** 

APT is a tool used with Debian-derived distributions. It is run from the command-line interface to manage, search, and install packages.

### **Yellowdog Updater Modified (YUM)**

YUM is a tool used with Red Hat-derived distributions. It is run from the command-line interface to manage, search, and install packages. YUM works with <var>.rpm</var> files.

## Key takeaways

A package is a piece of software that can be combined with other packages to form an application. Packages can be managed using a package manager. There are multiple package managers and package management tools for different Linux distributions. Package management tools allow users to easily work with packages through the shell. Debian-derived Linux distributions use package managers like dpkg as well as package management tools like Advanced Package Tool (APT). Red Hat-derived distributions use the Red Hat Package Manager (RPM) or tools like Yellowdog Updater Modified (YUM).

# Vanilla os

i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnome as a base and im thinking this is potentially one of the best options in the future if they stick with it. also theres only two updates per year and a roling release but you have to manually enable rolling releases

tl;dr

its stable asf, and you can run any app on it!

**Vanilla OS: A Unique Solution to Distro Hopping and the Future of Software Installation**

Vanilla OS is a Linux distribution that aims to resolve the common practice of distro hopping. This term refers to the habit among Linux users of switching between different Linux distributions to find the perfect balance of stability, hardware support, and application access. Vanilla OS offers all these features within a single, highly stable base.

What sets Vanilla OS apart is its approach to software installation. It introduces 'apx', a package manager that allows software installation from any source by installing them onto distro containers. This means that Vanilla OS can run virtually any software developed for Linux, effectively addressing the issue of distro packaging fragmentation. This unique combination of features positions Vanilla OS as a potential game-changer in the Linux ecosystem.

**Intuitive User Experience**

Vanilla OS prioritizes user-friendliness in its design. The intuitive installer guides users through the necessary steps, and post-installation, users can customize their experience, choosing between dark and light mode, enabling support for Flatpak and AppImage, and selecting their preferred apps. This user-centric approach makes Vanilla OS accessible to both beginners and technically inclined users.

**Immutability and Atomicity: Enhancing Security and Stability**

One of the distinguishing features of Vanilla OS is its immutable and atomic nature. The base system is locked down, preventing both applications and users from writing to it, except for certain directories like the home folder or partition and the /etc and /var directories. This design principle significantly bolsters the system's security.

Updates in Vanilla OS are applied atomically, meaning each update either completes successfully or, if any issue arises, the entire operation is reverted, leaving the system unaltered. This ensures that any reboot will either return the system to its previous state or update it successfully.

**Is Vanilla OS the Future of Linux Distributions?**

Vanilla OS represents a promising concept that could potentially shape the future of Linux distributions. It provides access to virtually all Linux-developed software at native speeds within a highly stable base. However, it's not a one-size-fits-all solution. Users who only need software from FlatHub may not require Vanilla OS, and those unfamiliar with the command line or the concept of containers might find it challenging to use. However, with further development, such as a graphical layer on 'apx' for intuitive software installation from containers, Vanilla OS could become an optimal solution for users seeking extensive software access without compromising system stability

<sub>for anyone who cares this one was written with ai, modified by me...</sub>

# Nix OS

make page on nix os, alternative to vanilla os?

# Resources for completing Linux labs

This course features hands-on lab activities where you’ll have the opportunity to practice Linux commands in the terminal. You’ll use a platform called Qwiklabs to complete these labs. In this reading, you’ll learn how to use Qwiklabs.

This reading first provides a section on how to use Qwiklabs, which includes details on how to launch a lab, how to interact within the Qwiklabs environment, and how to end a lab. This is followed by another section on helpful navigation tips and keyboard shortcuts; these may be useful when working in the terminal.

**Note**: You will not launch Qwiklabs directly from this reading and instead will do this through lab activities and exemplars that you encounter throughout the course. Im not posting the Qwiklabs, this is just how to use Qwiklabs, and if you use Qwiklabs thats on you.

## How to use Qwiklabs

### **Launching Qwiklabs**

When you select a lab, you start from a Coursera page. You will need to click **Launch App** on that page. After you click **Launch App**, a new tab will open with a Qwiklabs page that contains instructions for that particular lab.

### **Start Lab button**

On the Qwiklabs page, you must click **Start Lab** to open a temporary terminal. The instructions for the lab will move to the right side of the screen.

<div class="rc-CML" dir="auto" id="bkmrk-"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Green button with text “Start Lab” and a maximum time limit of 20 minutes displayed.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/bbLYK8KXTheEmp-pArlF-g_ef7afc94b9304f30844a19e45e922ff1_wPU2KdBxIZhEA0euFsDlhs_nHve2ceZ69LNUPx4ZE0Bb8jVXhx-Qq2dfRIK1a8IFwZ08_GkPEgh4NR_8yvGYvn0U4FTm6l8QGhpbBlTwXew2thU31_64Ivi7nwPKJNCtemriZhtJWAfZdc0dQ-tTfEo?expiry=1688688000000&hmac=Xs_PR-pKuEqZUuDwbTvXOG4xEqxiu8fZfNRcFei0SYc)</figure></div></div></div></div></div></div>Read the instructions and complete all the tasks in the lab by entering commands in the terminal.

**Note**: It may take a moment for the terminal to start.

### **Lab control dialog box**

After you click **Start Lab**, the lab control dialog box opens. It contains the **End Lab** button, the **timer**, and the **Open Linux Console** button.

You can hide or unhide the dialog box by clicking the following icon in the red box:

<div class="rc-CML" dir="auto" id="bkmrk--1"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Four rectangles spiraling next to each other to comprise one square surrounded by a red box in a screenshot of the lab.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/9J3KUOFWRNWzekD6Uiykyg_f489a579c31c4a8b8c2f9b68467495f1_LuMypehj-sqYyJlYCJGk-0LPWQirKP_cVeCYhsw1ism9amvqsYDhZEdh-Wyzh1tW__cut8UToAifaNs6LRj3iXCr4ujUo_RA7h-qx4rJVs1CRjAwAwCGM-gnKcx4wIWeV2b9IqCRB14qOVyda1LeQDA?expiry=1688688000000&hmac=sUwVJcuIGXiK6OC-T6cB8nckcTeHRtnugLt3Wh56lAI)</figure></div></div></div></div></div></div>### **The timer**

The **timer** starts when the terminal has loaded. The timer keeps track of the amount of time you have left to complete a lab. The timer counts down until it reaches 00:00:00. When it does, your temporary terminal and resources are deleted.

You will have ample time to complete the labs. But, stay focused on completing the tasks to ensure you use your time well.

### **Open Linux Console button**

When you click the button to **Open Linux Console**, the terminal opens in a new browser window:

<div class="rc-CML" dir="auto" id="bkmrk--2"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![A red square around a button with text “Open Linux Console”.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/GL_lszqoS_SwMddGbzYgEQ_1bd87af68f5f46a0be668b190f51f6f1_tEIGaT6dW10ie3BjpmzvFivoi8feEG9-Iw7O_lAjvdvWpFXlZOm8HmiNc2c9OgRKvKUBjJhp8HfoR3qu9JPY4GzGbCSOvh_nC-pKywu_G0B7V_ULMpjKTT06CYfx4b7oS1HPZnudcST_D-LjQmdIwmY?expiry=1688688000000&hmac=vwiCV0cQqzvmvDv9YdaDCvAWu2lfLxRHEr1NoC1gp4Y)</figure></div></div></div></div></div></div>Use this feature if you want a full-screen view of the terminal. You can close this window at any time. Closing the window does not end your lab, and you can continue working in the terminal in the original tab.

### **Check progress**

You can check your progress by clicking **Check my progress** at the end of each task.

<div class="rc-CML" dir="auto" id="bkmrk--3"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Blue button with text “Check my progress” below a sample task.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/IbOfFeajT2q9yZWHyXxHOA_e8b0749220334c5aa3ac5f0aa7070ef1_kN58Isr_cUeyITXiw1gAqBQeWHP4UIaMnQbwyVY6sRQre_L0gtmYjALeqKvApc1L8XchdZeLsfUaNwA9aQZL0Kir1h0c8BJjGsKWq8mfHEmrS0pVNBb4h5c-3hJ-__kbwaa0LN5U8CbJBLlqWToABF0?expiry=1688688000000&hmac=z0DH9eRfFA4-sNQbkhRuP2m3aJnXx6AtSwQHrTRBNgs)</figure></div></div></div></div></div></div>If you haven’t yet completed a task, you’ll receive hints on what you must do to complete it.

You can click **Check my progress** whenever you want to check the completion status of a task or receive a hint.

### **Using copy/paste commands**

The first time you try to use copy or paste keyboard shortcuts (such as **CTRL + C**), you’ll receive a pop-up requesting permission to use your device’s clipboard: “**googlecoursera.qwiklabs.com wants to see text and images copied to the clipboard.**” Please click **Allow** if you would like to be able to use these shortcuts in the Qwiklabs platform. If you choose not to allow Qwiklabs access to your clipboard, you cannot use keyboard shortcuts but you can still complete the lab.

### **Code block**

Certain steps may include a code block. Click the copy button to copy the code provided and then paste it into the terminal.

<div class="rc-CML" dir="auto" id="bkmrk--4"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Two layered rectangles surrounded by a red box on the right side of a sample code block to indicate copy.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/tSaH4Zd2T9qHv2ALlr1fGA_a4c26fdc722a4b3c8f38f12e15c863f1_OhCX3BSN-yf0Nd8lnjLLk4t5hUVBbpR913lAp_yIdqsaOEgDIiV-p9N2nflw4o4ED_Fwxsg6Dez7gopRSYphMueEEoblkkIBY3ELnRDiqKhC6ZILGCJH1NSugmPxU2Y50M2sGk98kdv--GwRMchPRJU?expiry=1688688000000&hmac=BbUXv1jOAecIBgkFxB-BNnArWB5Mh4cP64x510LU_bc)</figure></div></div></div></div></div></div>To paste code or other text content that you have copied from the instructions into the terminal, activate the terminal by clicking anywhere inside it. The terminal is active when the cursor in the terminal changes from a static empty outline to a flashing solid block.

<div class="rc-CML" dir="auto" id="bkmrk--5"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![A dollar sign prompt and white rectangle cursor surrounded by a red box in the terminal.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/cgjBaqtES0ayrgvTCk3QZQ_25005fa6300f4d1ba01ef6a768097ef1_NCn3RU6ab8eSTxYYo2V1zh5y2ehRWaP-OavQGkZpJgxI-K-JeeIL5QSJCMqQqMQ-09eapv_GCAub7jZG6zmqX3VZ3Vx59qV_qXdJVo4LUqGW2kQz36DXIGk17rzkSmMmPvVRlrMp3nfeoC9dbYjk98Q?expiry=1688688000000&hmac=fzzGgVZjDG9kHsL4nqHgUnecySZzEBUaJTrxqO_hR0g)</figure></div></div></div></div></div></div>Once the terminal is active, use the keyboard shortcut **CTRL + V** (hold down the **CTRL** key and press the **V** key) to insert the copied text into the terminal at the location of the flashing cursor.

### **Scrolling**

In certain situations, you may want to scroll within the terminal window. To do so, use the scroll wheel on your mouse or the touchpad of your computer.

### **End Lab button**

<div class="rc-CML" dir="auto" id="bkmrk--6"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![A red button with text “End Lab” surrounded by a red box.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/dN9wPgYMQl2fBxFAffoZjw_38694553980f42cd94d8906a1f2d1bf1_Mfw27huMPvdOZI21TbioE29m49cakKuRkC3cEtNpIUkdnVMw7P8r1N9ETGXSSloVpG_zhsBqeA4uj7RTVMTFLChkhBUdF4yYkeIfa5Y42X6AWHf7HrQqiBm9sPcDBpY2pxdpvQVQRQSvbQbmCS43wY8?expiry=1688688000000&hmac=CNDm4LP82u_528axrzmV1g9S7A6blmUT64A0P6CbPX8)</figure></div></div></div></div></div></div>Finally, click **End Lab** when you’ve completed the tasks in the lab.

**Note**: Don't click **End Lab** until you're finished; you'll lose access to the work you've done throughout the lab.

### **Tracking progress on Coursera**

If you complete a lab but your progress hasn’t been tracked on Coursera, you may need to refresh the page for your progress to be registered. Once you complete the lab and refresh the page, the green check mark should appear.

## Helpful navigation tips and keyboard shortcuts

The following contains a list of navigation tips and keyboard shortcuts you may find useful when completing your Linux labs. Your cursor must be in the terminal window to use these navigation tips and keyboard shortcuts.

<div class="rc-CML" dir="auto" id="bkmrk-ctrl-%2B-c%3A-terminates"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- <var>CTRL + C</var>: Terminates a command that is currently running; from the instructions portion of Qwiklabs, you can use <var>CTRL + C</var> to copy, but within the terminal, it will only terminate a command and if one isn't running, it will display <var>^C</var> at the prompt
- <var>CTRL + V</var>: Pastes text
- <var>clear</var>: Clears the terminal screen; this can also be done by entering <var>CTRL + L</var>
- <var>CTRL + A</var>: Sets your cursor at the beginning of a command
- <var>CTRL + E</var>: Sets your cursor at the end of a command
- <var>Left arrow</var> **key**: Moves left within a command
- <var>Right arrow</var> **key**: Moves right within a command
- <var>Up arrow</var> **key**: Provides the last command you entered into the command line; can be entered multiple times to go through multiple commands from the command history
- <var>Down arrow</var> **key**: Provides the next command in the command history; must be after using the <var>up arrow</var> key
- <var>Tab</var> **key**: Provides available suggestions for completing your text

</div></div></div></div></div>## Key takeaways

Knowing how to navigate Qwiklabs will be useful as you complete the labs throughout this course. These labs can help you practice what you’ve learned in an interactive environment.

# Introduction to the shell

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-welcome-back%21-in-thi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Welcome back! In this video, we're going to discuss the Linux shell." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Welcome back! In this video, we're going to discuss the Linux shell. </span></div><div aria-label="toggle video from This part of the Linux architecture is where the action will happen for" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This part of the Linux architecture is where the action will happen for </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you as a security analyst. </span></div><div aria-label="toggle video from We introduced the shell with other components of the Linux OS earlier," class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We introduced the shell with other components of the Linux OS earlier, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but let's take a deeper look at what the shell is and what it does. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-shell-is-the-com"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The shell is the command-line interpreter." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The shell is the command-line interpreter. </span></div><div aria-label="toggle video from That means it helps you communicate with the operating system through" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That means it helps you communicate with the operating system through </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the command line. </span></div><div aria-label="toggle video from Previously, we discussed a command-line interface." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, we discussed a command-line interface. </span></div><div aria-label="toggle video from This is essentially the shell." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is essentially the shell. </span></div><div aria-label="toggle video from current lecture segment: The shell provides the command-line interface for you to interact with the OS." class="rc-Phrase active css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The shell provides the command-line interface for you to interact with the OS. </span></div><div aria-label="toggle video from To tell the OS what to do, you enter commands into this interface." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To tell the OS what to do, you enter commands into this interface. </span></div><div aria-label="toggle video from A command is an instruction telling the computer to do something." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A command is an instruction telling the computer to do something. </span></div><div aria-label="toggle video from The shell communicates with the kernel to execute these commands." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The shell communicates with the kernel to execute these commands. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-earlier%2C-we-discusse"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Earlier, we discussed how the operating system helps humans and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Earlier, we discussed how the operating system helps humans and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">computers speak with each other. </span></div><div aria-label="toggle video from The shell is the part of the OS that allows you to do this." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The shell is the part of the OS that allows you to do this. </span></div><div aria-label="toggle video from Think of this as a very helpful language interpreter between you and your system." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Think of this as a very helpful language interpreter between you and your system. </span></div><div aria-label="toggle video from Since you do not speak computer language or binary," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Since you do not speak computer language or binary, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you can't directly communicate with your system. </span></div><div aria-label="toggle video from This is where the shell comes in to help you." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is where the shell comes in to help you. </span></div><div aria-label="toggle video from Your OS doesn't need the shell for most of its work, but" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Your OS doesn't need the shell for most of its work, but </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it is an interface between you and what your system can offer. </span></div><div aria-label="toggle video from It allows you to perform math, run tests, and execute applications." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It allows you to perform math, run tests, and execute applications. </span></div><div aria-label="toggle video from More importantly, it allows you to combine these operations and" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">More importantly, it allows you to combine these operations and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">connect applications to each other </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to perform complex and automated tasks. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-arowdh cds-3 cds-grid-item cds-48 cds-73" id="bkmrk-just-as-there-are-ma"><div><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Just as there are many Linux distributions," class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just as there are many Linux distributions, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">there are many different types of shells. </span></div><div aria-label="toggle video from We'll primarily focus on the Bash shell in this course." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We'll primarily focus on the Bash shell in this course. </span></div><div aria-label="toggle video from Let's continue to learn more about the shell." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's continue to learn more about the shell. </span></div></div></div></div></div></div></div></div><div class="cds-1 css-hcqebr cds-3 cds-grid-item cds-48 cds-66" id="bkmrk--3"><div class="cds-251 cds-formControl-root css-4p0j7c cds-254"><div class="css-1whdyhf" data-testid="visually-hidden">  
</div></div></div>

# Different types of shells

Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shells can be used for many common tasks. Previously, you were introduced to shells and their functions. This reading will review shells and introduce you to different types, including the one that you'll use in this course.

## Communicate through a shell

As you explored previously, the **shell** is the command-line interpreter. You can think of a shell as a translator between you and the computer system. Shells allow you to give commands to the computer and receive responses from it. When you enter a command into a shell, the shell executes many internal processes to interpret your command, send it to the kernel, and return your results.

## Types of shells

The many different types of Linux shells include the following:

<div class="rc-CML" dir="auto" id="bkmrk-bourne-again-shell-%28"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- Bourne-Again Shell (bash)
- C Shell (csh)
- Korn Shell (ksh)
- Enhanced C shell (tcsh)
- Z Shell (zsh)
- PowerShell (by microsoft also on windows)

</div></div></div></div></div>All Linux shells use common Linux commands, but they can differ in other features. For example, ksh and bash use the dollar sign (<var>$</var>) to indicate where users type in their commands. Other shells, such as zsh, use the percent sign (<var>%</var>) for this purpose.

## Bash

**Bash** is the default shell in most Linux distributions. It’s considered a user-friendly shell. You can use bash for basic Linux commands as well as larger projects.

Bash is also the most popular shell in the cybersecurity profession. You’ll use bash throughout this course as you learn and practice Linux commands.

## Key takeaways

Shells are a fundamental part of the Linux operating system. Shells allow you to give commands to the computer and receive responses from it. They can be thought of as a translator between you and your computer system. There are many different types of shells, but the bash shell is the most commonly used shell in the cybersecurity profession. You’ll learn how to enter Linux commands through the bash shell later in this course.

# Input and output in the shell

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hello-again%21-in-this"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hello again! In this video," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Hello again! In this video, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we're going to learn a little more about </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the shell and how to communicate with it. </span></div><div aria-label="toggle video from Communicating with a computer is" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Communicating with a computer is </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like having a conversation with your friend. </span></div><div aria-label="toggle video from One person asks a question" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One person asks a question </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the other person answers with a response. </span></div><div aria-label="toggle video from If you don't know the answer," class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If you don't know the answer, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you can just say you don't know the answer. </span></div><div aria-label="toggle video from When you communicate with the shell," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When you communicate with the shell, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the commands in the shell can take input, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">give output, or give error messages. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-explore-standa"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's explore standard input," class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's explore standard input, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">standard output, and error messages in more detail. </span></div><div aria-label="toggle video from Standard input consists of information" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Standard input consists of information </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">received by the OS via the command line. </span></div><div aria-label="toggle video from This is like you asking your friend" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is like you asking your friend </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a question during a conversation. </span></div><div aria-label="toggle video from The information is input from your keyboard to the shell." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The information is input from your keyboard to the shell. </span></div><div aria-label="toggle video from If the shell can interpret your request," class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If the shell can interpret your request, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it asks the kernel for the resources it </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">needs to execute the related task. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-take-a-look-at"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's take a look at this through echo," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's take a look at this through echo, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a Linux command that outputs a specified string of text. </span></div><div aria-label="toggle video from String data is data consisting" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">String data is data consisting </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of an ordered sequence of characters. </span></div><div aria-label="toggle video from In our example, we'll just have" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In our example, we'll just have </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it output the string of: hello. </span></div><div aria-label="toggle video from So, as input, we'll type: echo hello into the shell." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So, as input, we'll type: echo hello into the shell. </span></div><div aria-label="toggle video from Later, when we press enter, we'll get the output." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Later, when we press enter, we'll get the output. </span></div><div aria-label="toggle video from But before we do that," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But before we do that, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">let's first discuss the concept of output in more detail. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-standard-output-is-t"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Standard output is the information" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Standard output is the information </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">returned by the OS through the shell. </span></div><div aria-label="toggle video from In the same way that your friend" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In the same way that your friend </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">gives an answer to your question, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">output is a computer's response to the command you input. </span></div><div aria-label="toggle video from current lecture segment: Output is what you receive." class="rc-Phrase active css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Output is what you receive. </span></div><div aria-label="toggle video from Let's pick up where we left off in our example and send" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's pick up where we left off in our example and send </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the input of: echo hello to the OS by pressing enter. </span></div><div aria-label="toggle video from Immediately, the shell returns the output of: hello." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Immediately, the shell returns the output of: hello. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-finally%2C-standard-er"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Finally, standard error contains" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, standard error contains </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">error messages returned by the OS through the shell. </span></div><div aria-label="toggle video from Just like your friend might" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like your friend might </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">indicate that they can't answer a question, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the system responds with </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an error message if they can't respond to your command. </span></div><div aria-label="toggle video from Sometimes this might occur when we misspell" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Sometimes this might occur when we misspell </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a command or the system </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">doesn't know the response to the command. </span></div><div aria-label="toggle video from Other times, it might happen because we don't have" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Other times, it might happen because we don't have </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the appropriate permissions to perform a command. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-we%27ll-explore-anothe"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from We'll explore another example" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We'll explore another example </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that demonstrates standard error. </span></div><div aria-label="toggle video from Let's input: eco hello into the shell." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's input: eco hello into the shell. </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Notice I intentionally misspelled echo as e-c-o. </span></div><div aria-label="toggle video from When we press enter," class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When we press enter, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an error message appears. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--5"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-to-wrap-up%2C-we%27ve-co"><div aria-label="toggle video from To wrap up, we've covered" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To wrap up, we've covered </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the basics of communication with the shell. </span></div><div aria-label="toggle video from Communication with the shell can only go in one of" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Communication with the shell can only go in one of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">three ways: the system </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">receives a command—this is input; </span></div><div aria-label="toggle video from the system responds to the command and produces output;" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the system responds to the command and produces output; </span></div><div aria-label="toggle video from and finally, the system doesn't know how to respond," class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and finally, the system doesn't know how to respond, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">resulting in an error. </span></div><div aria-label="toggle video from Later, you'll become much more familiar with this as" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Later, you'll become much more familiar with this as </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we explore commands useful for security professionals. </span></div></div>

# Linux basics Wrap-up; Glossary terms from week 2

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-we%27ve-made-it-to-the"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from We've made it to the end of this section." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We've made it to the end of this section. </span></div><div aria-label="toggle video from Great work!" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Great work! </span></div><div aria-label="toggle video from Let's recap what you've just completed." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's recap what you've just completed. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-section%2C-you"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this section, you learned" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this section, you learned </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">about the Linux operating system. </span></div><div aria-label="toggle video from current lecture segment: We examined the architecture of Linux." class="rc-Phrase active css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We examined the architecture of Linux. </span></div><div aria-label="toggle video from In our exploration of" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In our exploration of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the different distributions of Linux, we </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discussed some of the most </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">widely used distros in security. </span></div><div aria-label="toggle video from You were introduced to KALI LINUX™, Ubuntu," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You were introduced to KALI LINUX™, Ubuntu, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Parrot, Red Hat, and CentOS distributions. </span></div><div aria-label="toggle video from Finally, you learned about the shell and" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, you learned about the shell and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">its role as an interpreter </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">between the user and operating system. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-congratulations%21-you"><div aria-label="toggle video from Congratulations! You're doing" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Congratulations! You're doing </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">great, and we have more useful topics to come. </span></div><div aria-label="toggle video from In the next part of the program," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In the next part of the program, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you'll learn specific commands to use within </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the shell while working as </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a security analyst. </span></div><div aria-label="toggle video from In the next part of the program," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's continue on. </span></div></div>---

## Terms and definitions from Course 4, Week 2

**Application:** A program that performs a specific task

**Bash:** The default shell in most Linux distributions

**CentOS:** An open-source distribution that is closely related to Red Hat

**Central Processing Unit (CPU):** A computer’s main processor, which is used to perform general computing tasks on a computer

**Command:** An instruction telling the computer to do something

**Digital forensics:** The practice of collecting and analyzing data to determine what has happened after an attack

**Directory:** A file that organizes where other files are stored

**Distributions:** The different versions of Linux

**File path:** The location of a file or directory

**Filesystem Hierarchy Standard (FHS):** The component of the Linux OS that organizes data

**Graphical user interface (GUI):** A user interface that uses icons on the screen to manage different tasks on the computer

**Hard drive:** A hardware component used for long-term memory

**Hardware**: The physical components of a computer

**Internal hardware:** The components required to run the computer

**Kali Linux ™**: An open-source distribution of Linux that is widely used in the security industry

**Kernel:** The component of the Linux OS that manages processes and memory

**Linux:** An open source operating system

**Package:** A piece of software that can be combined with other packages to form an application

**Package manager:** A tool that helps users install, manage, and remove packages or applications

**Parrot:** An open-source distribution that is commonly used for security

**Penetration test (pen test):** A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

**Peripheral devices:** Hardware components that are attached and controlled by the computer system

**Random Access Memory (RAM):** A hardware component used for short-term memory

**Red Hat® Enterprise Linux®** (also referred to simply as Red Hat in this course)**:** A subscription-based distribution of Linux built for enterprise use

**Shell:** The command-line interpreter

**Standard error:** An error message returned by the OS through the shell

**Standard input:** Information received by the OS via the command line

**Standard output:** Information returned by the OS through the shell

**String data:** Data consisting of an ordered sequence of characters

**Ubuntu:** An open-source, user-friendly distribution that is widely used in security and other industries

**User:** The person interacting with a computer