Skip to main content

Course wrap-up

You made it to the end of this course!
Congratulations—you did it!
I hope you are proud of all you learned.
The focus of this course was computing basics.
Understanding the basics of
computing is a valuable skill as
you transition into your career as a security analyst.

Let's recap what you learned in this course.
We first focused on operating systems
and how they relate to applications and hardware.
Understanding how the system you're protecting
works is essential for doing your job effectively.
That brings us to the Linux operating system.
When working in the security profession,
familiarity with Linux is important.
We first discussed this architecture
and various distributions.
Then, we used a Linux command line to carry
out tasks you might encounter as a security analyst.
Finally, we looked at
another useful tool and used SQL to query databases.

After this course, I
hope you have a better understanding of
how these foundations of computing support
a security analyst in their daily work.
I also hope you continue your path with this program.
There are a lot of other useful
and exciting topics ahead.
Once again, congratulations.
You've finished another course.
Building skills is something you should be proud of.
Keep it up as you progress through this program.

Terms and definitions from Course 4


A

Absolute file path: The full file path, which starts from the root

Application: A program that performs a specific task

Argument (Linux): Specific information needed by a command

Authentication: The process of verifying who someone is

Authorization: The concept of granting access to specific resources in a system

B

Bash: The default shell in most Linux distributions

Basic Input/Output System (BIOS): A microchip that contains loading instructions for the computer and is prevalent in older systems 

Bootloader: A software program that boots the operating system

C

CentOS: An open-source distribution that is closely related to Red Hat

Central Processing Unit (CPU): A computer’s main processor, which is used to perform general computing tasks on a computer

Command: An instruction telling the computer to do something

Command-line interface (CLI): A text-based user interface that uses commands to interact with the computer

D

Database: An organized collection of information or data

Date and time data: Data representing a date and/or time

Digital forensics: The practice of collecting and analyzing data to determine what has happened after an attack

Directory: A file that organizes where other files are stored

Distributions: The different versions of Linux

E

Exclusive operator: An operator that does not include the value of comparison

F

File path: The location of a file or directory

Filesystem Hierarchy Standard (FHS): The component of the Linux OS that organizes data

Filtering: Selecting data that match a certain condition

Foreign key: A column in a table that is a primary key in another table 

G

Graphical user interface (GUI): A user interface that uses icons on the screen to manage different tasks on the computer

H

Hard drive: A hardware component used for long-term memory

Hardware: The physical components of a computer

I

Inclusive operator: An operator that includes the value of comparison

Internal hardware: The components required to run the computer

K

Kali Linux ™: An open-source distribution of Linux that is widely used in the security industry

Kernel: The component of the Linux OS that manages processes and memory

L

Legacy operating system: An operating system that is outdated but still being used

Linux: An open-source operating system

Log: A record of events that occur within an organization's systems

N

nano: A command-line file editor that is available by default in many Linux distributions

Numeric data: Data consisting of numbers

O

Operating system (OS): The interface between computer hardware and the user

Operator: A symbol or keyword that represents an operation

Options: Input that modifies the behavior of a command

P

Package: A piece of software that can be combined with other packages to form an application

Package manager: A tool that helps users install, manage, and remove packages or applications

Parrot: An open-source distribution that is commonly used for security

Penetration test (pen test): A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

Peripheral devices: Hardware components that are attached and controlled by the computer system

Permissions: The type of access granted for a file or directory

Primary key: A column where every row has a unique entry

Principle of least privilege: The concept of granting only the minimal access and authorization required to complete a task or function


Q

Query: A request for data from a database table or a combination of tables

R

Random Access Memory (RAM): A hardware component used for short-term memory

Red Hat® Enterprise Linux® (also referred to simply as Red Hat in this course): A subscription-based distribution of Linux built for enterprise use

Relational database: A structured database containing tables that are related to each other

Relative file path: A file path that starts from the user's current directory

Root directory: The highest-level directory in Linux

Root user (or superuser): A user with elevated privileges to modify the system

S

Shell: The command-line interpreter 

SQL (Structured Query Language): A programming language used to create, interact with, and request information from a database

Standard error: An error message returned by the OS through the shell

Standard input: Information received by the OS via the command line

Standard output: Information returned by the OS through the shell

String data: Data consisting of an ordered sequence of characters

Syntax: The rules that determine what is correctly structured in a computing language

U

Ubuntu: An open-source, user-friendly distribution that is widely used in security and other industries

Unified Extensible Firmware Interface (UEFI): A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems

User: The person interacting with a computer 

User interface: A program that allows the user to control the functions of the operating system

V

Virtual machine (VM): A virtual version of a physical computer

W

Wildcard: A special character that can be substituted with any other character