Recently Updated Pages
Security domains cybersecurity analysts need to know
As an analyst, you can explore various areas of cybersecurity that interest you. One way to exp...
Create and modify directories and files
Let's make some branches! What do I mean by that? Well, in a previous video, we discuss...
Filter content in Linux
In this reading, you’ll continue exploring Linux commands, which can help you filter for the info...
Find what you need with Linux
Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigat...
Navigate Linux and read file content
In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’...
Core commands for navigation and reading files
Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As...
Welcome to week 3; Linux commands via bash the bourne-again shell
Learning to communicate in a new way can be exciting. Maybe you've learned a new language...
Linux basics Wrap-up; Glossary terms from week 2
We've made it to the end of this section. Great work! Let's recap what you've just comp...
Input and output in the shell
Hello again! In this video, we're going to learn a little more about the shell and how to c...
Different types of shells
Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shel...
Introduction to the shell
Welcome back! In this video, we're going to discuss the Linux shell. This part of the Lin...
Resources for completing Linux labs
This course features hands-on lab activities where you’ll have the opportunity to practice Linux ...
Nix OS
make page on nix os, alternative to vanilla os?
Vanilla os
i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnom...
More Linux distributions
Previously, you were introduced to the different distributions of Linux. This included KALI LINUX...
Package managers for installing applications
Previously, you learned about Linux distributions and that different distributions derive from di...
KALI LINUX ™
In this section, we're going to cover a Linux distribution that's widely used in security a...
Linux distributions
Let's learn a little bit more about Linux and what you need to know about this operating sy...
Phil: Learn and grow in the cybersecurity field
Hi, I'm Phil I'm the Chief Information Security Officer for Google Cloud, and a big part of that ...
Linux architecture explained
Understanding the Linux architecture is important for a security analyst. When you understand how...