Skip to main content

Recently Updated Pages

Security domains cybersecurity analysts need to know

[Completed] Professional Google Cyberse... Explore the CISSP security domains

As an analyst, you can explore various areas of cybersecurity that interest you. One way to exp...

Updated 1 year ago by naruzkurai

Create and modify directories and files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Let's make some branches! What do I mean by that? Well, in a previous video, we discuss...

Updated 1 year ago by naruzkurai

Filter content in Linux

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

In this reading, you’ll continue exploring Linux commands, which can help you filter for the info...

Updated 1 year ago by naruzkurai

Find what you need with Linux

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigat...

Updated 1 year ago by naruzkurai

Navigate Linux and read file content

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’...

Updated 1 year ago by naruzkurai

Core commands for navigation and reading files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As...

Updated 1 year ago by naruzkurai

Welcome to week 3; Linux commands via bash the bourne-again shell

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Learning to communicate in a new way can be exciting. Maybe you've learned a new language...

Updated 1 year ago by naruzkurai

Linux basics Wrap-up; Glossary terms from week 2

[Completed] Professional Google Cyberse... Linux Basics

We've made it to the end of this section. Great work! Let's recap what you've just comp...

Updated 1 year ago by naruzkurai

Input and output in the shell

[Completed] Professional Google Cyberse... Linux Basics

Hello again! In this video, we're going to learn a little more about the shell and how to c...

Updated 1 year ago by naruzkurai

Different types of shells

[Completed] Professional Google Cyberse... Linux Basics

Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shel...

Updated 1 year ago by naruzkurai

Introduction to the shell

[Completed] Professional Google Cyberse... Linux Basics

Welcome back! In this video, we're going to discuss the Linux shell. This part of the Lin...

Updated 1 year ago by naruzkurai

Resources for completing Linux labs

[Completed] Professional Google Cyberse... Linux Basics

This course features hands-on lab activities where you’ll have the opportunity to practice Linux ...

Updated 1 year ago by naruzkurai

Nix OS

[Completed] Professional Google Cyberse... Linux Basics

make page on nix os, alternative to vanilla os?

Updated 1 year ago by naruzkurai

Vanilla os

[Completed] Professional Google Cyberse... Linux Basics

i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnom...

Updated 1 year ago by naruzkurai

More Linux distributions

[Completed] Professional Google Cyberse... Linux Basics

Previously, you were introduced to the different distributions of Linux. This included KALI LINUX...

Updated 1 year ago by naruzkurai

Package managers for installing applications

[Completed] Professional Google Cyberse... Linux Basics

Previously, you learned about Linux distributions and that different distributions derive from di...

Updated 1 year ago by naruzkurai

KALI LINUX ™

[Completed] Professional Google Cyberse... Linux Basics

In this section, we're going to cover a Linux distribution that's widely used in security a...

Updated 1 year ago by naruzkurai

Linux distributions

[Completed] Professional Google Cyberse... Linux Basics

Let's learn a little bit more about Linux and what you need to know about this operating sy...

Updated 1 year ago by naruzkurai

Phil: Learn and grow in the cybersecurity field

[Completed] Professional Google Cyberse... stories

Hi, I'm Phil I'm the Chief Information Security Officer for Google Cloud, and a big part of that ...

Updated 1 year ago by naruzkurai

Linux architecture explained

[Completed] Professional Google Cyberse... Linux Basics

Understanding the Linux architecture is important for a security analyst. When you understand how...

Updated 1 year ago by naruzkurai