Recently Updated Pages
Different types of shells
Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shel...
Introduction to the shell
Welcome back! In this video, we're going to discuss the Linux shell. This part of the Lin...
Resources for completing Linux labs
This course features hands-on lab activities where you’ll have the opportunity to practice Linux ...
Nix OS
make page on nix os, alternative to vanilla os?
Vanilla os
i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnom...
More Linux distributions
Previously, you were introduced to the different distributions of Linux. This included KALI LINUX...
Package managers for installing applications
Previously, you learned about Linux distributions and that different distributions derive from di...
KALI LINUX ™
In this section, we're going to cover a Linux distribution that's widely used in security a...
Linux distributions
Let's learn a little bit more about Linux and what you need to know about this operating sy...
Phil: Learn and grow in the cybersecurity field
Hi, I'm Phil I'm the Chief Information Security Officer for Google Cloud, and a big part of that ...
Linux architecture explained
Understanding the Linux architecture is important for a security analyst. When you understand how...
Linux architecture
Let me start with a quick question that may seem unrelated to security. Do you have a fav...
Welcome to week 2; introduction to linux
Welcome back! We have another important topic to explore.Previously, you learned aboutoperating s...
Wrap-up; Glossary terms from week 1
We did it! What a great section of learning! The best thing is that we did this togethe...
Ellen: My path into cybersecurity
My name is Ellen and I am a security engineering manager at Google focused in on how Google use...
The command line in use
Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...
GUI versus CLI
Now that you've learned the inner workings of computers, let's discuss how users and operat...
Virtualization technology
You've explored a lot about operating systems. One more aspect to consider is that operating syst...
Resource allocation via the OS
Now we're ready to discuss a different aspect of your operating system. Not only does the...
Requests to the operating system
Operating systems are a critical component of a computer. They make connections between applicati...