Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Linux architecture

[Completed] Professional Google Cyberse... Linux Basics

Let me start with a quick question that may seem unrelated to security. Do you have a favorite building? And what is it about its architecture that impresses you the most? The windows? The structure of the walls?  Just like buildings, operating sy...

Linux architecture explained

[Completed] Professional Google Cyberse... Linux Basics

Understanding the Linux architecture is important for a security analyst. When you understand how a system is organized, it makes it easier to understand how it functions. In this reading, you’ll learn more about the individual components in the Linux architec...

Linux distributions

[Completed] Professional Google Cyberse... Linux Basics

Let's learn a little bit more about Linux and what you need to know about this operating system when working as a security analyst. Linux is a very customizable operating system. Unlike other operating systems, there are different versions available ...

KALI LINUX ™

[Completed] Professional Google Cyberse... Linux Basics

In this section, we're going to cover a Linux distribution that's widely used in security and discuss KALI LINUX™. KALI LINUX™ is a trademark of Offensive Security and is Debian derived. This open-source distro was made specifically with penetration ...

More Linux distributions

[Completed] Professional Google Cyberse... Linux Basics

Previously, you were introduced to the different distributions of Linux. This included KALI LINUX ™. (KALI LINUX ™ is a trademark of OffSec.) In addition to KALI LINUX ™, there are multiple other Linux distributions that security analysts should be familiar wi...

Package managers for installing applications

[Completed] Professional Google Cyberse... Linux Basics

Previously, you learned about Linux distributions and that different distributions derive from different sources, such as Debian or Red Hat Enterprise Linux distribution. You were also introduced to package managers, and learned that Linux applications are com...

Vanilla os

[Completed] Professional Google Cyberse... Linux Basics

i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnome as a base and im thinking this is potentially one of the best options in the future if they stick with it. also theres only two updates per year and a roling rel...

Nix OS

[Completed] Professional Google Cyberse... Linux Basics

make page on nix os, alternative to vanilla os?

Resources for completing Linux labs

[Completed] Professional Google Cyberse... Linux Basics

This course features hands-on lab activities where you’ll have the opportunity to practice Linux commands in the terminal. You’ll use a platform called Qwiklabs to complete these labs. In this reading, you’ll learn how to use Qwiklabs. This reading first prov...

Introduction to the shell

[Completed] Professional Google Cyberse... Linux Basics

Welcome back! In this video, we're going to discuss the Linux shell. This part of the Linux architecture is where the action will happen for you as a security analyst. We introduced the shell with other components of the Linux OS earlier, but let's t...

Different types of shells

[Completed] Professional Google Cyberse... Linux Basics

Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shells can be used for many common tasks. Previously, you were introduced to shells and their functions. This reading will review shells and introduce you to different...

Input and output in the shell

[Completed] Professional Google Cyberse... Linux Basics

Hello again! In this video, we're going to learn a little more about the shell and how to communicate with it. Communicating with a computer is like having a conversation with your friend. One person asks a question and the other person answers with ...

Linux basics Wrap-up; Glossary terms from week 2

[Completed] Professional Google Cyberse... Linux Basics

We've made it to the end of this section. Great work! Let's recap what you've just completed. In this section, you learned about the Linux operating system. We examined the architecture of Linux. In our exploration of the diff...

Welcome to week 3; Linux commands via bash the bourne-again shell

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Learning to communicate in a new way can be exciting. Maybe you've learned a new language and can remember this feeling. Perhaps a lot of us share this excitement with young children as they are expanding their vocabulary. Others, including me, rem...

Core commands for navigation and reading files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As we continue our journey into utilizing the Linux command line, we'll focus on how to navigate the Linux file system. Now, I want you to imagin...

Navigate Linux and read file content

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’ll further explore the organization of the Linux Filesystem Hierarchy Standard, review several common Linux commands for navigation and reading file content, and l...

Permission commands

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Previously, you explored file permissions and the commands that you can use to display and change them.  In this reading, you’ll review these concepts and also focus on an example of how these commands work together when putting the principle of least privileg...

Find what you need with Linux

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigating the Linux file system, let's look at a couple of ways to find what you need within this system. As a security analyst, your work will likely involve filterin...

Filter content in Linux

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

In this reading, you’ll continue exploring Linux commands, which can help you filter for the information you need. You’ll learn a new Linux command, find, which can help you search files and directories for specific information. Filtering for information You...

Create and modify directories and files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Let's make some branches! What do I mean by that? Well, in a previous video, we discussed root directories and how other subdirectories branch off of the root directory. Let's think again about the file directory system as a tree. The subdirector...