Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

987 total results found

Nix OS

[Completed] Professional Google Cyberse... Linux Basics

make page on nix os, alternative to vanilla os?

Resources for completing Linux labs

[Completed] Professional Google Cyberse... Linux Basics

This course features hands-on lab activities where you’ll have the opportunity to practice Linux commands in the terminal. You’ll use a platform called Qwiklabs to complete these labs. In this reading, you’ll learn how to use Qwiklabs. This reading first prov...

Introduction to the shell

[Completed] Professional Google Cyberse... Linux Basics

Welcome back! In this video, we're going to discuss the Linux shell. This part of the Linux architecture is where the action will happen for you as a security analyst. We introduced the shell with other components of the Linux OS earlier, but let's t...

Different types of shells

[Completed] Professional Google Cyberse... Linux Basics

Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shells can be used for many common tasks. Previously, you were introduced to shells and their functions. This reading will review shells and introduce you to different...

Input and output in the shell

[Completed] Professional Google Cyberse... Linux Basics

Hello again! In this video, we're going to learn a little more about the shell and how to communicate with it. Communicating with a computer is like having a conversation with your friend. One person asks a question and the other person answers with ...

Linux basics Wrap-up; Glossary terms from week 2

[Completed] Professional Google Cyberse... Linux Basics

We've made it to the end of this section. Great work! Let's recap what you've just completed. In this section, you learned about the Linux operating system. We examined the architecture of Linux. In our exploration of the diff...

Welcome to week 3; Linux commands via bash the bourne-again shell

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Learning to communicate in a new way can be exciting. Maybe you've learned a new language and can remember this feeling. Perhaps a lot of us share this excitement with young children as they are expanding their vocabulary. Others, including me, rem...

Core commands for navigation and reading files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As we continue our journey into utilizing the Linux command line, we'll focus on how to navigate the Linux file system. Now, I want you to imagin...

Navigate Linux and read file content

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’ll further explore the organization of the Linux Filesystem Hierarchy Standard, review several common Linux commands for navigation and reading file content, and l...

Permission commands

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Previously, you explored file permissions and the commands that you can use to display and change them.  In this reading, you’ll review these concepts and also focus on an example of how these commands work together when putting the principle of least privileg...

Find what you need with Linux

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigating the Linux file system, let's look at a couple of ways to find what you need within this system. As a security analyst, your work will likely involve filterin...

Filter content in Linux

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

In this reading, you’ll continue exploring Linux commands, which can help you filter for the information you need. You’ll learn a new Linux command, find, which can help you search files and directories for specific information. Filtering for information You...

Create and modify directories and files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Let's make some branches! What do I mean by that? Well, in a previous video, we discussed root directories and how other subdirectories branch off of the root directory. Let's think again about the file directory system as a tree. The subdirector...

Manage directories and files

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Previously, you explored how to manage the file system using Linux commands. The following commands were introduced: mkdir, rmdir, touch, rm, mv, and cp. In this reading, you’ll review these commands, the nano text editor, and learn another way to write to fil...

File permissions and ownership

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Hi there. It's great to have you back! Let's continue to learn more about how to work in Linux as a security analyst. In this video, we'll explore file and directory permissions. We'll learn how Linux represents permissions and how you can check fo...

File permissions and ownership

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Hi there. It's great to have you back! Let's continue to learn more about how to work in Linux as a security analyst. In this video, we'll explore file and directory permissions. We'll learn how Linux represents permissions and how you can check fo...

Change permissions

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Hi there! In the previous video, you learned how to check permissions for a user. In this video, we're going to learn about changing permissions. When working as a security analyst, there may be many reasons to change permissions fo...

Permission commands

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Previously, you explored file permissions and the commands that you can use to display and change them.  In this reading, you’ll review these concepts and also focus on an example of how these commands work together when putting the principle of least privileg...

Portfolio Activity: Use Linux commands to manage file permissions

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Quiz30 minutes • 30 min Submit your assignment Due July 23, 11:59 PM EDTJul 23, 11:59 PM EDT Receive grade To Pass 80% or higher Your grade -Not available ...

Add and delete users

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Welcome back! In this video, we are going to discuss adding and deleting users. This is related to the concept of authentication. Authentication is the process of a user proving that they are who they say they are in the system. J...