Advanced Search
Search Results
987 total results found
Nix OS
make page on nix os, alternative to vanilla os?
Resources for completing Linux labs
This course features hands-on lab activities where you’ll have the opportunity to practice Linux commands in the terminal. You’ll use a platform called Qwiklabs to complete these labs. In this reading, you’ll learn how to use Qwiklabs. This reading first prov...
Introduction to the shell
Welcome back! In this video, we're going to discuss the Linux shell. This part of the Linux architecture is where the action will happen for you as a security analyst. We introduced the shell with other components of the Linux OS earlier, but let's t...
Different types of shells
Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shells can be used for many common tasks. Previously, you were introduced to shells and their functions. This reading will review shells and introduce you to different...
Input and output in the shell
Hello again! In this video, we're going to learn a little more about the shell and how to communicate with it. Communicating with a computer is like having a conversation with your friend. One person asks a question and the other person answers with ...
Linux basics Wrap-up; Glossary terms from week 2
We've made it to the end of this section. Great work! Let's recap what you've just completed. In this section, you learned about the Linux operating system. We examined the architecture of Linux. In our exploration of the diff...
Welcome to week 3; Linux commands via bash the bourne-again shell
Learning to communicate in a new way can be exciting. Maybe you've learned a new language and can remember this feeling. Perhaps a lot of us share this excitement with young children as they are expanding their vocabulary. Others, including me, rem...
Core commands for navigation and reading files
Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As we continue our journey into utilizing the Linux command line, we'll focus on how to navigate the Linux file system. Now, I want you to imagin...
Navigate Linux and read file content
In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’ll further explore the organization of the Linux Filesystem Hierarchy Standard, review several common Linux commands for navigation and reading file content, and l...
Permission commands
Previously, you explored file permissions and the commands that you can use to display and change them. In this reading, you’ll review these concepts and also focus on an example of how these commands work together when putting the principle of least privileg...
Find what you need with Linux
Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigating the Linux file system, let's look at a couple of ways to find what you need within this system. As a security analyst, your work will likely involve filterin...
Filter content in Linux
In this reading, you’ll continue exploring Linux commands, which can help you filter for the information you need. You’ll learn a new Linux command, find, which can help you search files and directories for specific information. Filtering for information You...
Create and modify directories and files
Let's make some branches! What do I mean by that? Well, in a previous video, we discussed root directories and how other subdirectories branch off of the root directory. Let's think again about the file directory system as a tree. The subdirector...
Manage directories and files
Previously, you explored how to manage the file system using Linux commands. The following commands were introduced: mkdir, rmdir, touch, rm, mv, and cp. In this reading, you’ll review these commands, the nano text editor, and learn another way to write to fil...
File permissions and ownership
Hi there. It's great to have you back! Let's continue to learn more about how to work in Linux as a security analyst. In this video, we'll explore file and directory permissions. We'll learn how Linux represents permissions and how you can check fo...
File permissions and ownership
Hi there. It's great to have you back! Let's continue to learn more about how to work in Linux as a security analyst. In this video, we'll explore file and directory permissions. We'll learn how Linux represents permissions and how you can check fo...
Change permissions
Hi there! In the previous video, you learned how to check permissions for a user. In this video, we're going to learn about changing permissions. When working as a security analyst, there may be many reasons to change permissions fo...
Permission commands
Previously, you explored file permissions and the commands that you can use to display and change them. In this reading, you’ll review these concepts and also focus on an example of how these commands work together when putting the principle of least privileg...
Portfolio Activity: Use Linux commands to manage file permissions
Quiz30 minutes • 30 min Submit your assignment Due July 23, 11:59 PM EDTJul 23, 11:59 PM EDT Receive grade To Pass 80% or higher Your grade -Not available ...
Add and delete users
Welcome back! In this video, we are going to discuss adding and deleting users. This is related to the concept of authentication. Authentication is the process of a user proving that they are who they say they are in the system. J...