Course

Jobs and process in Linux

In this course, we discuss jobs and processes in the Linux operating system.

Course description

In Linux, every command and program has a process. There are two types of processes: parent processes and child processes. This course explores processes, jobs, process states and more.

Syllabus

Jobs and process in Linux

Video — 00:01:52

A look at the agenda for this section.

Processes in Linux

Video — 00:19:06

Discuss process in the Linux operating system.

Process states

Video — 00:05:51

Discuss process states in the Linux operating system.

Process signals

Video — 00:11:10

Discuss process signals in Linux operating systems.

Foreground/background processes

Video — 00:03:06

Discuss foreground/background processes in Linux operating systems.

Jobs in Linux

Video — 00:08:03

Discuss jobs in the Linux operating system.

Meet the author

Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences – As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
Technical Skills Development - Small Business, Mid-Market
Top 20 Online Learning Library