Course description
This course begins our exploration of the details of Linux with a look at Linux architecture. Beginning with the boot process, you’ll explore the structure of the Linux OS, permissions and an in-depth look at directories.

Syllabus
Introduction to Linux architecture
Video — 00:01:38
An introduction to Linux architecture and file system.
Linux Boot Process
Video — 00:08:33
Discuss the boot process for the Linux operating system.
Linux Kernel
Video — 00:06:53
Discuss the kernel, which is the heart of the Linux operating system.
Directories
Video — 00:06:13
Discuss directories in the Linux operating system.
Permissions
Video — 00:17:27
Discuss permissions in the Linux operating system.
Symbolic Links
Video — 00:08:13
Discuss symbolic links in the Linux operating system.
bin
Video — 00:05:51
Discuss the bin folder in the Linux operating system.
boot
Video — 00:07:40
Discuss the boot folder in the Linux operating system.
cdrom
Video — 00:04:23
Discuss the cdrom folder in the Linux operating system.
dev
Video — 00:12:18
Discuss the dev folder in the Linux operating system.
etc
Video — 00:13:57
Discuss the etc folder in the Linux operating system.
home
Video — 00:05:34
Discuss the home folder in the Linux operating system.
lib
Video — 00:05:02
Discuss the lib folder in the Linux operating system.
lib64
Video — 00:05:59
Discuss the lib64 folder in the Linux operating system.
lost + found
Video — 00:04:39
Discuss the lost + found folder in the Linux operating system.
media
Video — 00:04:01
Discuss the media folder in the Linux operating system.
mnt
Video — 00:02:30
Discuss the mnt folder in the Linux operating system.
opt
Video — 00:06:49
Discuss the opt folder in the Linux operating system.
proc
Video — 00:07:12
Discuss the proc folder in the Linux operating system.
root
Video — 00:04:24
Discuss the root folder in the Linux operating system.
run
Video — 00:07:29
Discuss the run folder in the Linux operating system.
sbin
Video — 00:05:49
Discuss the sbin folder in the Linux operating system.
srv
Video — 00:01:57
Discuss the srv folder in the Linux operating system.
sys
Video — 00:05:58
Discuss the sys folder in the Linux operating system.
tmp
Video — 00:05:48
Discuss the tmp folder in the Linux operating system.
usr
Video — 00:06:03
Discuss the usr folder in the Linux operating system.
var
Video — 00:05:32
Discuss the var folder in the Linux operating system.
swapfile
Video — 00:05:19
Discuss the swapfile in the Linux operating system.
vmlinuz
Video — 00:02:02
Discuss the vmlinuz file in the Linux operating system.

Meet the author
Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences – As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- Exploitation Analyst
- Cyber Operator
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client
Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Award-winning training that you can trust




