Course

Linux Architecture

In this course, we describe the Linux architecture with the boot process. Linux currently has six steps in the boot process.

Course description

This course begins our exploration of the details of Linux with a look at Linux architecture. Beginning with the boot process, you’ll explore the structure of the Linux OS, permissions and an in-depth look at directories.

Syllabus

Introduction to Linux architecture

Video — 00:01:38

An introduction to Linux architecture and file system.

Linux Boot Process

Video — 00:08:33

Discuss the boot process for the Linux operating system.

Linux Kernel

Video — 00:06:53

Discuss the kernel, which is the heart of the Linux operating system.

Directories

Video — 00:06:13

Discuss directories in the Linux operating system.

Permissions

Video — 00:17:27

Discuss permissions in the Linux operating system.

Symbolic Links

Video — 00:08:13

Discuss symbolic links in the Linux operating system.

bin

Video — 00:05:51

Discuss the bin folder in the Linux operating system.

boot

Video — 00:07:40

Discuss the boot folder in the Linux operating system.

cdrom

Video — 00:04:23

Discuss the cdrom folder in the Linux operating system.

dev

Video — 00:12:18

Discuss the dev folder in the Linux operating system.

etc

Video — 00:13:57

Discuss the etc folder in the Linux operating system.

home

Video — 00:05:34

Discuss the home folder in the Linux operating system.

lib

Video — 00:05:02

Discuss the lib folder in the Linux operating system.

lib64

Video — 00:05:59

Discuss the lib64 folder in the Linux operating system.

lost + found

Video — 00:04:39

Discuss the lost + found folder in the Linux operating system.

media

Video — 00:04:01

Discuss the media folder in the Linux operating system.

mnt

Video — 00:02:30

Discuss the mnt folder in the Linux operating system.

opt

Video — 00:06:49

Discuss the opt folder in the Linux operating system.

proc

Video — 00:07:12

Discuss the proc folder in the Linux operating system.

root

Video — 00:04:24

Discuss the root folder in the Linux operating system.

run

Video — 00:07:29

Discuss the run folder in the Linux operating system.

sbin

Video — 00:05:49

Discuss the sbin folder in the Linux operating system.

srv

Video — 00:01:57

Discuss the srv folder in the Linux operating system.

sys

Video — 00:05:58

Discuss the sys folder in the Linux operating system.

tmp

Video — 00:05:48

Discuss the tmp folder in the Linux operating system.

usr

Video — 00:06:03

Discuss the usr folder in the Linux operating system.

var

Video — 00:05:32

Discuss the var folder in the Linux operating system.

swapfile

Video — 00:05:19

Discuss the swapfile in the Linux operating system.

vmlinuz

Video — 00:02:02

Discuss the vmlinuz file in the Linux operating system.

Meet the author

Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences – As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Cyber Operator

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
Technical Skills Development - Small Business, Mid-Market
Top 20 Online Learning Library