Course description
In this longest course in this path, we explore a wide assortment of commands to navigate and manipulate files and directories. The student will get to grips with the most important commands in Linux, including man, sed, grep, cut and pipe. Finally, we look at system commands for the Linux operating system.

Syllabus
Introduction to Linux commands
Video — 00:02:06
A look at the agenda for this course.
Man(ual)
Video — 00:06:37
Discuss the manual in the Linux operating system.
Standard input
Video — 00:04:58
Discuss standard input in the Linux operating system.
Standard output
Video — 00:06:46
Discuss standard output in the Linux operating system.
Standard error
Video — 00:04:15
Discuss standard error in the Linux operating system.
Print working directory (pwd)
Video — 00:04:54
Discuss print working directory (pwd) in the Linux operating system.
Listing
Video — 00:06:47
Discuss listing in the Linux operating system.
Touch
Video — 00:05:29
Discuss touch in the Linux operating system.
Chmod
Video — 00:12:44
Discuss chmod in the Linux operating system.vvvv
Chown
Video — 00:12:02
Discuss chown in the Linux operating system.
Chgrp
Video — 00:08:12
Discuss chgrp in the Linux operating system.
Sudo
Video — 00:18:57
Discuss sudo in the Linux operating system.
Su
Video — 00:09:17
Discuss su in the Linux operating system.
Make directory
Video — 00:05:46
Discuss make directory in the Linux operating system.
Remove directory
Video — 00:06:36
Discuss remove directory in the Linux operating system.
Cat
Video — 00:08:22
Discuss cat in the Linux operating system.
Copy
Video — 00:12:07
Discuss copy in the Linux operating system.
Move
Video — 00:09:44
Discuss move in the Linux operating system.
Find
Video — 00:10:16
Discuss find in the Linux operating system.
Locate
Video — 00:09:47
Discuss locate in the Linux operating system.
More
Video — 00:10:47
Discuss more in the Linux operating system.
Less
Video — 00:07:49
Discuss less in the Linux operating system.
Sed
Video — 00:14:04
Discuss sed in the Linux operating system.
Grep
Video — 00:09:10
Discuss grep in the Linux operating system.
Pipe
Video — 00:11:40
Discuss pipe in the Linux operating system.
Cut
Video — 00:10:51
Discuss cut in the Linux operating system.
Df
Video — 00:12:07
Discuss df in the Linux operating system.
Du
Video — 00:06:30
Discuss du in the Linux operating system.
Head
Video — 00:06:35
Discuss head in the Linux operating system.
Tail
Video — 00:09:37
Discuss tail in the Linux operating system.
Diff
Video — 00:11:56
Discuss diff in the Linux operating system.
Tar
Video — 00:13:50
Discuss tar in the Linux operating system.
Wget
Video — 00:12:39
Discuss wget in the Linux operating system.
Top
Video — 00:08:03
Discuss top in the Linux operating system.
Uname
Video — 00:05:26
Discuss uname in the Linux operating system.
History
Video — 00:08:31
Discuss history in the Linux operating system.
Zip
Video — 00:10:22
Discuss zip in the Linux operating system.
Unzip
Video — 00:15:41
Discuss unzip in the Linux operating system.

Meet the author
Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences – As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- Exploitation Analyst
- Cyber Operator
- Data Analyst
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client
Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Award-winning training that you can trust




