Course

Linux Commands

In this course, we describe core Linux commands to get students up and running in the Linux operating system.

Course description

In this longest course in this path, we explore a wide assortment of commands to navigate and manipulate files and directories. The student will get to grips with the most important commands in Linux, including man, sed, grep, cut and pipe. Finally, we look at system commands for the Linux operating system.

Syllabus

Introduction to Linux commands

Video — 00:02:06

A look at the agenda for this course.

Man(ual)

Video — 00:06:37

Discuss the manual in the Linux operating system.

Standard input

Video — 00:04:58

Discuss standard input in the Linux operating system.

Standard output

Video — 00:06:46

Discuss standard output in the Linux operating system.

Standard error

Video — 00:04:15

Discuss standard error in the Linux operating system.

Print working directory (pwd)

Video — 00:04:54

Discuss print working directory (pwd) in the Linux operating system.

Listing

Video — 00:06:47

Discuss listing in the Linux operating system.

Touch

Video — 00:05:29

Discuss touch in the Linux operating system.

Chmod

Video — 00:12:44

Discuss chmod in the Linux operating system.vvvv

Chown

Video — 00:12:02

Discuss chown in the Linux operating system.

Chgrp

Video — 00:08:12

Discuss chgrp in the Linux operating system.

Sudo

Video — 00:18:57

Discuss sudo in the Linux operating system.

Su

Video — 00:09:17

Discuss su in the Linux operating system.

Make directory

Video — 00:05:46

Discuss make directory in the Linux operating system.

Remove directory

Video — 00:06:36

Discuss remove directory in the Linux operating system.

Cat

Video — 00:08:22

Discuss cat in the Linux operating system.

Copy

Video — 00:12:07

Discuss copy in the Linux operating system.

Move

Video — 00:09:44

Discuss move in the Linux operating system.

Find

Video — 00:10:16

Discuss find in the Linux operating system.

Locate

Video — 00:09:47

Discuss locate in the Linux operating system.

More

Video — 00:10:47

Discuss more in the Linux operating system.

Less

Video — 00:07:49

Discuss less in the Linux operating system.

Sed

Video — 00:14:04

Discuss sed in the Linux operating system.

Grep

Video — 00:09:10

Discuss grep in the Linux operating system.

Pipe

Video — 00:11:40

Discuss pipe in the Linux operating system.

Cut

Video — 00:10:51

Discuss cut in the Linux operating system.

Df

Video — 00:12:07

Discuss df in the Linux operating system.

Du

Video — 00:06:30

Discuss du in the Linux operating system.

Head

Video — 00:06:35

Discuss head in the Linux operating system.

Tail

Video — 00:09:37

Discuss tail in the Linux operating system.

Diff

Video — 00:11:56

Discuss diff in the Linux operating system.

Tar

Video — 00:13:50

Discuss tar in the Linux operating system.

Wget

Video — 00:12:39

Discuss wget in the Linux operating system.

Top

Video — 00:08:03

Discuss top in the Linux operating system.

Uname

Video — 00:05:26

Discuss uname in the Linux operating system.

History

Video — 00:08:31

Discuss history in the Linux operating system.

Zip

Video — 00:10:22

Discuss zip in the Linux operating system.

Unzip

Video — 00:15:41

Discuss unzip in the Linux operating system.

Meet the author

Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences – As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Cyber Operator
  • Data Analyst

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
Technical Skills Development - Small Business, Mid-Market
Top 20 Online Learning Library