Linux Commands Course

In this course, we describe core Linux commands to get students up and running in the Linux operating system.

5 hours, 51 minutes

Course description

In this longest course in this path, we explore a wide assortment of commands to navigate and manipulate files and directories. The student will get to grips with the most important commands in Linux, including man, sed, grep, cut and pipe. Finally, we look at system commands for the Linux operating system.

Syllabus

Unzip

Video - 00:16:00

Discuss unzip in the Linux operating system.
Zip

Video - 00:10:00

Discuss zip in the Linux operating system.
History

Video - 00:09:00

Discuss history in the Linux operating system.
Uname

Video - 00:05:00

Discuss uname in the Linux operating system.
Top

Video - 00:08:00

Discuss top in the Linux operating system.
Wget

Video - 00:13:00

Discuss wget in the Linux operating system.
Tar

Video - 00:14:00

Discuss tar in the Linux operating system.
Diff

Video - 00:12:00

Discuss diff in the Linux operating system.
Tail

Video - 00:10:00

Discuss tail in the Linux operating system.
Head

Video - 00:07:00

Discuss head in the Linux operating system.
Du

Video - 00:07:00

Discuss du in the Linux operating system.
Df

Video - 00:12:00

Discuss df in the Linux operating system.
Cut

Video - 00:11:00

Discuss cut in the Linux operating system.
Pipe

Video - 00:12:00

Discuss pipe in the Linux operating system.
Grep

Video - 00:09:00

Discuss grep in the Linux operating system.
Sed

Video - 00:14:00

Discuss sed in the Linux operating system.
Less

Video - 00:08:00

Discuss less in the Linux operating system.
More

Video - 00:11:00

Discuss more in the Linux operating system.
Locate

Video - 00:10:00

Discuss locate in the Linux operating system.
Find

Video - 00:10:00

Discuss find in the Linux operating system.
Move

Video - 00:10:00

Discuss move in the Linux operating system.
Copy

Video - 00:12:00

Discuss copy in the Linux operating system.
Cat

Video - 00:08:00

Discuss cat in the Linux operating system.
Remove directory

Video - 00:07:00

Discuss remove directory in the Linux operating system.
Make directory

Video - 00:06:00

Discuss make directory in the Linux operating system.
Su

Video - 00:09:00

Discuss su in the Linux operating system.
Sudo

Video - 00:19:00

Discuss sudo in the Linux operating system.
Chgrp

Video - 00:08:00

Discuss chgrp in the Linux operating system.
Chown

Video - 00:12:00

Discuss chown in the Linux operating system.
Chmod

Video - 00:13:00

Discuss chmod in the Linux operating system.vvvv
Touch

Video - 00:05:00

Discuss touch in the Linux operating system.
Listing

Video - 00:07:00

Discuss listing in the Linux operating system.
Print working directory (pwd)

Video - 00:05:00

Discuss print working directory (pwd) in the Linux operating system.
Standard error

Video - 00:04:00

Discuss standard error in the Linux operating system.
Standard output

Video - 00:07:00

Discuss standard output in the Linux operating system.
Standard input

Video - 00:05:00

Discuss standard input in the Linux operating system.
Man(ual)

Video - 00:07:00

Discuss the manual in the Linux operating system.
Introduction to Linux commands

Video - 00:02:00

A look at the agenda for this course.

Meet the author

Jasmine Jackson

Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences - As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Cyber Operator
  • Data Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust