Systems Administration – File and Directory Operations
Learn about file and directory operations as you practice in the Linux Cyber Range.
Cyber Range
The Systems Administration lab will walk students through some of the basic functionalities and responsibilities of Linux system administration. These include provisioning and de-provisioning users, assigning special permissions to users, interacting with the VI editor, and the basics of the Bash shell among others.
The labs
Systems Administration – File and Directory Operations
Learn about file and directory operations as you practice in the Linux Cyber Range.
Systems Administration – Access Control Lists
Learn about access control lists (ACL), including file and directory ACLs, and default ACLs, as you practice in the Linux Cyber Range.
Systems Administration – Bash Shell
Learn about Bash Shell as you practice in the Linux Cyber Range.
Systems Administration – Basic Commands and Help
Learn basic RHEL commands and gain hands-on experience as you practice in the Cyber Range.
Systems Administration – Special Permissions
Learn about special permissions as you practice in this Cyber Range.
Systems Administration – File and Directory Permissions
Learn about file and directory permissions as you practice in the Linux Cyber Range.
Systems Administration – Using the VI editor
Learn about the visual editor as you practice in the Linux Cyber Range.
Systems Administration – Managing Groups
Learn about managing user and group accounts, including creating, deleting and passwords, as you practice in the Linux Cyber Range.
Systems Administration – Login History and System Information
Learn about login user and group info, history info and system info as you practice in the Linux Cyber Range.
Systems Administration – Compression and Archiving
Explore compressing and archiving tools, such as gzip, gunzip, bzip2, bunzip2 and tar, as you practice in the Systems Administration Cyber Range.
Systems Administration – Finding and Linking Files
This lab explores different options for finding files based on various criteria, such as size and permissions, and walks through the process of creating soft and hard links.
Systems Administration – File Paths and File Types
Learn about File Paths and File Types as you practice in the cyber range
Systems Administration – Job Scheduling
Learn about job scheduling as you practice in the Systems Administration Cyber Range.
Systems Administration – Managing Units
Practice working with systemd to manage units and control groups.
Systems Administration – Regular Expressions & Metacharacters
Learn about regular expressions and metacharacters as you practice in the Systems Administration Cyber Range.
Systems Administration – Working with Processes and Jobs
Practice common commands for working with processes, such as top, nice/renice, ps and kill, and manage jobs with bg and fg.
Systems Administration – System Logging and Tuning
Learn about system logging, including rsyslog and explore tuned, a system tuning service available in RHEL.
Systems Administration – Understanding the Linux Kernel
Learn about the Linux kernel as you practice in the Systems Administration Cyber Range.
Systems Administration – Creating and Managing Partitions
Depending on whether the system is BIOS-based or UEFI-based, the partition information is stored in Master Boot Record (MBR) or GUID Partition Table (GPT), respectively. Learn about creating and managing partitions using the parted and gdisk utilities as you practice in the Systems Administration Cyber Range.
Systems Administration – Managing packages with DNF
In this lab, you will practice working with DNF, or “Dandified yum”. It is the next generation of the yum package manager that automatically computes dependencies and makes it easier to maintain groups of machines. DNF is the Red Hat’s new default package manager.
Systems Administration – Working with Logical Volume Manager
Learn about using Logical Volume Manager (LVM) to create, modify and delete volumes and groups as you practice in the Systems Administration Cyber Range.
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client