Cyber Range

Systems Administration – Linux Cyber Range

The Systems Administration lab will walk students through some of the basic functionalities and responsibilities of Linux system administration. These include provisioning and de-provisioning users, assigning special permissions to users, interacting with the VI editor, and the basics of the Bash shell among others.

The labs

Train hands-on

  • Systems Administration – File and Directory Operations

    Learn about file and directory operations as you practice in the Linux Cyber Range.

  • Systems Administration – Access Control Lists

    Learn about access control lists (ACL), including file and directory ACLs, and default ACLs, as you practice in the Linux Cyber Range.

  • Systems Administration – Bash Shell

    Learn about Bash Shell as you practice in the Linux Cyber Range.

  • Systems Administration – Basic Commands and Help

    Learn basic RHEL commands and gain hands-on experience as you practice in the Cyber Range.

  • Systems Administration – Special Permissions

    Learn about special permissions as you practice in this Cyber Range.

  • Systems Administration – File and Directory Permissions

    Learn about file and directory permissions as you practice in the Linux Cyber Range.

  • Systems Administration – Using the VI editor

    Learn about the visual editor as you practice in the Linux Cyber Range.

  • Systems Administration – Managing Groups

    Learn about managing user and group accounts, including creating, deleting and passwords, as you practice in the Linux Cyber Range.

  • Systems Administration – Login History and System Information

    Learn about login user and group info, history info and system info as you practice in the Linux Cyber Range.

  • Systems Administration – Compression and Archiving

    Explore compressing and archiving tools, such as gzip, gunzip, bzip2, bunzip2 and tar, as you practice in the Systems Administration Cyber Range.

  • Systems Administration – Finding and Linking Files

    This lab explores different options for finding files based on various criteria, such as size and permissions, and walks through the process of creating soft and hard links.

  • Systems Administration – File Paths and File Types

    Learn about File Paths and File Types as you practice in the cyber range

  • Systems Administration – Job Scheduling

    Learn about job scheduling as you practice in the Systems Administration Cyber Range.

  • Systems Administration – Managing Units

    Practice working with systemd to manage units and control groups.

  • Systems Administration – Regular Expressions & Metacharacters

    Learn about regular expressions and metacharacters as you practice in the Systems Administration Cyber Range.

  • Systems Administration – Working with Processes and Jobs

    Practice common commands for working with processes, such as top, nice/renice, ps and kill, and manage jobs with bg and fg.

  • Systems Administration – System Logging and Tuning

    Learn about system logging, including rsyslog and explore tuned, a system tuning service available in RHEL.

  • Systems Administration – Understanding the Linux Kernel

    Learn about the Linux kernel as you practice in the Systems Administration Cyber Range.

  • Systems Administration – Creating and Managing Partitions

    Depending on whether the system is BIOS-based or UEFI-based, the partition information is stored in Master Boot Record (MBR) or GUID Partition Table (GPT), respectively. Learn about creating and managing partitions using the parted and gdisk utilities as you practice in the Systems Administration Cyber Range.

  • Systems Administration – Managing packages with DNF

    In this lab, you will practice working with DNF, or “Dandified yum”. It is the next generation of the yum package manager that automatically computes dependencies and makes it easier to maintain groups of machines. DNF is the Red Hat’s new default package manager.

  • Systems Administration – Working with Logical Volume Manager

    Learn about using Logical Volume Manager (LVM) to create, modify and delete volumes and groups as you practice in the Systems Administration Cyber Range.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments