Linux Fundamentals Learning Path

Learn about Linux architecture, common Linux vulnerabilities, networking and more.

14 hours, 35 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    14 hours, 35 minutes

  • Assessment

    questions

About Linux Fundamentals

This path on Linux fundamentals is ideal for the beginner. We will discuss how to install Linux. From there, we will look under the hood to learn about Linux architecture as well as the file system. Next, we will explore the fundamentals: account management, networking, jobs and processes. Finally, we dive into light scripting to automate repeatable tasks.

 

Syllabus

Linux Fundamentals Skill Assessment

Assessment - 43 questions

Introduction to Linux

Course - 00:28:00

This course is an introduction to the Linux operating system. You’ll explore the Linux OS, different industries that use Linux, virtualization, the Windows OS, and installing and using Mint Linux — an excellent flavor of Linux for beginners.
Linux Architecture

Course - 03:05:00

This course begins our exploration of the details of Linux with a look at Linux architecture. Beginning with the boot process, you’ll explore the structure of the Linux OS, permissions and an in-depth look at directories.
Linux Commands

Course - 05:51:00

In this longest course in this path, we explore a wide assortment of commands to navigate and manipulate files and directories. The student will get to grips with the most important commands in Linux, including man, sed, grep, cut and pipe. Finally, we look at system commands for the Linux operating system.
Account management in Linux

Course - 00:52:00

This course covers critical concepts in account management. These include commands, skeletons, groups and special commands to add and remove users and groups.
Jobs and process in Linux

Course - 00:49:00

In Linux, every command and program has a process. There are two types of processes: parent processes and child processes. This course explores processes, jobs, process states and more.
Common security vulnerabilities in Linux

Course - 00:45:00

This course dives into common security vulnerabilities in Linux. We’ll explore privilege escalation (going from a standard user to a privileged user), overly permissive files and directories and exploiting sudo and SUID permissions.
Networking in Linux

Course - 00:49:00

This course dives deeper into the topic of networking in Linux. Beginning with a primer on TCP/IP, we look at DCHP, network connectivity with the ping command, IP routing tables and DNS with the dig command.
Scripting in Linux

Course - 01:46:00

Bash scripting allows for the student/professional to automate mundane tasks. In this final course, we cover Bash scripting. Beginning with a quick primer on vi, we explore variables, input validation, conditional statements and more.

Meet the author

Jasmine Jackson

Jasmine shares her passion for Information Security by presenting and teaching workshops over ten years of experience. She is an Adjunct Professor at the City University of Seattle with additional courses at Cybrary and Infosec Institute. She has Secure Programming, Web Application Pentesting, and Cloud Security certifications. She has a Master’s in Computer Science and a Graduate Certificate in Information Security and Privacy from the University of North Carolina, Charlotte. She has presented her work domestically and internationally for such conferences - As the Diana Initiative, Bugcrowd, Blacks in Cybersecurity, Biohacking Village, and NotPinkCon on Mobile Security and Web Application Security. Besides Jasmine’s passion for teaching, she has a hunger for breaking barriers and biases to entry for the next generation of Information Security professionals by creating her non-profit, The Accelerated Training Program (T-ATP), t-atp.org, whose mission statement is to study the systemic exclusion of cybersecurity education to underrepresented groups through education policy along with providing quality cybersecurity education. In her spare time, she likes to stay updated on security vulnerabilities by completing capture the flag write-ups on her blog, thefluffy007.com, submitting vulnerability disclosures, and creating cybersecurity education content on her YouTube channel.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Cyber Operator
  • Law Enforcement / Counterintelligence Forensics Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo