Linux Basics Second Edition

Course Overview

This comprehensive course is designed to take you from a Linux novice to a confident user. You’ll learn essential Linux concepts, commands, and best practices. Join Master OTW, the author of ‘Linux Basics for Hackers’, as he guides you through the book, providing a deeper understanding of how hackers utilize Linux as an attack platform.

Course Outline

  1. Getting Started with Basics

    • Command-line interface (CLI) basics

    • Navigating the file system

    • Essential Linux commands

  2. Text Manipulation

    • File viewing and manipulation

    • Basic file viewing (cat, less, head, tail)

    • Text searching and pattern matching (grep)

  3. Networks

    • Basic networking concepts in Linux

    • Network configuration and troubleshooting

    • Using network utilities (ping, ifconfig)

  4. Adding and Removing Software

    • Package management systems (apt)

    • Installing, updating, and removing software

    • Managing software repositories

  5. File and Directory Permissions

    • Understanding Linux file permissions

    • Changing permissions with chmod

    • Managing ownership with chown and chgrp

  6. Process Management

    • Understanding Linux processes

    • Monitoring processes (ps, top)

    • Job control and background processes

  7. Using Environment Variables

    • Understanding environment variables

    • Setting and modifying environment variables

  8. BASH Scripting

    • Introduction to shell scripting

    • Writing and executing basic BASH scripts

    • Writing a port scanner

  9. Compressing and Archiving

    • File compression tools (gzip, bzip2)

    • Creating and extracting archives (tar)

  10. Storage Device Management

    • Understanding Linux filesystem hierarchy

    • Mounting and unmounting devices

  11. Logging

    • System logs and their locations

    • Log rotation and management

  12. Services

    • Understanding system services

    • Managing services with systemctl

  13. Becoming Secure and Anonymous

    • TOR Browser: Functionality, benefits, and limitations

    • Proxychains: Usage and best practices

  14. Wireless Networking

    • Configuring wireless interfaces

    • Troubleshooting wireless connections

  15. Automating Tasks

    • Introduction to cron jobs

    • Writing and scheduling cron tasks

    • Using at for one-time scheduled tasks

By the end of this course, you will be able to:

  • Confidently navigate and manage Linux systems

  • Perform essential system administration tasks

  • Write basic BASH scripts to automate routine tasks

  • Troubleshoot common Linux issues

  • Implement basic anonymity practices

And More!