Introduction to Linux for Cybersecurity Crash Course 2022

preview_player
Показать описание
If you are looking to introduce yourself to the Linux basics geared towards a cybersecurity perspective, you can use this brief crash course to learn. Read below for a further explanation behind why you should learn Linux if you are considering cybersecurity... 👇

Learning how to effectively navigate and interact with Linux can be an important part to your learning journey in cybersecurity. In this crash course, we walk through the very basics including how to configure your own Linux environment, navigate the command line, and apply our basic knowledge to a security use.

You may be wondering... Why learn what we are learning? Why are we learning about how to change and create new directories, create new files, and file permissions...?

Part of the learning process before transitioning into the specific use cases for cybersecurity is learning the very basics. Once you get the basics down, you can start to apply your knowledge and run specific programs for security. This is why we start out with the very basics.

If you have any questions, comments, or concerns, please leave a comment in the comment section or email me.

Scroll down to the bottom of the web page.

📒 Helpful Resources for Crash Course

Links Mentioned:

🎵 Music Credits:
Enyer Gonzalez - Beats Savage Production

🐕 Follow Me:

🤔 Have questions, concerns, comments?:

🎧 Gear:

0:00 - Course Introduction
0:58 - Course Overview
3:04 - Introduction to Linux & Cybersecurity Use Cases
7:09 - Installing VirtualBox ⬅
9:12 - Installing and Mounting Ubuntu to VM ⬅
14:03 - How to Full Screen VM in VirtualBox
14:43 - Download Exercise Files
16:06 - How to Open the Terminal
17:38 - Most Common Directories in Linux
18:21 - Directory Structure
18:40 - Common Linux Commands You Will Use on the Daily
23:55 - Finding Help with Commands
26:31 - Interacting with Directories
31:02 - More about the LS Command
33:00 - File Permissions
36:13 - Changing File Permissions with Chmod
43:38 - Searching for Files Using Find
45:54 - Editing Files and Introduction to File Editors
53:05 - Deleting, Copying, Renaming, and Moving Files
58:30 - Archiving and Compressing Files
1:01:07 - Input and Output Redirection ⬅
1:11:01 - Using Grep to Find Patterns
1:14:08 - Pipes
1:17:08 - Intro to Environment Variables
1:19:48 - Process Control
1:23:17 - Create and Switching Users
1:25:46 - Installing Software
PROJECT
1:29:49 - Overview of IP Tables
1:31:34 - IP Tables Basics
1:35:42 - Creating a Basic "Web Server" with IP Tables ⬅
1:41:15 - Conclusion

© 2020 Grant Collins & Cybercademy
Рекомендации по теме
Комментарии
Автор

I remember when grant used to share his videos when he was learning from the community and now he's giving back to the community

keepitup and thank you

snono
Автор

You are amazing at what you teach. I watch many YouTube videos but this one is one of the best - keep making videos !

sarahalam
Автор

🎁 First person to comment down below what TV Show the exercise files were based off of and their favorite characters gets a free cybersecurity book of their choice below a certain price range because I am kinda a broke college student.
🍪 Count the number of times I say "Now" throughout the entire series and you get a free cookie... 😋
Time Stamps Below:

0:00 - Course Introduction
0:58 - Course Overview
3:04 - Introduction to Linux & Cybersecurity Use Cases
7:09 - Installing VirtualBox ⬅
9:12 - Installing and Mounting Ubuntu to VM ⬅
14:03 - How to Full Screen VM in VirtualBox
14:43 - Download Exercise Files
16:06 - How to Open the Terminal
17:38 - Most Common Directories in Linux
18:21 - Directory Structure
18:40 - Common Linux Commands You Will Use on the Daily
23:55 - Finding Help with Commands
26:31 - Interacting with Directories
31:02 - More about the LS Command
33:00 - File Permissions
36:13 - Changing File Permissions with Chmod
43:38 - Searching for Files Using Find
45:54 - Editing Files and Introduction to File Editors
53:05 - Deleting, Copying, Renaming, and Moving Files
58:30 - Archiving and Compressing Files
1:01:07 - Input and Output Redirection ⬅
1:11:01 - Using Grep to Find Patterns
1:14:08 - Pipes
1:17:08 - Intro to Environment Variables
1:19:48 - Process Control
1:23:17 - Create and Switching Users
1:25:46 - Installing Software
PROJECT
1:29:49 - Overview of IP Tables
1:31:34 - IP Tables Basics
1:35:42 - Creating a Basic "Web Server" with IP Tables ⬅
1:41:15 - Conclusion

NOTE: ⬅ Denotes a URL link which can be found in the description of the video.

collinsinfosec
Автор

Keep doing YouTube videos like this!! You’ve helped me understand Cybersecurity... so thnks bro! 😎

theVoyager
Автор

Thank you, this video benefits me a lot! Looking forward for more Info Sec content :)

v_lix
Автор

Hey Grant.
I'm about to start my course in Certificate 4 Cyber Security (Australia, Melbourne) on Oct 5th. I've heard from various sources that ANY job in I.T now requires some basic knowledge or understanding of Linux.
I will continue to learn from you and your content as I begin my journey for the next 4 years into this mind-blowing world of I.T.
I've spent the last 2 years in a Trade background so this field is foreign to me, but growing up in a technology driven world, I've always had this itch to learn and understand more to it.

twowheelseatingmeals-motoj
Автор

I like learning from these young guys. In 45 and have my CCNA and JNCIA and wanting to get into Cyber security but want to learn Linux first.

zoltron
Автор

I learned Linux when the only computer I had access to was a 2008 Dell Inspiron (I think) with a whopping 3GB of RAM and a busted hard drive. I managed to upload Slitaz to a 4GB USB (on a friends computer) and ran the live version learning what I was doing by reading the small print on my phone and dealing with a lot of frustration.
My point is, take this gift Grant is giving you and cherish it!

zigginzag
Автор

Thanks for sharing! I am self-teaching myself cybersecurity. I really appreciate persons like yourself for sharing knowledge and resources like this.

majamoore
Автор

We learnt linux in the very first semester of cyber security and digital infrastructure... its fun though!

mehwishmishu
Автор

You are among the best Ezplainers of stuff. Bravo

patmat.
Автор

Words can’t explain how mighty I rate you. Three years post still finding ways to help people in 2023. Thank you boss . I enjoyed your contents .

k_usuan
Автор

I like so much your vídeos, before start i tive the like! ( Im Brazilian, Sorry for my english lol)

deboraferreira
Автор

Best way to learn more? Teaching!!! Tanks man!!!

CaioOliveira-qffw
Автор

Great bro, Continue in making great videos

hamzaadaoud
Автор

Hi Grant!
Are you currently studying? If so, thanks for devoting your time to help others to learn. Your content is golden! Thanks for going through the trouble to create tutorials like this!

soresgerdevrim
Автор

Ive learned so much from this video thanks

spriteguy
Автор

i love u bro thanks for ur effort. May Allah be with u ❤

gokhantunay
Автор

42:55 you should try to explain the binary system there, it can be hard to memorize the numerical permissions without knowing the meaning behind them

ashutoshraina
Автор

God damn, I thank you and appreciate all of the work you put in to pass down your knowledge, i started cyber security and that kinda thing self learning ever since I was 11 and these videos are gold mines and I will forever be thankful, thanks for helping another cyber fella!

lunaticironclad