Master the command line and fundamental skills needed to begin your journey Into ethical hacking.
By the end of this course you will be using the command line to:
This course is the logical starting point for anyone interested in Linux, ethical hacking, cyber security, networking, etc but unsure of where to begin.
By the end of this course you'll be able to jump off and do almost anything you want on your machine.
Linux is like a playground; come play!
Learn the in's and out's of the Linux command line. Don't be fooled into thinking that the only way to interact with your computer is through point and click GUI (graphical user interface) applications. The Linux command line is where the true power of your machine can be unlocked.
Delve beyond the simple commands beginners enter and gain an understanding of what is going on behind the commands. In doing so you will begin to master an operation system that is secure, stable, customizable, open-source, and best of all FREE.
Many students often want to dive right into higher level Kali Linux tools such as Nmap, Metasploit, or Wireshark without gaining a solid understanding of the basics first. This course will provide foundational knowledge you need to be successful when working with other Linux tools!
Not only will I teach you, but you will get opportunities to prove your knowledge at various knowledge checkpoint challenge problems along the way. Watching is great, but doing is even better!
Trust me, I know! I've been teaching Linux to middle and high school students for the past few years. We put a bunch of old PC's running Kali Linux on the same network; the first thing they wanted to do was "hack" into each other! However, we took it slow, started at the beginning learning these fundamental skills, and we saw PROGRESSION.
If middle and high school students can learn Linux, so can you!
A file is a complicated object. It can only perform actions that it is permitted to do, by those permitted to do them. These permissions include read, write, and execute.
We can change a file's permissions so that it can be opened, edited, or executed and who can do so with the chmod command.