IT Security Gumbo: Linux Forensics

Examing the Linux Infrastructure

Instructed by Corey Charles

Want to access all courses?
Go for a premium subscription

  • Monthly
  • Yearly

Monthly

$ 29/mo
Billed Monthly
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now

Yearly

$ 299/yr
Billed Annually
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now
  • Functionality within the linux envrionment.

Bring greater efficiency to your IT infrastructure by learning to employ the standardized and finely tuned processes of the Linux operating system in your enterprise environment. In this training course, you gain the foundational knowledge and skills to administer and support your Linux OS, and learn to control permissions, process data, and perform administrative tasks.
 
  • Administer and support Linux in your environment
  • Manage and automate GNU open-source tools
  • Create, edit, and search files and directories
  • Connect to network services
  • Run shell scripts for automation

  • Students should have general knowledge of the linux operating system
  • Beginner to seasoned Linux Adminstrators.
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : Linux As An Architecture

  • Lecture 1 :
  • History of Linux
  • Lecture 2 :
  • Linux Architecture
  • Lecture 3 :
  • Linux File System Overview
  • Lecture 4 :
  • Basic File System
  • Lecture 5 :
  • File Permissions and Overview
  • Lecture 6 :
  • Editing File Properties
  • Lecture 7 :
  • Files Properties and Permissions

Section 3 : Forensically Reviewing Linux

  • Lecture 1 :
  • Root and Sudo
  • Lecture 2 :
  • Disk and File Systems
  • Lecture 3 :
  • System Initilization
  • Lecture 4 :
  • Emergency Alternative Startup Options
  • Lecture 5 :
  • Shutting down the System
  • Lecture 6 :
  • System Processes
  • Lecture 7 :
  • Interacting with Linux
  • Lecture 8 :
  • Linux Command Shell Concepts
  • Lecture 9 :
  • Piping Command Output

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...

Develop your own Operating System f...

By : Harshit Srivastava

Lecture 8

Ubuntu Linux Desktop - Start Using ...

By : Samuel OJO

Lecture 15

Machine Learning with Jupyter Noteb...

By : Qasim Shah

Lecture 36

SCCM 2016 - Learn System Center Con...

By : Cristian Calinescu

Lecture 48

Active Directory on Windows Server ...

By : Alexandru Serghie

Lecture 27

Microsoft Windows Server 2016 - Han...

By : Prof K

Lecture 61

Buy

$29

Need any help with the platform? Contact us at: support@learnfly.com