0% found this document useful (0 votes)
31 views1 page

Linux 2

Uploaded by

muhabdull30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
31 views1 page

Linux 2

Uploaded by

muhabdull30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 1
= coursera More Linux distributions Previously, you were introduced tothe different distributions of Linux. This included KALI LINUX™, (KALI LINUX ™is a trademark of OffSec. In adciton to KALI LINUX™, there are multiple other Linux distributions that security analysts should be familiar with. In this ceading, you'l learn about additional Linux distributions. KALI LINUX™ KALI LINUX™ is an open-source distribution of Linux thats widely used in the security industry. This because KAL LINUX, which is Debian-based, is pre-installed with many useful tols for penetration testing and digital forensics. A penetration test sa simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. Digital forensics isthe practice of collecting and analyzing data to determine what has happened after am attack, These are key activitesin the security industry However, KALI LINUX"is not the only Linux distribution that is used in cybersecurity. Ubuntu LUbuntuis an open-source, user-friendly distribution that is widely used in security and other industries. Ithas both a command-line interface (CL1) and a graphical user Interface (GU!) Ubuntu is also Debian derived and includes common applications by default. Users can also download many more applications from a package manager, including security focused tools Because ofits wide use, Ubuntu has an especially large number of community resources to support LUbuntuis also widely used for cloud computing. As organizations migrate to cloud servers, cybersecurity work may ‘more regularly involve Ubuntu derivatives. Parrot Parrot san open-source distribution that is commonly used for security. Similar to KALI LINUX™ Parrot comes with pre-installed tools related to penetration testing and cigital forensics, Like both KALI LINUX™and Ubuntu itis based on Debian. Parrots also considered to be a user-friendly Linux distribution. Thisis because it has a GUI that many find easy to navigate. This sin addition to Parrot’ CU Red Hat® Enterprise Linux® Red Hat Enterprise Linux sa subscripton-based distribution of Linux built for enterprise use, Red Hat isnot free, which isa major difference from the previously mentioned distributions. Because i's built and supported for enterprise use, Red Hat also offers a dedicated support team for customers to call about issues Centos Centos isan open-source distribution that is closely elated to Red Hat. Ituses source code published by Red Hat to provide a similar platform. However, CentOS does not offer the same enterprise support that Red Hat provides and is supported through the community Key takeaways KALI LINUX", Ubuntu, Parrot, Red Hat, and CentOS are all widely used Linux distributions I's important fo security analysts to be auare of these distributions that they might encounter in their career Gotonextitem \/ Completed © Uke isthe PReportanissue ps monn eanvtnucandatiopananv.nsUmorIniestrors “

You might also like