Introduction To Linux Commands in Cyber Security
Introduction To Linux Commands in Cyber Security
INTRODUCTION
TO LINUX
COMMANDS IN
CYBER
SECURITY
IN THIS EDITION
Before you can start creating scripts, it is important to know how
a console works under Linux.
You will find the activities in this guide without any additional
information. It is therefore recommended that you take the online
course to get all the necessary details.
https://learn.brilliantlabs.ca/courses/course-v1:BL+CYSEC-BASIC-ACT-
02+9999/about
TABLE OF CONTENT
In this Edition i
Activity A : A Solution 2
Activity B : A Solution 5
ACTIVITY A
FOLDER STRUCTURE
Now that you've got a few commands under your belt, here's a
little exercise to put them into practice.
Instructions
Using the commands you have learned so far, create the following
folder structure:
ACTIVITY A: A SOLUTION
Solution - Activity A
ACTIVITY B
CREATION OF A FILE THAT
CONTAIN TEXT
In cyber security, it is important to know how to insert text into a file. This task may
seem simple, but it is a little less so in console mode. With this knowledge in mind,
you will be able to use this practice to eventually create log files that are very
important in cyber security.
Instructions
Using the echo command and the > and >> symbols, insert the
text for each statement into a file. Check the result with the cat
command
Example
Additional Information
When you use the > symbol the text will be added to the first line
of the file. If there is already text in the file, the text will be
deleted and replaced by the desired text.
Exercices
ACTIVITY B : A SOLUTION
Here is a possible solution. Other solutions exist. The goal is to
obtain the desired result. If you have created your files with the
necessary text, using the echo command, you can consider the
goal as completed.
Solution - Number 1
Solution - Number 2
Solution - Number 3
Solution - Number 4