Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Linux Essentials for Hackers

HackerSploit via YouTube

Overview

This course covers Linux essentials for hackers, including file management, permissions, networking, security, and more. The learning outcomes include mastering Linux command line tools, understanding file manipulation, and enhancing security practices. The course teaches skills such as using grep, navigating file systems, managing users and groups, and securing SSH connections. The teaching method involves tutorials, demonstrations, and practical exercises. The intended audience includes aspiring hackers, cybersecurity enthusiasts, and individuals looking to enhance their Linux skills for security purposes.

Syllabus

Linux Essentials For Hackers - #1 - Introduction.
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts.
Linux Essentials For Hackers - #3 - File Management & Manipulation.
Linux Essentials For Hackers - #4 - File & Directory Permissions.
Linux Essentials For Hackers - #5 - File & Directory Ownership.
Linux Essentials For Hackers - #6 - grep & piping.
Linux Essentials For Hackers - #7 - Finding Files With Locate.
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information.
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge.
Linux Essentials For Hackers - #10 - Shells & Bash Configuration.
Linux Essentials For Hackers - #11 - Disk Usage.
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar.
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo.
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover).
Linux Essentials For Hackers - #15 - TOR & Proxychains.
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl).
Linux Essentials For Hackers - #17 - SSH And SSH Security.
Linux Essentials: Curl Fundamentals.
UFW Firewall (Uncomplicated Firewall) - Complete Tutorial.
How To Clear Tracks & Logs On Linux.
SSH Brute Force Protection With Fail2Ban.
OverTheWire Bandit Walkthrough - Level 0 - 6.
OverTheWire Bandit Walkthrough - Level 7 - 11.
OverTheWire Bandit Walkthrough - Level 12.
OverTheWire Bandit Walkthrough - Level 13 - 18.
OverTheWire Bandit Walkthrough - Level 19 - 20.
OverTheWire Bandit Walkthrough - Level 21 - 23.
OverTheWire Bandit Walkthrough - Level 24 - 26.
OverTheWire Bandit Walkthrough - Level 27 - 31.
OverTheWire Bandit Walkthrough - Level 32 - 33.
Complete tmux Tutorial.
Switching To ZSH.
Managing DNS With resolvconf.
Linux Security - SSH Security Essentials.
Linux Security - Configuring SUDO Access.
Linux Security - Securing Apache2.
Linux Security - Securing Nginx.
Linux Security - UFW Complete Guide (Uncomplicated Firewall).
Best Ways To Learn Linux.
How To Secure phpMyAdmin.
Apache2 ModSecurity Tutorial | Apache2 WAF.
Nginx ModSecurity Tutorial | Nginx WAF.
Docker Security Essentials | How To Secure Docker Containers.
Anonymize Your Traffic With Proxychains & Tor.
Log4J - CVE 2021-44228 (Log4Shell) - Exploitation & Mitigation.
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation.
How To Create Your Own Pentesting Distribution.

Taught by

HackerSploit

Reviews

Start your review of Linux Essentials for Hackers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.