Learn web development, system admin, devops, digital marketing, project management and more

Get Started With Linux Essentials

This tutorial video is by Hackersploit and teaches you how to get started becoming a penetration tester and ethical hacker. The of the course is called the Linux essentials for hackers.

Linux is an important operating system to learn if you are looking at getting into information security and ethical hacking. This course assists with becoming efficient at using the Linux operating system.

Pen Testing and Ethical Hacking Tutorial

A Look At Linux Keyboard Shortcuts To Become More Efficient

The course is a collection of tutorials in series. The first section starts with how to use Linux keyboard shortcuts effectively. The instructor first looks at the terminal before moving into the desktop environment. 

The Linux distribution being used is Debian and the Aptitude package manager. There are predefined keyboard shortcuts. Although, you may use your own customised keyboard shortcuts as it suits you.

Linux File Management And File Manipulation

The next section of the video looks at file management and file manipulation. The instructor looks at navigating the file system within Linux. Also discusses, how to find out where you are in the directory structure, and how to navigate your way around the command line. 

He then goes on to discuss such things as creating files and directories. As well as moving and copying files around the file system. Next step, he to discuss text-based editors on the command line such as NANO and VIM to edit text files on the command line. 

Setting File And Folder Permissions Within The Linux Directory Structure

This lesson in the tutorial video finds the teacher looking at a file and directory, permissions. How to set the ownership of files and directories. 

The instructor explores what read write and execute means for files and directories. And discusses why you need to set each of these permissions. Reminding the student this concept doesn't need to be complicated. Many embark on learning about permissions thinking that it is complex. The emphasis here is that it doesn’t need to be. 

He discusses the CHMOD command that is used to modify the user permissions. A few examples are given using the CHMOD command to change permissions on a file. 

The next section discussed is file ownership and how to execute a change to file ownership settings. The CHOWN command is used in this instance. Again, further practical examples are given on how to achieve. 

Find Text Within Files Using The Grep Command And Concept Of Piping

The teacher looks at finding text and values within files using the GREP command. And also explores the concept of piping in Linux. Piping allows you to use two Linux commands together to achieve a result. Best described as a powerful type of filtering.

Find Files In The Filing System Using Locate And Find Commands

The next section looks at finding files in the filing system. Using the locate and find commands. These are two different approaches to finding files that both have their pros and cons.

Discovering Essential Information About The System You Are Using

The preceding section looks at enumerating system information. This section is titled, Enumerating Distribution and Kernel Information. It explains how to access information that you may require. Like what user are you on the system and what system you are using. He discusses a few of the commands that may be useful for this kind of endeavour.

Some of these commands include WHOAMI to find out who you are on the system and LSCPU to find out more information about the system that you are using. The UNAME command will also give you information about the Linux kernel, that you are using. 

What The Linux Shell Is All About And How To Configure The Shell

The next video talks about the concept of shell and how to configure the shell for Linux.

One of the most commonly used shells is BASH (or Bourne Again Shell).

Archiving Files Using Compression Tools Like Tar And Gzip

Next, the video looks at archiving files using file compression. To achieve this, commands such as TAR and GZIP are used to compress the files and extract them for later use. 

Securing The Authentication

The next topic goes on to managing users and groups for Linux security. Securing the authentication side of Linux. Exploring the subject of switching uses and elevated permissions that the SUDO user has access to.

Further Topics Discussed In The Video

Other topics discussed in this video include networking with IFCONFIG, NETSTAT and Net Discover as well as a tour of proxy chains.

Service and process management using HTOP and SYSTEMCTL, SSH and SSH security. The instructor also looks at CURL fundamentals.

Also, a look at the UFW firewall (uncomplicated firewall) to help protect your Linux system. How to clear tracks and logs on Linux. SSH brute force protection with FAIL2BAN.

Get Watching This One - A Step Further To Mastering Pen Testing And Ethical Hacking

I'm sure you will find this video very intuitive for mastering ethical hacking and pen testing on your Linux system. If you are currently learning Linux security and ethical hacking, you may find this tutorial video useful to gain another perspective.

Happy Linux travels!

Video - Pen Testing and Linux Ethical Hacking Tutorial

Video
Duration: 4hrs 41mins
Author: HackerSploit
Bookshelf: Security

Video Time Markers

Video Time Markers for Pen Testing and Linux Ethical Hacking Tutorial

(Click or tap play video first before selecting markers)

    Video Authorship and Publishing Credits

    The author of this video is HackerSploit and published by freeCodeCamp.org. Click through to find out more about them and their great learning material.

    Other Videos

    Email Marketing For Small Business - What's the Secret?
    Email Marketing For Small Business - What's the Secret?

    Disclosure: Some of the links on this website are affiliate links of which Website Library receives a small commission from the sale of certain items, however the price remains the same for you. For more information please read the Affiliate Disclosure.