CHAPTER 3Linux Operating System

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • Why are Linux skills essential for network security monitoring and investigation?

  • How do you use the Linux shell to manipulate text files?

  • How do client-server networks function?

  • How does a Linux administrator locate and manipulate security log files?

  • How do you manage the Linux file system and permissions?

  • What are the basic components of the Linux GUI?

  • What tools can you use to detect malware on a Linux host?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

Linux page 73

distros page 73

superuser page 74

intrusion detection systems (IDSs) page 75

penetration testing page ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.