In module 2, we dive into how to use the command line to collect, process, analyze, and display data for defensive cybersecurity operations.