Module 2: Defensive Security Operations with bash

In module 2, we dive into how to use the command line to collect, process, analyze, and display data for defensive cybersecurity operations.


Table of contents