Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
Home
LINSYS-1
Introduction
Course Introduction
Operating Systems
Philosophy and Concepts
Installing and Using Linux
Machine Preparation
Installing Linux
The Graphical Desktop
The Command Line
Using the CLI
Core Utilities
Data Streams
Advanced Shell Features
Text editing
Working as root
Basic System Administration
Installing Software
User Management
System Internals
Boot and Startup
Filesystems
Practical System Administration
Troubleshooting
Networking Basics
SSH
LAMP Stack
LINSYS-2
WEBOPS-1
Course Introduction
Introducing Varnish
Installation and Setup
Architecture
HTTP
VCL
Caching Strategies
Advanced Configuration
Scalability and HA
Security
Monitoring and Performance
Advanced Techniques
Troubleshooting
CDN Integration
Future Trends
SECOPS-1
Foundations
The Command Line
Using the CLI
Core Utilities
Data Streams
Advanced Shell Features
Text editing
Working as root
Bash Primer
Regular Expressions
Principles of Defense and Offense
Defensive Security Operations with bash
Data Collection
Data Processing
Data Analysis
Real-Time Log Analysis
Network Monitor
Filesystem Monitor
Malware Analysis
Formatting and Reporting
Penetration Testing with bash
Reconnaissance
Script Obfuscation
Command-Line Fuzzer
Establishing a Foothold
SecOps Practices with bash
Users, Groups, and Permissions
Writing Log Entries
System Availability Monitor
Software Inventory
Validating Configuration
Account Auditing
Conclusion
Sign up
Home
SECOPS-1
SecOps Practices with bash
System Availability Monitor
Cybersecurity Tools: System Availability Monitor