KEMBAR78
Linux Basics For Hackers v2 Compress | PDF
50% found this document useful (2 votes)
5K views6 pages

Linux Basics For Hackers v2 Compress

The document outlines a course titled 'Linux Basics for Hackers v2', which covers essential topics such as text manipulation, networking, software management, and BASH scripting. It also discusses various career paths for hackers, including roles in pentesting, military, and infosec engineering. The course aims to equip learners with foundational Linux skills relevant to hacking and cybersecurity.

Uploaded by

13maniac13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
5K views6 pages

Linux Basics For Hackers v2 Compress

The document outlines a course titled 'Linux Basics for Hackers v2', which covers essential topics such as text manipulation, networking, software management, and BASH scripting. It also discusses various career paths for hackers, including roles in pentesting, military, and infosec engineering. The course aims to equip learners with foundational Linux skills relevant to hacking and cybersecurity.

Uploaded by

13maniac13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Linux Basics for Hackers v2

Hackers-Arise
Course Outline
 1. Introduction
 2. Getting Started with Basics
 3. Text Manipulation
 4. Networks
 5. Adding and Removing Software
 6. File and Directory Permissions
 7. Process Management
Course Outline Continued
 8. Use Environment Variables
 9. BASH Scripting
 10. Compressing and Archiving
 11. Storage Device Management
 12. Logging
 13. Services
 14. Anonymity
 15. Wireless
Course Outline Continued
 15. Loadable Kernel Modules
 16. Automating Tasks
Introduction- Careers for Hackers
 Pentester

 Military

 Bug Bounty

 Espionage

 Infosec Engineer
Getting Started with Basics

You might also like