Skip to main content

Overview

Days 15-28 of the 90 Days of Cybersecurity challenge focus on building a strong foundation in Linux. These two weeks will take you from basic commands to system administration skills essential for cybersecurity professionals.
Linux is a critical skill in cybersecurity. Most security tools, servers, and enterprise infrastructure run on Linux. Hands-on practice is essential - don’t just watch tutorials, actively practice in the labs!

Learning Resources

Linux Journey

Interactive tutorials covering Linux fundamentals from beginner to advanced topics

Cisco NetAcad - Linux Unhatched

Structured course introducing Linux command line and basic system administration

LabEx Linux Labs

Free hands-on labs with real Linux environments for practical experience
1

Start with Linux Journey

Begin by browsing through the Linux Journey tutorials. This interactive resource covers:
  • Command line basics
  • File system navigation
  • Text manipulation
  • User management
  • Permissions and ownership
  • Process management
  • Package management
2

Complete Cisco NetAcad Course

Enroll in and complete Linux Unhatched on Cisco NetAcad. This structured course provides:
  • Guided lessons with assessments
  • Interactive virtual environments
  • Certification preparation materials
  • Community support forums
3

Practice with Hands-On Labs

Complete all available Linux Hands-on Labs on LabEx. These labs offer:
  • Real Linux terminal environments
  • Practical exercises and challenges
  • Progressive difficulty levels
  • Immediate feedback on your work

Key Skills to Master

By the end of Days 15-28, you should be comfortable with:
  • Command Line Navigation: Moving through directories, listing files, understanding the filesystem hierarchy
  • File Operations: Creating, editing, copying, moving, and deleting files and directories
  • Text Processing: Using tools like grep, sed, awk, and text editors (vim/nano)
  • User & Permission Management: Understanding users, groups, and Linux permission models
  • Process Management: Viewing, managing, and controlling running processes
  • Package Management: Installing and managing software packages
  • Basic Shell Scripting: Automating tasks with bash scripts
  • System Monitoring: Checking system resources, logs, and performance

Study Tips

For cybersecurity professionals, focus on understanding:
  • Log file locations (/var/log/)
  • Network configuration commands (ifconfig, ip, netstat)
  • User account security
  • File permissions and their security implications
  • Basic firewall concepts (iptables, ufw)

Next Steps

After completing the Linux section, you’ll move on to Python programming (Days 29-42), where you’ll learn to automate security tasks and write custom security tools.

Build docs developers (and LLMs) love