Overview
Days 15-28 of the 90 Days of Cybersecurity challenge focus on building a strong foundation in Linux. These two weeks will take you from basic commands to system administration skills essential for cybersecurity professionals.Linux is a critical skill in cybersecurity. Most security tools, servers, and enterprise infrastructure run on Linux. Hands-on practice is essential - don’t just watch tutorials, actively practice in the labs!
Learning Resources
Linux Journey
Interactive tutorials covering Linux fundamentals from beginner to advanced topics
Cisco NetAcad - Linux Unhatched
Structured course introducing Linux command line and basic system administration
LabEx Linux Labs
Free hands-on labs with real Linux environments for practical experience
Recommended Learning Path
Start with Linux Journey
Begin by browsing through the Linux Journey tutorials. This interactive resource covers:
- Command line basics
- File system navigation
- Text manipulation
- User management
- Permissions and ownership
- Process management
- Package management
Complete Cisco NetAcad Course
Enroll in and complete Linux Unhatched on Cisco NetAcad. This structured course provides:
- Guided lessons with assessments
- Interactive virtual environments
- Certification preparation materials
- Community support forums
Practice with Hands-On Labs
Complete all available Linux Hands-on Labs on LabEx. These labs offer:
- Real Linux terminal environments
- Practical exercises and challenges
- Progressive difficulty levels
- Immediate feedback on your work
Key Skills to Master
By the end of Days 15-28, you should be comfortable with:- Command Line Navigation: Moving through directories, listing files, understanding the filesystem hierarchy
- File Operations: Creating, editing, copying, moving, and deleting files and directories
- Text Processing: Using tools like
grep,sed,awk, and text editors (vim/nano) - User & Permission Management: Understanding users, groups, and Linux permission models
- Process Management: Viewing, managing, and controlling running processes
- Package Management: Installing and managing software packages
- Basic Shell Scripting: Automating tasks with bash scripts
- System Monitoring: Checking system resources, logs, and performance
Study Tips
For cybersecurity professionals, focus on understanding:
- Log file locations (
/var/log/) - Network configuration commands (
ifconfig,ip,netstat) - User account security
- File permissions and their security implications
- Basic firewall concepts (
iptables,ufw)
