Linux Operating System
By MICHAEL UZOWUIHE
Introduction to Linux OS
● Linux is an open-source, Unix-like operating system that powers millions of
devices around the world.
● Known for its flexibility, security, and robust architecture, Linux is popular in
both personal and enterprise environments.
● In this course, we'll explore its architecture, distributions, package
management, and hands-on activities.
Linux Architecture
Understanding the Linux architecture helps security analysts and users
understand its operation:
● User: Interacts with the computer; Linux allows multiple users at the same
time.
● Applications: Programs performing tasks, often installed via package
managers.
Linux Architecture Contd…
● Shell: Command-line interface (CLI) allowing users to communicate with the
kernel.
● Filesystem Hierarchy Standard (FHS): Organizes data and files in Linux.
● Kernel: Manages processes and memory; the heart of Linux.
● Hardware: The physical components like RAM, CPU, and peripherals
(keyboard, mouse, etc.).
Linux Distributions
Different Linux distributions cater to various needs:
● KALI LINUX: Popular in the security industry for penetration testing and digital
forensics.
● Ubuntu: User-friendly, widely used with CLI and GUI options.
● Parrot: Security-focused, often used in penetration testing.
● Red Hat® Enterprise Linux®: Paid, enterprise-focused with strong support.
● CentOS: Free alternative to Red Hat without enterprise-level support.
Package Managers in Linux OS
● Package: Software that can be combined with other packages to form
applications.
● Package Manager: Tools used to install, manage, and remove packages
efficiently.
○ Helps resolve dependency issues.
○ Keeps packages up-to-date with security patches and bug fixes.
Types of Linux Package Managers
Package managers depend on the Linux distribution:
● Red Hat Package Manager (RPM): Used for Red Hat-derived systems, files
end in .rpm.
● Debian Package Manager (dpkg): Used for Debian-derived systems like
Ubuntu and Kali, files end in .deb.
● Package Management Tools: Tools like APT (for Debian) and YUM (for Red
Hat) to manage packages via the shell.
The Shell in Linux OS
The shell interprets commands from the user and communicates with the kernel:
● Types: Popular shells include bash, ksh, zsh, and others.
● Instructions: Perform tasks using Linux commands.
● Prompts: Bash uses $, while other shells may use %.
● Bash is the default and most popular shell in cybersecurity.
Lab Activity 1: Install Linux/Ubuntu OS
● Download and install VirtualBox.
● Download the Linux/Ubuntu OVA file.
● Load the OS into VirtualBox for use.
Lab Activity 2: Install Software in Linux
● Confirm that APT is installed in Bash.
● Install and manage software using APT:
● Install Suricata and tcpdump.
● Uninstall and reinstall software as needed.
Lab Activity 3: Examine I/O in Linux Shell
● Generate outputs using the echo command.
● Perform basic calculations with expr.
● Clear the shell with the clear command.
● Explore more shell commands and their functions.
Conclusion
● Linux is an essential tool for cybersecurity professionals due to its flexibility,
security, and open-source nature.
● Understanding its architecture, package management, and shell commands
will enhance your ability to work with Linux systems effectively.