0% found this document useful (0 votes)
11 views12 pages

Linux Operating System

Linux is an open-source, Unix-like operating system known for its flexibility and security, widely used in personal and enterprise environments. The document covers Linux architecture, various distributions, package management, and includes hands-on lab activities for installing and managing software. Understanding these elements is crucial for cybersecurity professionals to effectively utilize Linux systems.

Uploaded by

Somto Akwuobi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views12 pages

Linux Operating System

Linux is an open-source, Unix-like operating system known for its flexibility and security, widely used in personal and enterprise environments. The document covers Linux architecture, various distributions, package management, and includes hands-on lab activities for installing and managing software. Understanding these elements is crucial for cybersecurity professionals to effectively utilize Linux systems.

Uploaded by

Somto Akwuobi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Linux Operating System

By MICHAEL UZOWUIHE
Introduction to Linux OS

● Linux is an open-source, Unix-like operating system that powers millions of


devices around the world.
● Known for its flexibility, security, and robust architecture, Linux is popular in
both personal and enterprise environments.
● In this course, we'll explore its architecture, distributions, package
management, and hands-on activities.
Linux Architecture
Understanding the Linux architecture helps security analysts and users
understand its operation:

● User: Interacts with the computer; Linux allows multiple users at the same
time.
● Applications: Programs performing tasks, often installed via package
managers.
Linux Architecture Contd…

● Shell: Command-line interface (CLI) allowing users to communicate with the


kernel.
● Filesystem Hierarchy Standard (FHS): Organizes data and files in Linux.
● Kernel: Manages processes and memory; the heart of Linux.
● Hardware: The physical components like RAM, CPU, and peripherals
(keyboard, mouse, etc.).
Linux Distributions

Different Linux distributions cater to various needs:

● KALI LINUX: Popular in the security industry for penetration testing and digital
forensics.
● Ubuntu: User-friendly, widely used with CLI and GUI options.
● Parrot: Security-focused, often used in penetration testing.
● Red Hat® Enterprise Linux®: Paid, enterprise-focused with strong support.
● CentOS: Free alternative to Red Hat without enterprise-level support.
Package Managers in Linux OS

● Package: Software that can be combined with other packages to form


applications.
● Package Manager: Tools used to install, manage, and remove packages
efficiently.
○ Helps resolve dependency issues.
○ Keeps packages up-to-date with security patches and bug fixes.
Types of Linux Package Managers

Package managers depend on the Linux distribution:

● Red Hat Package Manager (RPM): Used for Red Hat-derived systems, files
end in .rpm.
● Debian Package Manager (dpkg): Used for Debian-derived systems like
Ubuntu and Kali, files end in .deb.
● Package Management Tools: Tools like APT (for Debian) and YUM (for Red
Hat) to manage packages via the shell.
The Shell in Linux OS

The shell interprets commands from the user and communicates with the kernel:

● Types: Popular shells include bash, ksh, zsh, and others.


● Instructions: Perform tasks using Linux commands.
● Prompts: Bash uses $, while other shells may use %.
● Bash is the default and most popular shell in cybersecurity.
Lab Activity 1: Install Linux/Ubuntu OS

● Download and install VirtualBox.


● Download the Linux/Ubuntu OVA file.
● Load the OS into VirtualBox for use.
Lab Activity 2: Install Software in Linux

● Confirm that APT is installed in Bash.


● Install and manage software using APT:
● Install Suricata and tcpdump.
● Uninstall and reinstall software as needed.
Lab Activity 3: Examine I/O in Linux Shell

● Generate outputs using the echo command.


● Perform basic calculations with expr.
● Clear the shell with the clear command.
● Explore more shell commands and their functions.
Conclusion

● Linux is an essential tool for cybersecurity professionals due to its flexibility,


security, and open-source nature.
● Understanding its architecture, package management, and shell commands
will enhance your ability to work with Linux systems effectively.

You might also like