YoVDO

Linux Essentials for Hackers

Offered By: HackerSploit via YouTube

Tags

Linux Courses File Management Courses grep Courses SSH Security Courses

Course Description

Overview

Dive into a comprehensive 14-hour course designed to equip hackers with essential Linux skills. Master file management, permissions, and ownership, while learning powerful command-line tools like grep, find, and locate. Explore disk usage, file compression, and user management techniques. Delve into networking concepts, including TOR and Proxychains, and gain proficiency in service and process management. Enhance your security knowledge with SSH best practices, UFW firewall configuration, and log clearing techniques. Complete hands-on exercises through OverTheWire Bandit challenges, and discover advanced topics such as tmux, ZSH, DNS management, and securing web servers. Develop practical skills in Docker security, traffic anonymization, and creating custom pentesting distributions.

Syllabus

Linux Essentials For Hackers - #1 - Introduction.
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts.
Linux Essentials For Hackers - #3 - File Management & Manipulation.
Linux Essentials For Hackers - #4 - File & Directory Permissions.
Linux Essentials For Hackers - #5 - File & Directory Ownership.
Linux Essentials For Hackers - #6 - grep & piping.
Linux Essentials For Hackers - #7 - Finding Files With Locate.
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information.
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge.
Linux Essentials For Hackers - #10 - Shells & Bash Configuration.
Linux Essentials For Hackers - #11 - Disk Usage.
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar.
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo.
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover).
Linux Essentials For Hackers - #15 - TOR & Proxychains.
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl).
Linux Essentials For Hackers - #17 - SSH And SSH Security.
Linux Essentials: Curl Fundamentals.
UFW Firewall (Uncomplicated Firewall) - Complete Tutorial.
How To Clear Tracks & Logs On Linux.
SSH Brute Force Protection With Fail2Ban.
OverTheWire Bandit Walkthrough - Level 0 - 6.
OverTheWire Bandit Walkthrough - Level 7 - 11.
OverTheWire Bandit Walkthrough - Level 12.
OverTheWire Bandit Walkthrough - Level 13 - 18.
OverTheWire Bandit Walkthrough - Level 19 - 20.
OverTheWire Bandit Walkthrough - Level 21 - 23.
OverTheWire Bandit Walkthrough - Level 24 - 26.
OverTheWire Bandit Walkthrough - Level 27 - 31.
OverTheWire Bandit Walkthrough - Level 32 - 33.
Complete tmux Tutorial.
Switching To ZSH.
Managing DNS With resolvconf.
Linux Security - SSH Security Essentials.
Linux Security - Configuring SUDO Access.
Linux Security - Securing Apache2.
Linux Security - Securing Nginx.
Linux Security - UFW Complete Guide (Uncomplicated Firewall).
Best Ways To Learn Linux.
How To Secure phpMyAdmin.
Apache2 ModSecurity Tutorial | Apache2 WAF.
Nginx ModSecurity Tutorial | Nginx WAF.
Docker Security Essentials | How To Secure Docker Containers.
Anonymize Your Traffic With Proxychains & Tor.
Log4J - CVE 2021-44228 (Log4Shell) - Exploitation & Mitigation.
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation.
How To Create Your Own Pentesting Distribution.


Taught by

HackerSploit

Related Courses

Automation Workflow in Adobe InDesign
CreativeLive
Bash Patterns and Regular Expressions
LinkedIn Learning
Introduction to GREP in InDesign
LinkedIn Learning
Introduction to GREP in InDesign
LinkedIn Learning
Bash Shell scripting and automation
Udemy