TCM Security Academy Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • TCM Security Academy Notes
  • Courses
    • TCM - Linux 101
      • 1. Introduction
        • Linux Distributions
        • Installing Linux
      • 2. Command Line
        • Intro to Command Line
        • Getting help on the Command Line
        • Command Line Arguments and Options
        • Reading Text Files
      • 3. File System
        • Filesystem Hierarchy Standard
        • Devices, Partitions and Mounting
        • Absolute and Relative Paths
        • Files and Directories
        • Paths, Filenames and Text Files
        • Filesystem Links
        • Archiving and Searching Files
      • 4. Users and Groups
        • Working with Users and Groups
        • File and Directory Permissions
        • Changing Users and Passwords
      • 5. Installing Software
        • Package Management
      • 6. Shells
        • Common Command Line Shells
        • Environment Variables & Startup Files
        • Input/Output Redirection
        • Command History & Substitution
      • 7. Utilities and File Editors
        • Searching and Processing Text
        • Networking at the Command Line
        • File Transfer
        • Text Editors and Converters
      • 8. Process Management
        • Process Information
        • Foreground and Background Processes
        • Managing Processes
        • Scheduling Processes
      • 9. Regular Expressions
        • Regular Expressions, Searching, Replacing, Building
      • 10. Bash Scripting
        • Bash Scripting Basics, Control Structures, Loops
      • 🌐Linux101 References
    • TCM - Mobile Application Penetration Testing
      • 1. Introduction & Mobile Pentesting
      • 2. Android Security
      • 3. Android Lab Setup
      • 4. Android Static Analysis
      • 5. Android Dynamic Analysis
      • 6. Android Bug Bounty
      • 7. iOS Security
      • 8. iOS Lab Setup
      • 9. iOS Static Analysis
      • 10. iOS Dynamic Analysis
      • 11. iOS Bug Bounty
      • 🌐MAPT References
    • TCM - Practical Ethical Hacking
      • 1. Introduction & Networking
      • 2. Lab Set Up, Linux & Python
        • Intro to Kali Linux
        • Intro to Python
      • 3. The Ethical Hacker Methodology
        • Information Gathering
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • Capstone Practical Labs
      • 4. Active Directory
        • Active Directory Lab
        • AD - Initial Attack Vectors
        • AD - Post-Compromise Enumeration
        • AD - Post-Compromise Attacks
        • AD - Additional Attacks
        • AD - Case Studies
      • 5. Post Exploitation
      • 6. Web Application
        • Web App Lab Setup
        • Web App - SQL Injection
        • Web App - XSS
        • Web App - Command Injection
        • Web App - Insecure File Upload
        • Web App - Authentication Attacks
        • Web App - XXE
        • Web App - IDOR
        • Web App - Capstone Practical Lab
      • 7. Wireless Attacks
      • 8. Legal Documentation & Report Writing
      • 🌐PEH References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Introduction
  • Command Line basics
  • Files and the Filesystem
  • Users and Groups
  • Installing Software
  • Shell basics
  • Utilities and File editors
  • Process Management
  • Regular Expressions
  • Bash Scripting

Was this helpful?

Edit on GitHub
  1. Courses
  2. TCM - Linux 101

Linux101 References

PreviousBash Scripting Basics, Control Structures, LoopsNextTCM - Mobile Application Penetration Testing

Last updated 7 months ago

Was this helpful?

  • - by Brent Eskridge

Introduction

Command Line basics

Files and the Filesystem

Users and Groups

Installing Software

Shell basics

Utilities and File editors

Process Management

Regular Expressions

Bash Scripting


🌐
Linux101 Course
TCM Linux101-Resources
Supplementary exercises
Linux Distributions Timeline
Ubuntu
Kali
ParrotOS
VirtualBox Ubuntu Installation
The Linux man-pages project
Explain-Shell
Shell-How
Command-not-found
ls
less
cat
Bash Aliases
Filesystem Hierarchy Standard
FHS - Wikipedia
df
du
Size of a directory
Absolute vs Relative Path
cp
rm
Shell Expansions
tail
diff
Soft Link And Hard Link
tar
gzip
find
which
locate
UID
who
/etc/passwd
/etc/shadow
/etc/group
Linux File Permissions
chmod
chmod Calculator
chown
sudo
passwd
root password
Deb Packages install
apt
Rpm Packages install
yum
gcc
checkinstall
Common Shells
Bash
zsh
Oh My Zsh
Learn Shell
Environment Variables
Bash Startup Files
Bash Write to File
History
grep
Regex in Grep
sort
wc
sed
sed Manual - gnu.org
awk
awk Manual - gnu.org
tr
ping
ifconfig
ip
Listening Ports
scp
rsync
rsync over SSH
file
nano editor
nano usage
nano keyboard shortcuts
vim
vim help files
vim cheat sheet
ps
pstree
top
htop
jobs-fg-bg Background processes
Zombie Process
Kill a Process
kill
pkill
sleep
crontab.guru
crontab
List cron jobs
Linux Run Levels
Ubuntu Bootup
grep Regular Expressions
grep regex examples
Online RegExr tool
Regex101 tool
Cyrilex tool
EmailRegex Examples
Bash Shell Scripting - Wikibooks
shebang