Layered Architecture Configuration Scripts Kernel & Shell Shell Variables Common UNIX Flavors Environment Variables System Boot Up Set & unset of variables Virtual Consoles Exporting Variables Configuring Shell Linux Fundamentals Use of /etc/profile and .profile Introduction to Bash shell Exit status of a Command Getting Started Shell prompts cat Command Linux Command Arguments & Options Standard Files Basic Commands I/O Redirection pwd, date, who, id Sample Shell script uname, whereis, tty Executing a Shell script Getting help on Commands Passing parameters to Shell script Managing Files & Directories Arithmetic Operations Hard Link & Soft Link Logical Operations vi Editor Conditional Statements Files & Directories Search Iterative Statments find command Case Statements Filters Functionss tee, wc, tr, cut Debugging Shell scripts sort, head, tail more, less, grep Linux/Unix Backup Tool File System Commands Backup through tar / cpio / dd commands df & du Recovering single / multiple files Awk Programming Language Working with Run Levels Linux/Unix Networking Shutting the System down IPv4 Fundamentals System Directories TCP/UDP Fundamentals Linux Network Interfaces User Management Services & Ports User and Group Concepts ping Creating, modifying and deleting User Accounts telnet Creating, modifying and deleting Group ssh Accounts netstat tool Password Aging Default User Files Job Scheduling The su command switch between users Scheduling jobs through at & cron Understanding File and Directory Permissions Managing access permissions to at & cron chown & chgrp utilities umask command crontab file format
Process Management Performance Monitoring & Troubleshooting
Viewing Processes System Status Resource Consumption Process Tree & Process Status System Status Memory Usage ps & pstree commands System Status I/O Activity Identifying System & Daemon Processes System Status CPU Usage Foreground and Background Processes Resource Usage Trends Tuning Process Scheduling top, iostat, vmstat, sar commands Process Priority Troubleshooting Methods nice & renice commands Process Profiling Killing / Terminating a Processes Process Syscall Tracing strace Max Processes per User ulimit Process Libcall Tracing ltrace Process Kernel/User Space Time Check Software Package Management Filesystem Corruptions and Recovery Software Repositories Redhat Vs. Debian Installation of Linux OS Redhat Tools rpm and yum Partition Considerations Debian Tools dpkg and apt-get Installing Linux DVD/Virtual Machine
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition
Hacking with Kali Linux: A Step by Step Guide to Learn the Basics of Linux Penetration. What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security. Tools Explanation Included
Mastering Linux Security and Hardening - Second Edition: Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition