Background

Linux

Master the Command Line

"When you touch the terminal, you're not just typing — you're commanding the raw soul of your machine."


This section is collection of linux topics. You are going to learn alot of things about linux from surface to depth.

Comprehensive Linux Curriculum

From fundamentals to advanced cybersecurity, master every aspect of Linux systems

  1. 6 Topics

    Linux Architecture & Fundamentals

    1. Linux Distributions
    2. Linux Kernel
    3. User Space vs Kernel Space
    4. Linux Boot Process
    5. Filesystem Hierarchy (FHS)
    6. Shells
  2. 6 Topics

    User & Permission Management

    1. User Accounts
    2. Group & Privilege Management
    3. Linux Permissions
    4. Special Permissions
    5. ACLs (Access Control Lists)
    6. Authentication Mechanisms
  3. 6 Topics

    Linux Security & Hardening

    1. Security Baselines
    2. System Hardening
    3. File Integrity Monitoring
    4. Secure Boot & BIOS Locking
    5. Secure Configuration of Services
    6. Kernel Hardening
  4. 5 Topics

    Linux Authentication & Credential Security

    1. SSH Security
    2. PAM Configuration
    3. Password Policies
    4. Shadow File Protection
    5. Brute-Force Protection
  5. 8 Topics

    Linux Filesystem Forensics

    1. Metadata & Timestamps (MACB)
    2. Hidden Files & Directories
    3. Alternate File Streams (e.g., btrfs extended attributes)
    4. Journaling File Systems (ext4, XFS)
    5. Inode Analysis
    6. Mount & Loopback Devices
    7. File Carving
    8. Deleted File Recovery
  6. 3 Topics

    Linux Memory Forensics & Analysis

    1. Memory Dumping
    2. Tools
    3. Analysis Areas
  7. 6 Topics

    Log Analysis & Audit

    1. Syslog Architecture
    2. Audit Framework
    3. Journalctl (systemd logs)
    4. Log Forwarding
    5. Log Tampering Detection
    6. Bash History Forensics
  8. 6 Topics

    Process & Service Security

    1. Process Hierarchy
    2. Malicious Process Detection
    3. Systemd Services
    4. Daemon and Cron Analysis
    5. Zombie and Orphan Processes
    6. Kernel Process Hooks
  9. 4 Topics

    Shell, Bash, and Scripting Security

    1. Shell Scripting Basics
    2. Secure Scripting Practices
    3. Cron Jobs
    4. Reverse Shell Detection
  10. 7 Topics

    Linux Networking & Security

    1. Network Interfaces
    2. Port Monitoring
    3. Firewall Management
    4. Network Tunneling
    5. DNS, DHCP, ARP Security
    6. Detection of Network Sniffers
    7. Packet Inspection & Logging
  11. 7 Topics

    Malware & Rootkit Analysis

    1. Static Binary Analysis
    2. Dynamic Analysis
    3. Rootkit Detection
    4. Indicators of Compromise
    5. YARA Rules
    6. ELF Binary Forensics
    7. Malware Sandbox (Cuckoo for Linux)
  12. 8 Topics

    Privilege Escalation on Linux

    1. Enumeration Tools
    2. Kernel Exploits
    3. SUID Binaries
    4. Misconfigured Cron Jobs
    5. Writable Scripts/Files Executed by Root
    6. Path Hijacking
    7. NFS Root Squash
    8. Capabilities Abuse
  13. 5 Topics

    Linux Penetration Testing

    1. Enumeration & Recon
    2. Exploitation
    3. Post-Exploitation
    4. Pivoting & Lateral Movement
    5. Evasion Techniques
  14. 8 Topics

    Linux Persistence Techniques

    1. Cron Jobs
    2. Systemd Services
    3. rc.local
    4. Bashrc/Profiles
    5. SSH Key Injection
    6. Malicious Kernel Module
    7. Udev Rules
    8. Logon Scripts
  15. 4 Topics

    Linux Container & Cloud Security

    1. Docker Security
    2. Kubernetes (k8s) Security
    3. Linux in AWS, Azure, GCP
    4. Container Hardening
  16. 7 Topics

    Linux Tools for Cybersecurity

    1. Audit & Forensics
    2. Monitoring Tools
    3. PenTest Tools
    4. Security Automation
    5. Intrusion Detection
    6. Memory & Live Response
    7. Sysmon for Linux
  17. 3 Topics

    Training & Certification

    1. Certifications
    2. Hands-On Labs
    3. Learning Platforms

📞 Contact Us

We're always here to help!

© 2024 cyberuniversity.tech. All rights reserved.Term of service, Privacy Policy