Cybersecurity Tutorials

Our cybersecurity tutorials offer a comprehensive way to learn digital defense strategies and techniques. They cover various aspects of information security, suitable for both beginners and security professionals. Through hands - on labs and practical examples, you'll gain experience in threat detection, prevention, and mitigation. Our secure playground allows you to practice cybersecurity techniques in a controlled environment.

Process Arguments in Bash Scripts

Process Arguments in Bash Scripts

In this RHCSA 9 challenge, you will create a bash script that processes command-line arguments, demonstrating essential scripting skills required for the RHCSA exam. Practice file creation, permission management, and bash scripting techniques on Red Hat Enterprise Linux 9.
LinuxShell
Create and Manipulate Symbolic Links

Create and Manipulate Symbolic Links

Practice creating and manipulating symbolic links (soft links) in a Linux system, an essential skill for the RHCSA certification exam. Learn to create, modify, and understand the behavior of symbolic links when target files are removed.
Linux
Locate Setuid Files

Locate Setuid Files

Discover how to locate and list setuid files on Red Hat Enterprise Linux 9, a crucial skill for the RHCSA 9 exam. Practice using the find command to identify special executables that run with the permissions of the file owner. Master file permission management and enhance your system security knowledge through this hands-on challenge.
Linux
Connect to Remote

Connect to Remote

In this lab, you will learn how to use the Linux ssh command to remotely connect to and manage other Linux systems. You'll practice connecting to a local system, executing remote commands, using pseudo-terminal allocation, and creating remote files. These skills are essential for system administrators and network engineers for secure remote system management.
Linux
Discover Linux System Information

Discover Linux System Information

Learn how to use essential Linux commands like uname, hostname, and date to display system information, hostname, and current date/time. This hands-on lab covers basic usage and output formatting for these commands.
Linux
Secure File Transfer Basics

Secure File Transfer Basics

This lab will cover the basics of using the Linux command line to transfer files using SFTP, FTP, and SCP. These tools are commonly used to transfer files to and from remote servers, and can be useful for tasks such as uploading website files to a server or downloading data from a remote machine.
Linux
File System and Disk Management

File System and Disk Management

Learn essential Linux file system and disk management skills in this hands-on lab. Learn to use key commands like df, du, dd, and fdisk to monitor disk usage, manage virtual disks, and maintain file system integrity. This lab provides practical experience in tasks crucial for system administrators and power users.
Linux
Download Files from the Internet

Download Files from the Internet

Learn the use of curl and wget commands to download files from the internet. Learn how to download single and multiple files, specify custom filenames, and save files to specific directories using these powerful command-line tools.
Linux
Quick Start to Hive

Quick Start to Hive

This lab focuses on Hive's configuration and basic operations, designed for students with a certain SQL foundation to understand Hive's architecture, basic deployment and usage.
Linux
Hadoop Installation and Deployment

Hadoop Installation and Deployment

This lab is mainly about the foundations of Hadoop and is written for students with a certain Linux foundation to understand the architecture of the Hadoop software system, as well as the basic deployment methods.
Linux
YARN Architecture and Development

YARN Architecture and Development

In the Hadoop versions 2.0 and later, the new resource management pattern of YARN was introduced, which facilitates the cluster in terms of utilization, unified resource management and data sharing. Based on the foundation of building the Hadoop pseudo-distributed cluster, this section will let you learn the architecture, the working principle, configuration, and development and monitoring techniques of the YARN framework.
Linux
How to check if a port is open in Linux

How to check if a port is open in Linux

In this lab, you will learn essential techniques for checking the status of network ports on a Linux system. Understanding which ports are open is fundamental for network administration, troubleshooting, and security analysis. You will use netstat, ss, and nc commands to list, confirm, and test port connectivity.
Linux
How to check if a variable is defined in Linux

How to check if a variable is defined in Linux

In this lab, you will learn fundamental techniques for working with variables in the Linux command line. You will begin by mastering how to display the values of variables using the `echo` command, a crucial skill for inspecting environment settings and other stored information. Following this, you will explore how to check for the existence or emptiness of variables using the `test` command with the `-z` option, which is essential for conditional logic in scripting. Finally, you will discover how to list all currently defined environment variables using the `env` command, providing a comprehensive view of your shell's environment.
Linux
How to check if a service is active in Linux

How to check if a service is active in Linux

In this lab, you will learn how to check the status of services running on a Linux system using modern and older commands. You will explore `systemctl status`, the `service` command, and verify processes with `ps aux`. This hands-on experience will equip you with essential skills for monitoring and managing services in Linux.
Linux
How to check if a user account exists in Linux

How to check if a user account exists in Linux

In this lab, you will learn how to check if a user account exists on a Linux system using several common methods. We will explore how to query user existence with the `id` command, search for user entries within the `/etc/passwd` file, and validate user information using the `getent passwd` command. These techniques provide different ways to quickly and effectively determine the presence of a user account.
Linux
How to check if a process is running in Linux

How to check if a process is running in Linux

In this lab, you will learn fundamental Linux skills for managing and monitoring processes. You will explore how to list all running processes using `ps aux`, find specific processes with `pgrep`, and monitor real-time activity with `top`. These techniques are essential for system administration and troubleshooting.
Linux
How to check if a file is empty in Linux

How to check if a file is empty in Linux

In this lab, you will learn how to check if a file is empty in Linux using different command-line tools. You will explore three common methods: using the `test -s` command to check file size, employing the `wc -c` command to count the number of bytes in a file, and finally, examining the file's contents directly with the `cat` command. Through hands-on examples, you will understand how each method works and how to interpret their output to determine if a file contains data.
Linux
How to check if a command is available in Linux

How to check if a command is available in Linux

In this lab, you will learn how to determine if a command is available in Linux and where it is located. You will explore three different methods: using the `which` command to find the executable path, using `command -v` to verify presence and identify built-in commands or aliases, and using the `type` command to check the command's type. By completing these steps, you will gain practical skills in identifying and locating commands within your Linux environment, which is essential for effective command-line usage and troubleshooting.
Linux
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 174
  • Next