A terminal-based text editor that is popular for its minimalistic and beginner-friendly approach to file editing, inserting, deleting, and searching for text.
nano
Used to quickly display file contents in the Linux terminal.
cat
A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Firewall
Provides an encrypted communication channel for issuing shell commands to a network connected computer.
ssh
A running instance of a program.
Process
The most frequently used command in Linux to list directories.
ls
Allows you to transfer files between two computers using the SSH protocol to provide both authentication and encryption.
scp
Network layer protocol used by devices to diagnose communication issues.
ICMP
A comprehensive vulnerability scanning tool that helps organizations detect and assess security vulnerabilities across their network infrastructure.
Nessus
An open-source operating system (OS) that directly manages a system’s hardware and resources, like CPU, memory, and storage.
Linux
A network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
ssh
Allows a user to execute multiple commands as another user.
su
The process of investigating network communication details by decoding available protocols and fields.
Packet Dissection (Sniffing)
A program used to find live hosts on a network, perform port scanning, ping sweeps, OS detection, and version detection.
nmap
The act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain additional access to resources that are normally protected from an application or user.
Privilege Escalation
This command allows us to download files from the web via HTTP -- as if you were accessing the file in your browser.
wget
A command that will let a user run single admin-level commands without having to be an admin.
sudo
These are implemented to monitor, prevent, detect, investigate, and respond to cyber threats around the clock.
Security Operations Center (SOC)
A collection of tools used to install, update, remove, and otherwise manage software packages.
Advanced Packaging Tool (apt)
The concept of ensuring that users can only do what they need to do, and not give them the ability to do things they are not supposed to.
Principle of Least Privilege
Special files or actions that can be scheduled and/or repeated at a specified time. (cron table)
crontab
A command-line utility for searching plain-text data sets for lines that match a regular expression.
grep
A covert cyber attack on a computer network where the attacker gains and maintains unauthorized access to the targeted network and remains undetected for a significant period.
Advanced Persistent Threat (APT)
A collection of libraries and utilities that are used for managing the services on a Linux or Unix-based computer.
systemctl
A software implementation that replicates a physical computer and allows the execution of multiple operating systems and applications on a single physical host.
Virtual Machine