Commands
More Commands
Monitoring
Tools
Matter Unorganized
100

A terminal-based text editor that is popular for its minimalistic and beginner-friendly approach to file editing, inserting, deleting, and searching for text.

nano

100

Used to quickly display file contents in the Linux terminal.

cat

100

A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

Firewall

100

Provides an encrypted communication channel for issuing shell commands to a network connected computer.

ssh

100

A running instance of a program.

Process

200

The most frequently used command in Linux to list directories.

ls

200

Allows you to transfer files between two computers using the SSH protocol to provide both authentication and encryption.

scp

200

Network layer protocol used by devices to diagnose communication issues.

ICMP

200

A comprehensive vulnerability scanning tool that helps organizations detect and assess security vulnerabilities across their network infrastructure.

Nessus

200

An open-source operating system (OS) that directly manages a system’s hardware and resources, like CPU, memory, and storage.

Linux

300

A network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

ssh

300

Allows a user to execute multiple commands as another user.

su

300

The process of investigating network communication details by decoding available protocols and fields.

Packet Dissection (Sniffing)

300

A program used to find live hosts on a network, perform port scanning, ping sweeps, OS detection, and version detection.

nmap

300

The act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain additional access to resources that are normally protected from an application or user.

Privilege Escalation

400

This command allows us to download files from the web via HTTP -- as if you were accessing the file in your browser.

wget

400

A command that will let a user run single admin-level commands without having to be an admin.

sudo

400

These are implemented to monitor, prevent, detect, investigate, and respond to cyber threats around the clock.

Security Operations Center (SOC)

400

A collection of tools used to install, update, remove, and otherwise manage software packages.

Advanced Packaging Tool (apt)

400

The concept of ensuring that users can only do what they need to do, and not give them the ability to do things they are not supposed to.

Principle of Least Privilege

500

Special files or actions that can be scheduled and/or repeated at a specified time. (cron table)

crontab

500

A command-line utility for searching plain-text data sets for lines that match a regular expression.

grep

500

A covert cyber attack on a computer network where the attacker gains and maintains unauthorized access to the targeted network and remains undetected for a significant period.

Advanced Persistent Threat (APT)

500

A collection of libraries and utilities that are used for managing the services on a Linux or Unix-based computer.

systemctl

500

A software implementation that replicates a physical computer and allows the execution of multiple operating systems and applications on a single physical host.

Virtual Machine

M
e
n
u