Training course - The basis of Linux systems

Description of this training course

This immersive training course will give you the skills you need to understand Linux systems, their architecture, and the basic commands for administration and security. Through practical exercises on real-life environments, you'll learn how to navigate the file system, manage users, and secure your Linux system.

Training content

Teaching objectives

At the end of the course, participants will be able to :

  • Understand the basics of Linux systems and their architecture.
  • Install and configure a Linux system.
  • Learn how to navigate the file system and manage users.
  • Understand good security practices for Linux systems.

Introduction to Linux and installation

This module lays the foundations for understanding the history, philosophy and fundamental concepts of Linux, as well as for installing and configuring a Linux distribution.

Topics covered

  • History and philosophy of free software and Linux
  • Comparison with Windows and macOS
  • Presentation of the main Linux distributions
  • Virtualization principles
  • Installing a Linux distribution (Debian in a virtual machine)
  • Initial configuration and discovery of the graphical environment and terminal

Basic commands and file management

In this module, participants will learn how to use basic terminal commands to navigate the file system, manage files and directories, as well as permissions and owners.

Topics covered

  • Essential terminal commands (ls, cd, cp, mv, rm, mkdir, rmdir)
  • Redirections and command piping
  • Linux file system structure
  • Permission and owner management
  • Introduction to file systems, partitions and mounting

Text editors and user management

This module covers the use of command-line text editors, as well as the management of user accounts, groups and advanced permissions. Participants will also learn how to use sudo to elevate privileges, and how to modify system configuration files.

Topics covered

  • Command-line text editors (nano, vim)
  • Managing user accounts and groups
  • Advanced permissions and access rights
  • Using sudo and elevating privileges
  • Modifying system configuration files

Managing packages, services and logs

This module covers the management of software and services on a Linux system, as well as the consultation and analysis of log files for troubleshooting and system monitoring.

Topics covered

  • Package managers (apt, repositories, dependencies)
  • Installing, updating and removing software
  • Introduction to systemd and service management
  • Consulting and analyzing log files
  • System logging (journald, rsyslog)
  • Log rotation and management (logrotate)

Bash scripting and networking under Linux

This module covers the basics of Bash scripting to automate tasks, as well as the fundamental concepts of networking under Linux, configuring network interfaces and using network diagnostic tools.

Topics covered

  • Introduction to Bash scripting
  • Variables, conditions, loops and functions
  • Scheduling tasks with cron
  • Fundamental network concepts
  • Configuring network interfaces
  • Network diagnostic tools (ip, ping, netstat, traceroute)
  • Installation and configuration of simple network services

Linux security and server scenarios

This section covers good security practices for Linux systems, as well as the basic concepts involved in securing a Linux server. Participants will learn how to configure a firewall, secure common services and understand the concepts of virtualization and containerization.

Topics covered

  • Fundamentals of Linux security
  • Secure user and permissions management
  • Setting up a simple firewall
  • Securing common services
  • Introduction to Linux servers (web, database, file sharing)
  • Notions of virtualization and containerization
  • Practical exercises and synthesis of acquired knowledge

Teaching approach

The training is based on a very practical approach, with :

  • live demonstrations
  • guided exercises
  • hands-on labs
  • realistic operating scenarios

Participants will work on a deliberately vulnerable application, reproducing situations encountered during real security audits.

Requirements

This course can be run either face-to-face or remotely, depending on participants' needs and constraints. Practical exercises require the use of a virtual machine or a secure laboratory environment, which will be provided to participants.

Target audience

This course is primarily aimed at developers, system administrators, security managers/IT directors and cybersecurity consultants.

Prerequisites

Basic knowledge of web development is recommended for this course.

How to access

You can register for the course online or after an interview by videoconference.

Access time

Access to training generally takes 2 to 4 weeks, depending on participants' availability and the organization of the session.

Accessibility

As the training is mainly distance learning, it is accessible to people with reduced mobility. In the case of face-to-face training, it will take place on premises accessible to people with reduced mobility.

Supervision

Training is provided by a cybersecurity expert with almost 10 years' experience in offensive cybersecurity.

Educational follow-up

Course materials in PDF format will be provided to learners. In addition, online cybersecurity training platforms will be used.

Follow-up

Daily online registration will be carried out to track participants' attendance.

Results tracking

At the end of the course, learners will take a multiple-choice test to validate their learning.

Pricing: A partir de 2400€ HT sur 3 jours

Contact us

Do you have any questions or would you like to request a pentest? Please do not hesitate to contact us.

* Mandatory fields

Email us:

E-mail us if you have any general questions.

contact@secureaks.com

Call us:

Don't hesitate to call us if you have any general questions.

+33 (0)4 73 95 60 35

Meeting

Book a meeting to discuss your security needs.

calendly.com/secureaks-garcia
Matomo