Course Overview and Instructor Introduction
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
>> Welcome to Cybrary Linux
00:00
Fundamentals for Security Practitioners course.
00:00
I'm your instructor, Corey Holzer.
00:00
This module presents you with a course overview and
00:00
gives me the chance to introduce
00:00
myself as your instructor.
00:00
Let's begin the lesson.
00:00
There are two objectives for this lesson.
00:00
First, we'll summarize the course,
00:00
looking at all of its objectives,
00:00
prerequisites,
00:00
and discussing who this course is designed for.
00:00
Second, we'll review my background
00:00
and outline my qualifications.
00:00
Now this being a basic course about Linux,
00:00
there are no real prerequisites
00:00
other than an understanding of networking,
00:00
as we will be talking about
00:00
Linux's functionality and the tools that contains for
00:00
the performance of security functions
00:00
both for individual hosts and over the network.
00:00
The target audience for this course are
00:00
IT professionals who wants to
00:00
add Linux knowledge to their repertoire.
00:00
Security professionals will also gain a benefit of
00:00
the understanding of Linux as it pertains to their job.
00:00
There are several motivating reasons
00:00
for you to take this course.
00:00
Maybe you simply want to expand your IT knowledge
00:00
and develop skills in Linux that you currently lack.
00:00
Maybe your company plans to
00:00
integrate Linux and it would be a benefit for
00:00
you and for the company if
00:00
you were to develop your Linux skills.
00:00
Maybe you're eyeing a new job,
00:00
it could be your first cybersecurity job and knowing
00:00
Linux meets a defined skill requirements
00:00
for the position you desire.
00:00
Regardless the intents of this course is to
00:00
assist you in developing your skills in Linux.
00:00
Now we're currently in module 1,
00:00
doing a walk through of the course overview.
00:00
In module 2, I'm going to provide
00:00
you with some context as we review
00:00
Linux's history and talk about what
00:00
makes up Linux as an operating system.
00:00
In module 3, you're going to
00:00
start to get your hands dirty
00:00
as I show you how to use some of Linux's tools,
00:00
and then you get to employ them in
00:00
some libraries, Linux functionality labs.
00:00
In module 4,
00:00
we're going to do a review of what was covered,
00:00
and I'll provide you with
00:00
some valuable resources you can
00:00
use as you continue your Linux journey.
00:00
In addition to these video lessons,
00:00
the course provides you with the syllabus.
00:00
It also provides challenge questions to test
00:00
your understanding of the topics
00:00
of these individual lessons.
00:00
The course also employs
00:00
demonstrations where I will show you
00:00
how to use some of the tools that I
00:00
described within the video lessons.
00:00
As I mentioned previously,
00:00
there are also useful labs
00:00
where you'll start using Linux and
00:00
familiarize yourself with the commands
00:00
and tools Linux has to offer.
00:00
If you forget a command, don't worry,
00:00
I provided you with
00:00
a handy reference guide where you will
00:00
find explanations of commonly used commands.
00:00
What qualifies me to teach this course,
00:00
or really any IT or cybersecurity course?
00:00
Well, simply put, I have 30 years of
00:00
IT experience between the private and public sectors.
00:00
I've worked for numerous corporations of all sizes,
00:00
including ones that generated
00:00
10 billion US dollars per year.
00:00
I've held various titles ranging from
00:00
systems administrator to
00:00
manager of Internet technologies.
00:00
Today my job title is data systems engineer.
00:00
I hold numerous IT
00:00
and cybersecurity related certifications,
00:00
including my CISSP and CRISC and I have
00:00
multiple graduate degrees
00:00
focusing on information security,
00:00
as well as a PhD in cybersecurity.
00:00
As the last bullet says,
00:00
a fun fact about me is that I've lived in or visited
00:00
more than half of the states in
00:00
the US and eight nations around the world.
00:00
In this lesson, we covered two topics.
00:00
First, I provided you with an overview
00:00
of the course and covered its objectives,
00:00
prerequisites, as well as going
00:00
over who the course is designed to educate.
00:00
Second, I told you something about myself,
00:00
including my background and qualifications.
00:00
Thanks for joining me in this course.
00:00
I look forward to seeing you in the next lesson.
Up Next
Linux OS Structure
5m
Demystifying the Command Line or How I Learned to Love the CLI
5m
Useful Commands and How to Employ Them: Part 1
30m