Introduction

Cybersecurity Ops with bash - Attack, Defend. and Analyze from the Command line

This Section is Not a "Git Clone" Section, which we will be using commands that are the build-in tools that comes by default in the Operating Systems ( Unix, Windows, MacOS)

In this introduction, we will be reviewing/learning concept in cybersecurity while learning applying them in the command line.

The Shell

A shell is a program that takes commands typed by the user and calls the operating system to run those commands. its a program that acts as the interface between you and the system kernel, allowing you to enter commands for the operating system to execute.

Last updated