https://github.com/sondosaabed/tools-of-the-trade-linux-and-sql
In this course, I have explored computing skills that I will use on-the-job as a cybersecurity analyst. First, I practiced using Linux OS commonly used by cybersecurity professionals. Used the Linux command line through the Bash shell to navigate, manage the file system, authenticate users. Then, I have used SQL to communicate with a database.
https://github.com/sondosaabed/tools-of-the-trade-linux-and-sql
cybersecurity linux operating-system python sql
Last synced: 3 months ago
JSON representation
In this course, I have explored computing skills that I will use on-the-job as a cybersecurity analyst. First, I practiced using Linux OS commonly used by cybersecurity professionals. Used the Linux command line through the Bash shell to navigate, manage the file system, authenticate users. Then, I have used SQL to communicate with a database.
- Host: GitHub
- URL: https://github.com/sondosaabed/tools-of-the-trade-linux-and-sql
- Owner: sondosaabed
- License: mit
- Created: 2024-07-19T18:53:13.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-07-24T23:38:36.000Z (about 1 year ago)
- Last Synced: 2025-03-23T23:42:55.662Z (7 months ago)
- Topics: cybersecurity, linux, operating-system, python, sql
- Language: Jupyter Notebook
- Homepage: https://coursera.org/verify/HDS8WLQVTGYL
- Size: 1.08 MB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Tools-of-the-Trade-Linux-and-SQL
In this course, I have explored computing skills that I will use on-the-job as a cybersecurity analyst. First, I practiced using Linux operating system commonly used by cybersecurity professionals. Used the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, I have used SQL to communicate with a database.
## Skills set
- Explaining the relationship between operating systems, applications, and hardware.
- Comparing a graphical user interface to a command line interface.
- Identifying the unique features of common Linux distributions.
- Navigating and manage the file system using Linux commands via the Bash shell.
- Using Linux commands via the Bash shell to authenticate and authorize users.
- Describing how a relational database is organized.
- Using SQL to retrieve information from a database.
- Applying filters to SQL queries and use joins to combine multiple tables.
## Modules
### Module 1: Introduction to operating systems
Learned about the relationship between operating systems, hardware, and software, and became familiar with the primary functions of an operating system. Recognized common operating systems in use today and understanding how the graphical user interface (GUI) and command-line interface (CLI) both allow users to interact with the operating system.### Module 2: The Linux operating system
Introduced to the Linux operating system and learned how it is commonly used in cybersecurity. Also learned about Linux architecture and common Linux distributions. In addition, introduced to the Linux shell and learned how it allows communication with the operating system.### Module 3: Linux commands in the Bash shell
Introduced to Linux commands as entered through the Bash shell. Used the Bash shell to navigate and manage the file system and to authorize and authenticate users. Learned where to go for help when working with new Linux commands.### Module 4: Databases and SQL
Practice using SQL to communicate with databases. Learned how to query a database and filter the results. Also learned how SQL can join multiple tables together in a query.## Course Certificate
