From the course: CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) Cert Prep: 1 Security Operations

Unlock the full course today

Join today to access over 23,000 courses taught by industry experts.

Shell and script environments

Shell and script environments

- [Instructor] Cybersecurity analysts often need to reach deep into the inner workings of systems and it's often far easier to do this at the command line than by using graphical tools. Shell environments provide direct access to these command lines where administrators can enter commands to the operating system. Shell environments also provide administrators with the ability to create scripts that contain pre-written code designed to execute operating system commands. These shell scripts are programs that allow the automation of a good deal of routine administrative work. The Secure Shell or SSH command allows us to access remote Linux systems over an encrypted connection. SSH uses TCP port 22 to establish encrypted connections to a remote Linux system where the user can enter shell commands. Here, I am at the command line on my Mac. I'm going to SSH to a remote Linux system using the SSH command. I'm going to use the -i…

Contents