Social Engineering
Definition: The process by which intruders gain access to facilities, network, systems, data and even employees by exploiting the generally […]
Social Engineering Read Post »
Definition: The process by which intruders gain access to facilities, network, systems, data and even employees by exploiting the generally […]
Social Engineering Read Post »
Compare and Contrast type of attacks Social Engineering Phishing, Spear Phishing , Whaling, Vishing, Tailgating, Impersonation, Dumpster Diving, Shoulder
Types of Cyber Attacks Read Post »
Types of Malware Viruses Crypto Malware Ransomware Worm Trojan Rootkit Keylogger Adware Spyware Bots RAT Logic bomb Backdoor Malware Attacks
Understand correct locations of files under the FHS. Find files and commands on a linux system. Know the location and
104.7 Find System Files and Place files in correct location Read Post »
Create links Identify hard and soft links. Copying versus linking files. Use links to support system administration tasks. Commands :
104.6 Create and Change hard-symbolic links Read Post »
Manage access permissions on regular and special files as well as directories. Use Access Modes such as SUID, SGID and
104.5 Manage file permissions and ownership Read Post »
Commands : quota, edquoata, repquota, quotation Setup Disk quota for the filesystem Disk quotas enables set storage limits for and
104.4 Manage Disk Quotas Read Post »
Manually mount and un-mount filesystems The mount and umount commads attach and detach filesystems to a mountpoint directory Mount checks
104.3 Control mounting and un-mounting of Filesystem Read Post »
Verify the integrity of the filesystems Verify free space and inodes Repair simple filesystem problems Commands: du, df , fsck,
104.2 Maintain integrity of Filesystem Read Post »
LX-103 – 104 104.1 Create Partitions and Filesystems Manage MBR partitions table Use various mkfs commands to create various filesystems
Linux + Devices, Filesystems, Filesystems Hierarchy Standard Read Post »