These tutorial sessions are designed for the beginner user to understand the basics of Linux and to progress towards more detailed usage in the second half.
1st half
Week | Date | Topic | V | Commands |
---|---|---|---|---|
1 | 8/9 May | intro | 1 | |
2 | 15/16 May | 1. Intro, Adding files & folders, | 2 | ls,pwd, cd, touch, mkdir |
Delete files & Folders | 3 | rmdir, rm, rm -r | ||
1. Move & rename files & folders, | 4 | mv | ||
move folders | 5 | mv | ||
move folders 2 | 6 | mv, s by o | ||
3 | 22/23 | 2. adding user, | 7 | adduser |
secure copy | 7 | scp | ||
secure delete, | - | to search | ||
copying files using IP address, | 8 | scp | ||
ssh 01 | 9 | ssh | ||
4 | 29/30 | ssh 02 | 10 | ssh |
scp | 11 | scp | ||
passwd, extended ls, nano, cat | ls, nano, cat | |||
multiuser shared folder | 12 | |||
5/6 June | 3. Users & 4. groups | 13, 14 | adduser,deluser,id, groupadd,groupdel |
|
5. Access Control | 15 | chown,chgrp,chmod | ||
Practise session | all commands | |||
19 june | Break | |||
5 | 12/13 June 26/27 June | Test 1 - first half |
2nd half
Week | Date | Topic | Commands |
---|---|---|---|
2-1 | 3 July | Networking - ARP, - IP spoofing | arp, v1 v2 v3 |
2-2 | 10 July | Networking - Hostname, Phishing Vulnerabilities - Pentest, weakness, threats | nmap v1 v2 |
2-3 | 17 July | Prevention - Block IP - Keys | Block IP v1 |
2-4 | 24 July | Detection - Log Files | Log, dmesg |
2-5 | 31 July | Backup | cronjob,rsync |
2-6 | 7/8 Aug | Test 2 - second half | |
Assignment 2 | |||
Study Week | |||
Exam Week |