Tools of the Trade: Linux and SQL
About this Course
This course focuses on foundational computing skills that support the work of a security analyst. It begins with an introduction to computer operating systems, followed by a closer exploration of Linux, an operating system commonly used by security professionals. By the end of this course, learners will be able to use the Linux command line through the Bash shell to navigate and manage the file system and to authenticate and authorize users, and they will also be able to use SQL to communicate with a database. By the end of this course, you will: - Explain the relationship between operating systems, applications, and hardware. - Compare a graphical user interface to a command line interface. - Identify the unique features of common Linux distributions. - Navigate and manage the file system using Linux commands via the Bash shell. - Use Linux commands via the Bash shell to authenticate and authorize users. - Describe how a relational database is organized. - Use SQL to retrieve information from a database. - Apply filters to SQL queries and use joins to combine multiple tables.Created by: Google

Related Online Courses
Dive into the world of Microservices Architectures with this comprehensive course, designed to provide a clear understanding of both the theoretical and practical aspects of building scalable and... more
Are you working with DevOps to help more efficiently and cost-effectively bring value to your customers? Curious about how AIOps could further strengthen this collaboration by helping to refine... more
At the end of this project, you will have all the basic skills to create a professional Newsletter using Canva, an online tool for creating and editing Marketing visuals. You will be able to share... more
Embark on the \"Data Wrangling with MongoDB\" course journey, designed to introduce you to the effective methods of MongoDB for improved cost-efficiency and optimal database performance. Throughout... more
This Specialization is intended for cybersecurity professionals seeking to develop their network security skills and knowledge. Through five courses, you will learn how to deploy, design, manage,... more