Objective: Given a scenario, students will use appropriate software tools to assess the security posture of an organization.
Resources:
- See PowerPoint presentation: 2.2.2 – Command Line Security Tools
Assignment:
- Begin reading the 2.2.2 – Command Line Security Tools presentation. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
- Download the Linux Commands Cheat Sheet.pdf file to use as a quick resource for the useful Linux commands and tools that we have studied thus far.
Assigned: February 16th, 2021
Teacher Pacing Due Date: February 17th, 2021