<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Dev1992</provider_name><provider_url>https://dev1992.com</provider_url><author_name>Bot Doe</author_name><author_url>https://dev1992.com/index.php/author/bot/</author_url><title>Cup&#xF3;n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="up3lOJR7K0"&gt;&lt;a href="https://dev1992.com/index.php/2023/01/29/cyber-security-intermediate-linux-commands/"&gt;Cup&#xF3;n Udemy: Cyber Security: Intermediate Linux Commands&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://dev1992.com/index.php/2023/01/29/cyber-security-intermediate-linux-commands/embed/#?secret=up3lOJR7K0" width="600" height="338" title="&#xAB;Cup&#xF3;n Udemy: Cyber Security: Intermediate Linux Commands&#xBB; &#x2014; Dev1992" data-secret="up3lOJR7K0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;Leer m&#xE1;s &raquo;</description><thumbnail_url>https://img-c.udemycdn.com/course/240x135/4771642_1860_2.jpg</thumbnail_url></oembed>
