{"version":"1.0","provider_name":"Dev1992","provider_url":"https:\/\/dev1992.com","author_name":"Bot Doe","author_url":"https:\/\/dev1992.com\/index.php\/author\/bot\/","title":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"OiIEhLUrcQ\"><a href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\">Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/embed\/#?secret=OiIEhLUrcQ\" width=\"600\" height=\"338\" title=\"\u00abCup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands\u00bb \u2014 Dev1992\" data-secret=\"OiIEhLUrcQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;Leer m\u00e1s &raquo;","thumbnail_url":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg"}