{"id":976,"date":"2023-01-29T17:25:20","date_gmt":"2023-01-29T17:25:20","guid":{"rendered":"https:\/\/dev1992.com\/?p=976"},"modified":"2023-02-07T23:31:22","modified_gmt":"2023-02-07T23:31:22","slug":"cyber-security-intermediate-linux-commands","status":"publish","type":"post","link":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","title":{"rendered":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands"},"content":{"rendered":"\n    <div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Beyond the basics<\/h2>\n    \n\n    \n    <div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\" alt=\"\"\/><figcaption>Cyber Security: Intermediate Linux Commands<\/figcaption><\/figure><\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Idioma<\/h2>\n    \n\n    \n    <p>English<\/p>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Descripci\u00f3n<\/h2>\n    \n\n    \n    <p>This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux command line it should be possible to follow along with the course. Most of these commands have an equivalent that works on Mac; they should be easy to figure out how to execute if you are on one of those systems or have access to a virtual machine.You will learn learn new skills like securing sensitive data, encoding\/decoding, cracking GPG\u00a0files and more. Before staring this course, you should already have some familiarity with the Linux command line.As the name implies, this is more of a Cyber Security course than an Ethical Hacking course. But you will learn how to crack GPG\u00a0files in this course. It&#8217;s all about learning how to use these tools properly, so no evil will be done.The course teaches you commands that you should know as a Cyber Security professional working on Linux (or Mac) systems. If you use Linux and want to learn more commands for cyber security, this course is for you!Who this course is for:Beginner Ethical HackersSysadminsDevopsSoftware Developers<\/p>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n    <div class=\"wp-block-button has-custom-width wp-block-button__width-50 is-style-default\"><a class=\"wp-block-button__link has-nv-c-1-background-color has-background\" href=\"https:\/\/www.udemy.com\/course\/cyber-security-intermediate-linux-commands\/?couponCode=AUSTRALIA\" target=\"_blank\" rel=\"noreferrer noopener\">CANJEAR CURSO<\/a><\/div>\n    <\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Para m\u00e1s cursos Gratis y para ver los que siguen as\u00ed visita nuestra aplicaci\u00f3n web UFree.<\/h2>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n    <div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link has-nv-text-dark-bg-color has-neve-link-hover-color-background-color has-text-color has-background\" href=\"https:\/\/www.dev1992.com\/ufree\/#\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s cursos gratis<\/a><\/div>\n    <\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Descarga la aplicaci\u00f3n oficial!<\/h2>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n    <div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link has-nv-text-dark-bg-color has-neve-link-hover-color-background-color has-text-color has-background\" href=\"https:\/\/www.dev1992.com\/ufree\/#\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aplicaci\u00f3n oficial<\/a><\/div>\n    <\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <p><\/p>\n      <div class=\"related-post slider\">\r\n      <div class=\"post-list owl-carousel\">\r\n\r\n            <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Udemy Gratis: Introduction to database concepts &#8211; SQL Server &#8211; Udemy Free\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/15\/introduction-to-database-concepts-sql-server\/?related_post_from=2316\">\r\n        Udemy Gratis: Introduction to database concepts &#8211; SQL Server &#8211; Udemy Free  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Udemy Gratis: Introduction to database concepts &#8211; SQL Server &#8211; Udemy Free\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/15\/introduction-to-database-concepts-sql-server\/?related_post_from=2316\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Udemy Gratis: Introduction to database concepts &#8211; SQL Server &#8211; Udemy Free\" alt=\"Udemy Gratis: Introduction to database concepts &#8211; SQL Server &#8211; Udemy Free\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Using SQL Server SSMS and SQL Scripts Introduction to database concepts - SQL Server Idioma English Descripci&oacute;n This course will <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/15\/introduction-to-database-concepts-sql-server\/?related_post_from=2316\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n              <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: Midjourney AI for Passive Income: Create &#038; Sell Your Art &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/13\/midjourney-ai-for-passive-income-create-sell-your-art\/?related_post_from=2280\">\r\n        Cup\u00f3n Udemy: Midjourney AI for Passive Income: Create &#038; Sell Your Art &#8211; Udemy Coupon  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: Midjourney AI for Passive Income: Create &#038; Sell Your Art &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/13\/midjourney-ai-for-passive-income-create-sell-your-art\/?related_post_from=2280\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: Midjourney AI for Passive Income: Create &#038; Sell Your Art &#8211; Udemy Coupon\" alt=\"Cup\u00f3n Udemy: Midjourney AI for Passive Income: Create &#038; Sell Your Art &#8211; Udemy Coupon\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Unleash Your Creativity in 2023: Create &amp; Monetize Your AI Art Prompt Skills: Learn Midjourney, ChatGPT, DALL-E, &amp; More Midjourney <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/13\/midjourney-ai-for-passive-income-create-sell-your-art\/?related_post_from=2280\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n              <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: AWS Certified Database &#8211; Specialty Practice Test 2023 &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/12\/aws-certified-database-specialty-practice-test-2023\/?related_post_from=2025\">\r\n        Cup\u00f3n Udemy: AWS Certified Database &#8211; Specialty Practice Test 2023 &#8211; Udemy Coupon  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: AWS Certified Database &#8211; Specialty Practice Test 2023 &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/12\/aws-certified-database-specialty-practice-test-2023\/?related_post_from=2025\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: AWS Certified Database &#8211; Specialty Practice Test 2023 &#8211; Udemy Coupon\" alt=\"Cup\u00f3n Udemy: AWS Certified Database &#8211; Specialty Practice Test 2023 &#8211; Udemy Coupon\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Especially for you to get certified or win new knoledge on AWS Certified Database - Specialty AWS Certified Database - <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/12\/aws-certified-database-specialty-practice-test-2023\/?related_post_from=2025\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n              <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: Angular Material Basics Guide\" href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/angular-material-basics-guide\/?related_post_from=986\">\r\n        Cup\u00f3n Udemy: Angular Material Basics Guide  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: Angular Material Basics Guide\" href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/angular-material-basics-guide\/?related_post_from=986\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: Angular Material Basics Guide\" alt=\"Cup\u00f3n Udemy: Angular Material Basics Guide\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Everything you need to know about Angular Material Angular Material Basics Guide Idioma English Descripci&oacute;n Have you always wanted to <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/angular-material-basics-guide\/?related_post_from=986\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n      \r\n  <\/div>\r\n\r\n  <script>\r\n      <\/script>\r\n  <style>\r\n    .related-post {}\r\n\r\n    .related-post .post-list {\r\n      text-align: left;\r\n          }\r\n\r\n    .related-post .post-list .item {\r\n      margin: 10px;\r\n      padding: 0px;\r\n          }\r\n\r\n    .related-post .headline {\r\n      font-size: 18px !important;\r\n      color: #999999 !important;\r\n          }\r\n\r\n    .related-post .post-list .item .post_title {\r\n      font-size: 16px;\r\n      color: #3f3f3f;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n      text-decoration: none;\r\n          }\r\n\r\n    .related-post .post-list .item .post_thumb {\r\n      max-height: 220px;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n          }\r\n\r\n    .related-post .post-list .item .post_excerpt {\r\n      font-size: 13px;\r\n      color: #3f3f3f;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n      text-decoration: none;\r\n          }\r\n\r\n    .related-post .owl-dots .owl-dot {\r\n          }\r\n\r\n      <\/style>\r\n      <script>\r\n      jQuery(document).ready(function($) {\r\n        $(\".related-post .post-list\").owlCarousel({\r\n          items: 3,\r\n          responsiveClass: true,\r\n          responsive: {\r\n            0: {\r\n              items: 1,\r\n            },\r\n            768: {\r\n              items: 2,\r\n            },\r\n            1200: {\r\n              items: 3,\r\n            }\r\n          },\r\n                      rewind: true,\r\n                                loop: true,\r\n                                center: true,\r\n                                autoplay: true,\r\n            autoplayHoverPause: true,\r\n                                nav: true,\r\n            navSpeed: 1000,\r\n            navText: ['<i class=\"fas fa-chevron-left\"><\/i>', '<i class=\"fas fa-chevron-right\"><\/i>'],\r\n                                dots: true,\r\n            dotsSpeed: 1200,\r\n                                                    rtl: false,\r\n          \r\n        });\r\n      });\r\n    <\/script>\r\n  <\/div>\r\n","protected":false},"excerpt":{"rendered":"<p>Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;<a href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/12\/salesforce-adm-211-test-2023\/\" class=\"\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Cup\u00f3n Udemy: Salesforce ADM-211 Test 2023 &#8211; Udemy Coupon<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[13,14],"tags":[104,24,99,100],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992\" \/>\n<meta property=\"og:description\" content=\"Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;Leer m\u00e1s &raquo;Udemy Gratis: Ghost Notes in Drumming &#8211; Style and Placement &#8211; Udemy Free\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\" \/>\n<meta property=\"og:site_name\" content=\"Dev1992\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Dev1992.Encode\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-29T17:25:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-07T23:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\" \/>\n<meta name=\"author\" content=\"Bot Doe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Dev1992_Encode\" \/>\n<meta name=\"twitter:site\" content=\"@Dev1992_Encode\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bot Doe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\"},\"author\":{\"name\":\"Bot Doe\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341\"},\"headline\":\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands\",\"datePublished\":\"2023-01-29T17:25:20+00:00\",\"dateModified\":\"2023-02-07T23:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\"},\"wordCount\":274,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dev1992.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\",\"keywords\":[\"CursoUdemy\",\"Udemy\",\"UdemyCoupon\",\"UdemyFreeCourse\"],\"articleSection\":[\"Cursos\",\"Udemy\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\",\"url\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\",\"name\":\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992\",\"isPartOf\":{\"@id\":\"https:\/\/dev1992.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\",\"datePublished\":\"2023-01-29T17:25:20+00:00\",\"dateModified\":\"2023-02-07T23:31:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\",\"url\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\",\"contentUrl\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/dev1992.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev1992.com\/#website\",\"url\":\"https:\/\/dev1992.com\/\",\"name\":\"Dev1992\",\"description\":\"Tecnolog\u00eda, Videojuegos, Cultura y m\u00e1s.\",\"publisher\":{\"@id\":\"https:\/\/dev1992.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev1992.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dev1992.com\/#organization\",\"name\":\"Dev1992\",\"url\":\"https:\/\/dev1992.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png\",\"contentUrl\":\"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png\",\"width\":512,\"height\":512,\"caption\":\"Dev1992\"},\"image\":{\"@id\":\"https:\/\/dev1992.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Dev1992.Encode\",\"https:\/\/x.com\/Dev1992_Encode\",\"https:\/\/www.instagram.com\/dev1992._encode\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341\",\"name\":\"Bot Doe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g\",\"caption\":\"Bot Doe\"},\"sameAs\":[\"http:\/\/dev1992.com\"],\"url\":\"https:\/\/dev1992.com\/index.php\/author\/bot\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","og_locale":"es_ES","og_type":"article","og_title":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","og_description":"Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;Leer m\u00e1s &raquo;Udemy Gratis: Ghost Notes in Drumming &#8211; Style and Placement &#8211; Udemy Free","og_url":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","og_site_name":"Dev1992","article_publisher":"https:\/\/www.facebook.com\/Dev1992.Encode","article_published_time":"2023-01-29T17:25:20+00:00","article_modified_time":"2023-02-07T23:31:22+00:00","og_image":[{"url":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg"}],"author":"Bot Doe","twitter_card":"summary_large_image","twitter_creator":"@Dev1992_Encode","twitter_site":"@Dev1992_Encode","twitter_misc":{"Escrito por":"Bot Doe","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#article","isPartOf":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/"},"author":{"name":"Bot Doe","@id":"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341"},"headline":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands","datePublished":"2023-01-29T17:25:20+00:00","dateModified":"2023-02-07T23:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/"},"wordCount":274,"commentCount":0,"publisher":{"@id":"https:\/\/dev1992.com\/#organization"},"image":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg","keywords":["CursoUdemy","Udemy","UdemyCoupon","UdemyFreeCourse"],"articleSection":["Cursos","Udemy"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","url":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","name":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","isPartOf":{"@id":"https:\/\/dev1992.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage"},"image":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg","datePublished":"2023-01-29T17:25:20+00:00","dateModified":"2023-02-07T23:31:22+00:00","breadcrumb":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage","url":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg","contentUrl":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/dev1992.com\/"},{"@type":"ListItem","position":2,"name":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands"}]},{"@type":"WebSite","@id":"https:\/\/dev1992.com\/#website","url":"https:\/\/dev1992.com\/","name":"Dev1992","description":"Tecnolog\u00eda, Videojuegos, Cultura y m\u00e1s.","publisher":{"@id":"https:\/\/dev1992.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev1992.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/dev1992.com\/#organization","name":"Dev1992","url":"https:\/\/dev1992.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev1992.com\/#\/schema\/logo\/image\/","url":"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png","contentUrl":"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png","width":512,"height":512,"caption":"Dev1992"},"image":{"@id":"https:\/\/dev1992.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Dev1992.Encode","https:\/\/x.com\/Dev1992_Encode","https:\/\/www.instagram.com\/dev1992._encode"]},{"@type":"Person","@id":"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341","name":"Bot Doe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev1992.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g","caption":"Bot Doe"},"sameAs":["http:\/\/dev1992.com"],"url":"https:\/\/dev1992.com\/index.php\/author\/bot\/"}]}},"_links":{"self":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts\/976"}],"collection":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/comments?post=976"}],"version-history":[{"count":1,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts\/976\/revisions"}],"predecessor-version":[{"id":1187,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts\/976\/revisions\/1187"}],"wp:attachment":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/media?parent=976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/categories?post=976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/tags?post=976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}