{"id":976,"date":"2023-01-29T17:25:20","date_gmt":"2023-01-29T17:25:20","guid":{"rendered":"https:\/\/dev1992.com\/?p=976"},"modified":"2023-02-07T23:31:22","modified_gmt":"2023-02-07T23:31:22","slug":"cyber-security-intermediate-linux-commands","status":"publish","type":"post","link":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","title":{"rendered":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands"},"content":{"rendered":"\n    <div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Beyond the basics<\/h2>\n    \n\n    \n    <div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\" alt=\"\"\/><figcaption>Cyber Security: Intermediate Linux Commands<\/figcaption><\/figure><\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Idioma<\/h2>\n    \n\n    \n    <p>English<\/p>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Descripci\u00f3n<\/h2>\n    \n\n    \n    <p>This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux command line it should be possible to follow along with the course. Most of these commands have an equivalent that works on Mac; they should be easy to figure out how to execute if you are on one of those systems or have access to a virtual machine.You will learn learn new skills like securing sensitive data, encoding\/decoding, cracking GPG\u00a0files and more. Before staring this course, you should already have some familiarity with the Linux command line.As the name implies, this is more of a Cyber Security course than an Ethical Hacking course. But you will learn how to crack GPG\u00a0files in this course. It&#8217;s all about learning how to use these tools properly, so no evil will be done.The course teaches you commands that you should know as a Cyber Security professional working on Linux (or Mac) systems. If you use Linux and want to learn more commands for cyber security, this course is for you!Who this course is for:Beginner Ethical HackersSysadminsDevopsSoftware Developers<\/p>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n    <div class=\"wp-block-button has-custom-width wp-block-button__width-50 is-style-default\"><a class=\"wp-block-button__link has-nv-c-1-background-color has-background\" href=\"https:\/\/www.udemy.com\/course\/cyber-security-intermediate-linux-commands\/?couponCode=AUSTRALIA\" target=\"_blank\" rel=\"noreferrer noopener\">CANJEAR CURSO<\/a><\/div>\n    <\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Para m\u00e1s cursos Gratis y para ver los que siguen as\u00ed visita nuestra aplicaci\u00f3n web UFree.<\/h2>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n    <div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link has-nv-text-dark-bg-color has-neve-link-hover-color-background-color has-text-color has-background\" href=\"https:\/\/www.dev1992.com\/ufree\/#\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s cursos gratis<\/a><\/div>\n    <\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <h2 class=\"wp-block-heading\">Descarga la aplicaci\u00f3n oficial!<\/h2>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n    <div class=\"wp-block-button has-custom-width wp-block-button__width-75\"><a class=\"wp-block-button__link has-nv-text-dark-bg-color has-neve-link-hover-color-background-color has-text-color has-background\" href=\"https:\/\/www.dev1992.com\/ufree\/#\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aplicaci\u00f3n oficial<\/a><\/div>\n    <\/div>\n    \n\n    \n    <div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n    \n\n    \n    <p><\/p>\n      <div class=\"related-post slider\">\r\n      <div class=\"post-list owl-carousel\">\r\n\r\n            <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: Windows Server with Powershell: Working with Pipeline 1 &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/19\/windows-server-with-powershell-working-with-pipeline-1\/?related_post_from=2426\">\r\n        Cup\u00f3n Udemy: Windows Server with Powershell: Working with Pipeline 1 &#8211; Udemy Coupon  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: Windows Server with Powershell: Working with Pipeline 1 &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/19\/windows-server-with-powershell-working-with-pipeline-1\/?related_post_from=2426\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: Windows Server with Powershell: Working with Pipeline 1 &#8211; Udemy Coupon\" alt=\"Cup\u00f3n Udemy: Windows Server with Powershell: Working with Pipeline 1 &#8211; Udemy Coupon\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Powershell for beginners. Learn how to use Pipeline and Work with Objects: Sort, Select, Measure, Convert, Export, etc Windows Server <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/19\/windows-server-with-powershell-working-with-pipeline-1\/?related_post_from=2426\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n              <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: AWS Lambda \/ CloudFormation con Python &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/23\/aws-lambda-cloudformation-con-python\/?related_post_from=2708\">\r\n        Cup\u00f3n Udemy: AWS Lambda \/ CloudFormation con Python &#8211; Udemy Coupon  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: AWS Lambda \/ CloudFormation con Python &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/23\/aws-lambda-cloudformation-con-python\/?related_post_from=2708\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: AWS Lambda \/ CloudFormation con Python &#8211; Udemy Coupon\" alt=\"Cup\u00f3n Udemy: AWS Lambda \/ CloudFormation con Python &#8211; Udemy Coupon\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Crea APIs en python usando lambda y CloudFormation en AWS AWS Lambda \/ CloudFormation con Python Idioma Spanish Descripci&oacute;n &iquest;Qu&eacute; <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/23\/aws-lambda-cloudformation-con-python\/?related_post_from=2708\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n              <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: Programming Network Applications in Java &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/20\/programming-network-applications-in-java\/?related_post_from=2619\">\r\n        Cup\u00f3n Udemy: Programming Network Applications in Java &#8211; Udemy Coupon  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: Programming Network Applications in Java &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/20\/programming-network-applications-in-java\/?related_post_from=2619\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: Programming Network Applications in Java &#8211; Udemy Coupon\" alt=\"Cup\u00f3n Udemy: Programming Network Applications in Java &#8211; Udemy Coupon\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    TCP and UDP sockets in Java Programming Network Applications in Java Idioma English Descripci&oacute;n If you have a great idea <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/20\/programming-network-applications-in-java\/?related_post_from=2619\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n              <div class=\"item\">\r\n          \r\n  <a class=\"title post_title\"  title=\"Cup\u00f3n Udemy: QR Code Generator Using JavaScript &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/11\/qr-code-generator-using-javascript\/?related_post_from=1893\">\r\n        Cup\u00f3n Udemy: QR Code Generator Using JavaScript &#8211; Udemy Coupon  <\/a>\r\n\r\n  <div class=\"thumb post_thumb\">\r\n    <a  title=\"Cup\u00f3n Udemy: QR Code Generator Using JavaScript &#8211; Udemy Coupon\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/11\/qr-code-generator-using-javascript\/?related_post_from=1893\">\r\n\r\n              <img decoding=\"async\" src=\"\" title=\"Cup\u00f3n Udemy: QR Code Generator Using JavaScript &#8211; Udemy Coupon\" alt=\"Cup\u00f3n Udemy: QR Code Generator Using JavaScript &#8211; Udemy Coupon\">\r\n\r\n      \r\n\r\n    <\/a>\r\n  <\/div>\r\n  <p class=\"excerpt post_excerpt\">\r\n    Learn How To Generate QR Code Using JavaScript &amp; How To Create QR Code Generator Website QR Code Generator Using <a class=\"read-more\" href=\"https:\/\/dev1992.com\/index.php\/2023\/02\/11\/qr-code-generator-using-javascript\/?related_post_from=1893\"> Read more<\/a>  <\/p>\r\n        <\/div>\r\n      \r\n  <\/div>\r\n\r\n  <script>\r\n      <\/script>\r\n  <style>\r\n    .related-post {}\r\n\r\n    .related-post .post-list {\r\n      text-align: left;\r\n          }\r\n\r\n    .related-post .post-list .item {\r\n      margin: 10px;\r\n      padding: 0px;\r\n          }\r\n\r\n    .related-post .headline {\r\n      font-size: 18px !important;\r\n      color: #999999 !important;\r\n          }\r\n\r\n    .related-post .post-list .item .post_title {\r\n      font-size: 16px;\r\n      color: #3f3f3f;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n      text-decoration: none;\r\n          }\r\n\r\n    .related-post .post-list .item .post_thumb {\r\n      max-height: 220px;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n          }\r\n\r\n    .related-post .post-list .item .post_excerpt {\r\n      font-size: 13px;\r\n      color: #3f3f3f;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n      text-decoration: none;\r\n          }\r\n\r\n    .related-post .owl-dots .owl-dot {\r\n          }\r\n\r\n      <\/style>\r\n      <script>\r\n      jQuery(document).ready(function($) {\r\n        $(\".related-post .post-list\").owlCarousel({\r\n          items: 3,\r\n          responsiveClass: true,\r\n          responsive: {\r\n            0: {\r\n              items: 1,\r\n            },\r\n            768: {\r\n              items: 2,\r\n            },\r\n            1200: {\r\n              items: 3,\r\n            }\r\n          },\r\n                      rewind: true,\r\n                                loop: true,\r\n                                center: true,\r\n                                autoplay: true,\r\n            autoplayHoverPause: true,\r\n                                nav: true,\r\n            navSpeed: 1000,\r\n            navText: ['<i class=\"fas fa-chevron-left\"><\/i>', '<i class=\"fas fa-chevron-right\"><\/i>'],\r\n                                dots: true,\r\n            dotsSpeed: 1200,\r\n                                                    rtl: false,\r\n          \r\n        });\r\n      });\r\n    <\/script>\r\n  <\/div>\r\n","protected":false},"excerpt":{"rendered":"<p>Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;<a href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/certified-kubernetes-administrator-basics-guide\/\" class=\"\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Cup\u00f3n Udemy: Certified Kubernetes Administrator Basics Guide<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[13,14],"tags":[104,24,99,100],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992\" \/>\n<meta property=\"og:description\" content=\"Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;Leer m\u00e1s &raquo;Cup\u00f3n Udemy: Essential Amazon Affiliate Marketing for Beginners &#8211; Udemy Coupon\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\" \/>\n<meta property=\"og:site_name\" content=\"Dev1992\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Dev1992.Encode\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-29T17:25:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-07T23:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\" \/>\n<meta name=\"author\" content=\"Bot Doe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Dev1992_Encode\" \/>\n<meta name=\"twitter:site\" content=\"@Dev1992_Encode\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bot Doe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\"},\"author\":{\"name\":\"Bot Doe\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341\"},\"headline\":\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands\",\"datePublished\":\"2023-01-29T17:25:20+00:00\",\"dateModified\":\"2023-02-07T23:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\"},\"wordCount\":274,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dev1992.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\",\"keywords\":[\"CursoUdemy\",\"Udemy\",\"UdemyCoupon\",\"UdemyFreeCourse\"],\"articleSection\":[\"Cursos\",\"Udemy\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\",\"url\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\",\"name\":\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992\",\"isPartOf\":{\"@id\":\"https:\/\/dev1992.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\",\"datePublished\":\"2023-01-29T17:25:20+00:00\",\"dateModified\":\"2023-02-07T23:31:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage\",\"url\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\",\"contentUrl\":\"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/dev1992.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev1992.com\/#website\",\"url\":\"https:\/\/dev1992.com\/\",\"name\":\"Dev1992\",\"description\":\"Tecnolog\u00eda, Videojuegos, Cultura y m\u00e1s.\",\"publisher\":{\"@id\":\"https:\/\/dev1992.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev1992.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dev1992.com\/#organization\",\"name\":\"Dev1992\",\"url\":\"https:\/\/dev1992.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png\",\"contentUrl\":\"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png\",\"width\":512,\"height\":512,\"caption\":\"Dev1992\"},\"image\":{\"@id\":\"https:\/\/dev1992.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Dev1992.Encode\",\"https:\/\/x.com\/Dev1992_Encode\",\"https:\/\/www.instagram.com\/dev1992._encode\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341\",\"name\":\"Bot Doe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/dev1992.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g\",\"caption\":\"Bot Doe\"},\"sameAs\":[\"http:\/\/dev1992.com\"],\"url\":\"https:\/\/dev1992.com\/index.php\/author\/bot\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","og_locale":"es_ES","og_type":"article","og_title":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","og_description":"Beyond the basics Idioma English Descripci&oacute;n This course covers useful Linux commands for Cyber Security for beginners to intermediate users. Some commands are included for more advanced users, but all can be useful for everyone. We also included a lecture that reviews the beginners commands, so even if you have no experience with the Linux&hellip;&nbsp;Leer m\u00e1s &raquo;Cup\u00f3n Udemy: Essential Amazon Affiliate Marketing for Beginners &#8211; Udemy Coupon","og_url":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","og_site_name":"Dev1992","article_publisher":"https:\/\/www.facebook.com\/Dev1992.Encode","article_published_time":"2023-01-29T17:25:20+00:00","article_modified_time":"2023-02-07T23:31:22+00:00","og_image":[{"url":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg"}],"author":"Bot Doe","twitter_card":"summary_large_image","twitter_creator":"@Dev1992_Encode","twitter_site":"@Dev1992_Encode","twitter_misc":{"Escrito por":"Bot Doe","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#article","isPartOf":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/"},"author":{"name":"Bot Doe","@id":"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341"},"headline":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands","datePublished":"2023-01-29T17:25:20+00:00","dateModified":"2023-02-07T23:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/"},"wordCount":274,"commentCount":0,"publisher":{"@id":"https:\/\/dev1992.com\/#organization"},"image":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg","keywords":["CursoUdemy","Udemy","UdemyCoupon","UdemyFreeCourse"],"articleSection":["Cursos","Udemy"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","url":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/","name":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands - Dev1992","isPartOf":{"@id":"https:\/\/dev1992.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage"},"image":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg","datePublished":"2023-01-29T17:25:20+00:00","dateModified":"2023-02-07T23:31:22+00:00","breadcrumb":{"@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#primaryimage","url":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg","contentUrl":"https:\/\/img-c.udemycdn.com\/course\/240x135\/4771642_1860_2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/dev1992.com\/index.php\/2023\/01\/29\/cyber-security-intermediate-linux-commands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/dev1992.com\/"},{"@type":"ListItem","position":2,"name":"Cup\u00f3n Udemy: Cyber Security: Intermediate Linux Commands"}]},{"@type":"WebSite","@id":"https:\/\/dev1992.com\/#website","url":"https:\/\/dev1992.com\/","name":"Dev1992","description":"Tecnolog\u00eda, Videojuegos, Cultura y m\u00e1s.","publisher":{"@id":"https:\/\/dev1992.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev1992.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/dev1992.com\/#organization","name":"Dev1992","url":"https:\/\/dev1992.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev1992.com\/#\/schema\/logo\/image\/","url":"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png","contentUrl":"https:\/\/dev1992.com\/wp-content\/uploads\/2021\/06\/dev.png","width":512,"height":512,"caption":"Dev1992"},"image":{"@id":"https:\/\/dev1992.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Dev1992.Encode","https:\/\/x.com\/Dev1992_Encode","https:\/\/www.instagram.com\/dev1992._encode"]},{"@type":"Person","@id":"https:\/\/dev1992.com\/#\/schema\/person\/5d399d41096c6904f2613183f056d341","name":"Bot Doe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev1992.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8fece09f0738c1045d011cc6dac6c49b?s=96&d=mm&r=g","caption":"Bot Doe"},"sameAs":["http:\/\/dev1992.com"],"url":"https:\/\/dev1992.com\/index.php\/author\/bot\/"}]}},"_links":{"self":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts\/976"}],"collection":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/comments?post=976"}],"version-history":[{"count":1,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts\/976\/revisions"}],"predecessor-version":[{"id":1187,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/posts\/976\/revisions\/1187"}],"wp:attachment":[{"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/media?parent=976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/categories?post=976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev1992.com\/index.php\/wp-json\/wp\/v2\/tags?post=976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}