In Course 4, I dove into the command line and database queries to build practical skills for incident investigations. I learned how to navigate and secure Linux systems, and how to use SQL to search, filter, and analyze data stored in relational databases.
I explored the fundamentals of operating systems—how they manage hardware, run applications, and provide interfaces. This module helped me understand the key functions that underpin every security tool I’ll use.
I discovered why Linux is so prevalent in cybersecurity, reviewed its architecture and distributions, and familiarized myself with the shell as a powerful text-based interface for system administration.
Through hands-on practice, I mastered Bash commands to navigate directories, manage files and permissions, and perform administrative tasks with sudo
. These skills are essential for securing and investigating Linux hosts.
I learned to interact with relational databases using SQL—selecting, filtering, and joining tables to uncover patterns in data. Writing queries to extract relevant security events will help me support forensic and investigative tasks.
Completing this course equipped me with command-line proficiency and database query skills. I feel confident using Linux and SQL as core tools in my cybersecurity toolkit.