From the course: CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and Implementation

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Shell and script environments

Shell and script environments

- [Instructor] Cyber security analysts often need to reach deep into the inner workings of systems and it's often far easier to do this at the command-line than by using graphical tools. Shell environments provide direct access to these command-lines where administrators can enter commands to the operating system. Shell environments also provide administrators with the ability to create scripts that contain pre-written code designed to execute operating system commands. These shell scripts are programmed so to allow the automation of a good deal of routine administrative work. The Secure Shell, or SSH command, allows us to access remote Linux systems over an encrypted connection. SSH uses TCP port 22 to establish encrypted connections to a remote Linux system where the user can enter shell commands. Here I am at the command-line on my Mac. I'm going to SSH to a remote Linux system using the SSH command. I'm going…

Contents