Cybersecurity Ops with bash
Enhance Your Security Skills
Cybersecurity Ops with bash teaches you how to leverage sophisticated Linux and Windows commands, and the bash shell to enhance your capabilities as a security operator and practitioner. By learning these skills you will be able to rapidly create and prototype complex capabilities with as little as a single line of pipelined commands.
Master the Command Line
If you hope to outmaneuver threat actors, speed and efficiency are key components of cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration.
Expand Your Toolkit
Learn how to leverage standard command line capabilities to build sophisticated tools for network defense and penetration testing.
Get Your Free Quick Reference Guide
Get a copy of our free Quick Reference Guide that is full of command options and bash examples. It is a perfect companion to the book.
Learn how you can leverage the command line to enhance your capabilities as a security practitioner, penetration tester, or system administrator.
AUTHORS
Paul Troncone
Paul Troncone is the President and founder of the Digadel Corporation and has over 15 years of experience in the information security and IT fields. He has filled a variety of roles in the commercial, academic, and local/federal government sectors. He holds multiple professional certifications as well as a bachelor’s and master’s degree in computer science.
Carl Albing
Carl Albing is a professor, author, and software engineer with a breadth of industry experience. A co-author of O’Reilly’s bash Cookbook, he has worked in software for companies large and small, across a variety of industries. He has a B.A. in Mathematics, Master’s in International Management, and a Ph.D. in Computer Science. He is currently an Associate Professor of Computer Science at Bethel University in St. Paul, MN.
REVIEWS
"A valuable contribution to an area that doesn't receive enough attention: using the shell to build a toolkit that will improve your security expertise."
Chet Ramey
Maintainer of bash
"Your book has introduced me to bash features I didn't know about, and some useful commands that have appeared since my days of editing Unix manuals. So it's a welcome addition to my library."
4.8/5.0
Douglas McIlroy
Originator of Unix Pipelines