{"id":24409,"date":"2019-01-12T15:07:00","date_gmt":"2019-01-12T15:07:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/"},"modified":"2019-01-12T15:07:00","modified_gmt":"2019-01-12T15:07:00","slug":"first-step-to-becoming-a-cybersecurity-pro-linux","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/","title":{"rendered":"First step to becoming a cybersecurity pro: Linux"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/01\/linux_basics_for_hackers-100784886-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>If you&#8217;re contemplating a career in cybersecurity and haven&#8217;t come up to speed on Linux, now&#8217;s the time to get ramped up and here&#8217;s one easy way to do it. This new book from No Starch Press was written with people like you in mind. Authored by OccupyTheWeb,\u00a0<a href=\"https:\/\/nostarch.com\/linuxbasicsforhackers\" rel=\"noopener nofollow\" target=\"_blank\">Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali<\/a>\u00a0provides everything from basic Linux command-line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.<\/p>\n<h3 class=\"body\">Why Linux is important to security<\/h3>\n<p>Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent, and that means you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Also read: <a href=\"https:\/\/www.networkworld.com\/article\/3272286\/open-source-tools\/22-essential-security-commands-for-linux.html#tk.nww-fsb#nww-fsb\">22 essential Linux security commands<\/a> | Get regularly scheduled insights: <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html#nww-fsb\">Sign up for Network World newsletters<\/a> ]<\/strong><\/aside>\n<h3 class=\"body\">What is Kali Linux?<\/h3>\n<p><a href=\"https:\/\/www.kali.org\/\" rel=\"noopener nofollow\" target=\"_blank\">Kali Linux<\/a> is a special Linux distribution that is built for penetration testing and ethical hacking. It&#8217;s a derivation of Debian and was designed specifically for digital forensics and penetration testing.<\/p>\n<p>The number and variety of tools for information gathering, vulnerability analysis, exploitation, forensics, and more in Kali is quite mind-boggling. Check out this <a href=\"https:\/\/tools.kali.org\/tools-listing\" rel=\"nofollow noopener\" target=\"_blank\">tools listing<\/a> page, and be sure to scroll down to view all the types of tools available.<\/p>\n<h3 class=\"body\">Who is OccupyTheWeb?<\/h3>\n<p>OccupyTheWeb, the force behind\u00a0Hackers-Arise,\u00a0is an information security consultant, as well as a forensic investigator. He has worked with numerous federal and military organizations and is highly skilled. And he wants to help\u00a0motivated individuals acquire the skills required for this extremely important field.\u00a0<\/p>\n<h3 class=\"body\">Getting started<\/h3>\n<p>The first thing you should do is install Kali Linux. You will need it to work through the exercises at the end of the chapters. Kali comes with all the tools you will need. The book will walk you through the installation process, as well as what is required to install VirtualBox and then install Kali as a virtual system.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<h3 class=\"body\">What\u00a0Linux Basics for Hackers covers<\/h3>\n<p>As you can see from the table of contents shown below, this book starts with basic command-line commands (pwd, whoami, more and less, head and tail, locate, whereis, etc.). It then covers creating files and directories, managing network settings, installing packages, managing permissions and processes, and setting up the user environment.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<p>The book also introduces scripting, using compression tools, managing file systems and devices, and both using and circumventing logging. It provides details on setting up and using Apache, OpenSSH, the Raspberry Spi Pi, and MySQL. The book also helps you understand what is required to work anonymously.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<p>You will also learn how to work with kernel modules, schedule tasks and start-up processes, and write scripts using Python.<\/p>\n<p>The exercises at the end of each chapter are crafted to provide critical insights and to help you to develop the skills needed to become a top-notch security professional.<\/p>\n<pre>\nIntroduction\nChapter 1: Getting Started with the Basics\nChapter 2: Text Manipulation\nChapter 3: Analyzing and Managing Networks\nChapter 4: Adding and Removing Software\nChapter 5: Controlling File and Directory Permissions\nChapter 6: Process Management\nChapter 7: Managing User Environment Variables\nChapter 8: Bash Scripting\nChapter 9: Compressing and Archiving\nChapter 10: Filesystem and Storage Device Management\nChapter 11: The Logging System\nChapter 12: Using and Abusing Services\nChapter 13: Security and Anonymity\nChapter 14: Wireless Networking\nChapter 15: Linux Kernel and Drivers\nChapter 16: Startup Scripts\nChapter 17: Python Scripting Basics\n<\/pre>\n<h3 class=\"body\">Wrap-up<\/h3>\n<p>If you&#8217;re a seasoned security professional or a Linux sysadmin with a lot of experience, a lot of the material in the book will likely be wasted on you. If you&#8217;re just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your cybersecurity skills.<\/p>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3331930\/linux\/first-step-to-becoming-a-hacker-linux.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nIf you&#8217;re contemplating a career in cybersecurity and haven&#8217;t come up to speed on Linux, now&#8217;s the time to get ramped up and here&#8217;s one easy way to do it. This new book from No Starch Press was written with people like you in mind. Authored by OccupyTheWeb,\u00a0Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali\u00a0provides everything from basic Linux command-line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.Why Linux is important to security<br \/>\nBecause Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent, and that means you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24410,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[493,307],"class_list":["post-24409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-linux","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First step to becoming a cybersecurity pro: Linux 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First step to becoming a cybersecurity pro: Linux 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-12T15:07:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"First step to becoming a cybersecurity pro: Linux\",\"datePublished\":\"2019-01-12T15:07:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/\"},\"wordCount\":623,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg\",\"keywords\":[\"Linux\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/\",\"name\":\"First step to becoming a cybersecurity pro: Linux 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg\",\"datePublished\":\"2019-01-12T15:07:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/first-step-to-becoming-a-cybersecurity-pro-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/linux\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"First step to becoming a cybersecurity pro: Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First step to becoming a cybersecurity pro: Linux 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/","og_locale":"en_US","og_type":"article","og_title":"First step to becoming a cybersecurity pro: Linux 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-12T15:07:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"First step to becoming a cybersecurity pro: Linux","datePublished":"2019-01-12T15:07:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/"},"wordCount":623,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg","keywords":["Linux","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/","url":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/","name":"First step to becoming a cybersecurity pro: Linux 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg","datePublished":"2019-01-12T15:07:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/first-step-to-becoming-a-cybersecurity-pro-linux.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/first-step-to-becoming-a-cybersecurity-pro-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux","item":"https:\/\/www.threatshub.org\/blog\/tag\/linux\/"},{"@type":"ListItem","position":3,"name":"First step to becoming a cybersecurity pro: Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24409"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24409\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24410"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}