
As we know, our computer understands only binary language i.e 1 and 0 which is very difficult for all of us to read and write. So in Operating System, there is special program called Shell.
Shell accepts your instruction or commands in English and if its a valid command, it is pass to kernel.
What Shell is ?
– Shell is a user program or it’s environment provided for user interaction.
– Shell is an command language interpreter that executes commands read from the standard input device or from a file.
– Shell is not part of system kernel, but uses the system kernel to execute programs, create files etc.
There are several SHELLS available in Linux are like Bash Shell, Bourne Shell, Korn Shell etc.
Also Read: Bash External Variables | Bash Environment Variables | Bash Inbuilt Variables
Presenter – Mr. Chetan Soni, a cyber security expert that has been continuously adapting its information protection strategies for over a years. Chetan Soni born on the , 5th of January has created a revolution in the field of cyber security. He has over 5 years of Experience in IT Security and has been with C-DAC from last two years. He has extensively worked in the domain of Cyber Security & Penetration Testing and has helped not only to develop India but also has supported a lot of National / International projects.
This shell scripting series does not go into great detail or cover advanced topics, the topics which he generally covers are –
- Chapter 1 – Linux Shell Scripting
- Chapter 2 – Types of Shells
- Chapter 3 – BASH in detail
- Chapter 4 – Types of Built-in commands which supports BASH
- Chapter 5 – What is SHELL Script and Why to Write Shell Script ?
- Chapter 6 – Steps for Shell Scripting
- Chapter 7 – Variables in Shell
- Chapter 8 – Echo Command and its use
- Chapter 9 – Arithmetic Operations in BASH Shell Scripting
- Chapter 10 – Read Statement in BASH Scripting
- Chapter 11 – Command Line Arguments in Linux
- Chapter 12 – Bash Redirection
- Chapter 13 – Pipes in LINUX
- Chapter 14 – Add Two Numbers By Using Command Line Arguments
- Chapter 15 – Find Biggest Number using Command Line Arguments
- Chapter 16 – Print 5,4,3,2,1 using while loop
- Chapter 17 – Perform Basic Math Operations using Command Line Arguments
- Chapter 18 – Script to Reverse a Given No
For any kind of query or help, you can drop a mail at iamchetansoni@gmail.com
To download all 14 scripts used in above series – Click Here
You may also like:- Collecting and Analyzing Threat Data for Effective Threat Intelligence
- How Digital Forensics Helps To Investigate Cryptocurrency Scams and Hacks
- 7 Key Best Practices for Developing Secure Applications
- Vulnerability Assessment in Web Applications – Steps, Strategies, and Tools
- Top Advanced Techniques for Malware Analysis And Detection
- How to Simulate Real-World Attacks for Better Security – The Red Teaming Approach
- How You Can Secure Your Cloud Environments with Blockchain Technology
- Best Practices for Secure Development within SSDL Framework
- How Machine Learning Enhances Cloud Security – A Comprehensive Guide
- The Role of Social Engineering in Penetration Testing