UNIX/Linux with Shell Scripting

The UNIX trademark is owned by The Open Group.Companies like IBM, Apple, Hewlett Packard and Oracle all have UNIX-certified in operation systems: bird genus, Mac OSX, HP-UX and Solaris, severally. UNIX coaching programs area unit typically offered as certificate programs through technical faculties, community faculties and universities.

UNIX was developed at T&T Bell Laboratories by Ken Thomson an Dennis Ritchie.It was finally wriiten in C. Notable work was also done at Berkeley.AT&T introduce System V Release 4 (SVR 4) to merge their own version, Berkeley and other variants.


Individuals trained in UNIX operating system typically work as system Administrator or developers. Employers are usually versatile in their employment requirements; though they typically want staff to carry a degree, several hiring organizations can take into account candidates with a mixture of education expertise and knowledge and skill or experience and credentials. whereas graduates of a degree program in computing have a general understanding of UNIX operating system, UNIX-targeted programs ar offered at the college man certificate level.


Most employers need UNIX operating system Administrator and UNIX Production Support or engineers to own 3-5 years of connected expertise. Aditional expertise is required for individuals while not a 4-year degree. Expertise with a selected UNIX operating system software package, like Solaris, is commonly needed. Candidates ought to even be accustomed to networking and security practices. Expertise with web protocol suite (TCP/IP) is commonly most popular, and data of name system (DNS) server administration is fascinating or If you want to go UNiX Production Support job.

Workshops and Seminars

Krypsec Digital Security sponsor conferences and UNIX/Linux Training program your collage ,company and organization, which often run 4-6 days.During now, participants will attend seminars on topics like Computer networking, file storage and Installation & General Usage. In addition, native schools might sponsor one-session UNIX operating system seminars and tutorials, which can last for a couple of hours.


Unix and Shell scripting Training Program

Module 1:Installation & General Usage

1.1 Red Hat Installation Plan
1.2 Basic Installation step
1.3 Virtualization with Unix

Module 2:Unix Architecture

2.1 What is Unix
2.2 System Bootup
2.3 UNIX Architecture
2.4 Features of UNIX
2.5 POSIX and the Single UNIX Specification
2.6 Internal and External Command
2.7 File System Hierarchies

Module 3:Basic GNU/Unix Skills – Command Line Interface (CLI) – BASH

3.1 Introduction to GNOME Terminal
3.2 Demonstrate usage of the following useful commands & concepts
ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info
alias, cat, file, chmod, chown, history
Standard in/out, UNIX Pipes, Redirection, Command Chaining
ps, df, free, vmstat, top, kill
less & more, head & tail, diff
which & whereis, w, who
Use grep and cut to process delimited log files
find, locate
tar, gzip/gunzip, bzip2, zcat
Explore vi text editor
Install and explore Nano text editor
Convert Windows text files to Unix format using dos2unix
Convert Unix text files to Windows format using unix2dos

Module 4:Network Based Command

4.1  Common Network Clients
4.2  File Transfer Protocol (FTP) client
4.3  Wget- HTTP/HTTPS/FTP connectivity
4.4  Explain SSH concepts, implementation, etc.
4.5  Use SSH Client to connect to remote Linux Systems using password authentication
4.6  Authenticate to remote Linux systems using alternate credentials
4.7  Use Secure Copy Protocol (SCP) to move data between systems non-interactively
4.8  Use Secure File Transfer Protocol (SFTP) to move data between systems interactively
4.9  Demonstrate how to generate Public/Private key (RSA/DSA) pairs using SSH-Keygen
4.10 Demonstrate using SSH to authenticate to remote Linux hosts without passwords
4.11 Use ping, mtr & arp
4.12 Use dig, host, nslookup name resolution clients

Module 5:Basic File Attributes

5.1 Listing File Attributes
5.2 The Permission Indicators
5.3 File Access Modes
5.4 File Ownership
5.5 File Permission
5.6 Changing Permissions:chmod
5.7 Changing Owners and Groups
5.6 Changing Ownership
5.7 Changing Group Ownership
5.8 SUID and SGID File Permission

Module 6:Unix Environment

6.1 Setting The Terminal Type
6.2 Seting the PATH
6.3 PS1 and PS2 Variable
6.4 Environment Variables 

Module 7:Unix Processes Management

7.1 Process Basics
7.2 Foreground Processes
7.3 Background Processes
7.4 Process Status
7.5 System Process 
7.6 Stopping Processes
7.7 Parent and Child Processes
7.8 Zombie and Orphan Processes
7.9 Job execution with Low priority (nice)
7.10 Killing Process with signal
7.11 at and Batch 
7.12 cron

Module 8:Unix -The Shell

8.1 Shell Prompt
8.2 Shell offering
8.3 Pattern Matching--Wild-card
8.4 Shell Type
8.5 Sell Script

Module 9:Shell Programming

9.1 Using Variables

    1.Varaible Name
    2.Defining Variables
    3.Environment Variables
    4.Read-only Variables
    5.Unsetting Variables

9.2 Special Variables

    1.Command Line Arguments
    2.Special Parameters

9.3 Using Arrays

    1.Defining Array Values
    2.Accessing Array Values

9.4 Basic Operators

    2.Relational Operators
    3.Boolean Operators
    4.String Operators
    5.File Test Operators
    6.Arithmatic and Logical Operators
    7.File Test Operators
    8.Arithmatic and Logical Operators
    9.File Test Operators

9.5 If…else statements

    1.if...else statements
    2.if..fi statement
    6.if..elif...else...fi statement
    7.Case....esac Statement

9.6 Shell Loops

    1.The while loop
    2.The for loop 
    3.The until loop 
    4.The select loop 
    5.Nesting Loops
    6.Nesting while Loops

9.7 Loop Control

    1.The infinite Loop
    2.The break statement
    3.The continue statement

9.8 IO Redirections

    1.Output Redirection
    2.Input Redirection
    3.Redirection Commands

9.9 Shell Fuctions

    1.Creating Functions
    2.Pass Parameters to a Function
    3.Returning Values from Functions
    4.Nested Functions
    5.Function Call from Prompt

10. Simple Filters

10.1 pr:Paginating Files
10.2 head:Display the Beginning of file
10.3 tail:Display the end of file
10.4 cut:slitting a file vertically
10.5 paste:pasting files
10.6 sort: ordering a file
10.7 uniq


If you feel that you have what it takes to be a serious hacker then you must first know a clear definition of hacking and how to be an ethical hacker. Become familiar with unix environments and if you are only just starting to learn to hack, visit a local library and find some books on various operating systems on the internet and how they work. Or you could go to a book store and buy a couple internet security books. They often explain
how hackers penetrate systems and that is something a beginner could use as an advantage.


Module 1:Basics Unix Hacking

1.1 Use cd alias to nevigate up the directory effectively
1.2 Perform mkdir and cd using a single command
1.3 Use "cd-" to toggle between the last two directory
1.4 Use "shopt -s cdspell" to automatically correct mistype

Module 2.Date Manipulation

2.1 Set System Date and Time
2.2 Set Hardware Date and Time
2.3 Display Current Date and Time Specific format
2.4 Display past Date and Time
2.5 Display Future Date and Time

Module 3.PS1, PS2 and Command Prompt

3.1 PS1 Default Interaction Prompt
3.2 PS2 countinuation Interactive Prompt

Module 4.Colorful and Functional Shell Prompt Using

4.1 Display username, hostname and basename of directory in the prompt
4.2 Display current time in the prompt
4.3 Display output of any command in the prompt
4.4 Change foreground color of the prompt
4.5 Change background color of the prompt
4.6 Display multiple colors in the prompt
4.7 Change the prompt color using tput
4.8 Create your own prompt using the available codes for PS1 
4.9 Use bash shell function inside PS1 
4.10 Use shell script inside PS1 

Module 5.System Administration Task

5.1 Partition using fdisk
5.2 Format a partition using mke2fsk
5.3 Mount the partition
5.4 Fine tune the partition using tune2fs
5.5 Create a swap file system
5.6 Setup SSH passwordless login in OpenSSH
5.7 Safe Reboot Of Linux Using Magic SysRq Key

Cracking is not hacking, so just remember that…If you are seriously into becoming a hacker, check out your local library, or bookstor, and pick up programming books…HTML, C, Python, anything…Don’t buy ‘hacking books’ they don’t help much, they just tell you about hacks, and social engineering…


Our Branches

  • Best UNIX/Linux Training in Noida
  • Best UNIX/Linux Training in Delhi
  • Best UNIX/Linux Training in Meerut
  • Best UNIX/Linux Training in India