Linux is an open-source operating system based on the Unix architecture. It is widely used for servers, security testing, cloud infrastructure, networking devices, and cybersecurity operations.
The Linux operating system was originally developed by Linus Torvalds in 1991 and has since grown into one of the most important operating systems in the world.
Unlike proprietary systems such as Microsoft Windows or macOS, Linux allows users to view, modify, and distribute its source code freely.
Linux powers many critical systems including:
Linux plays a central role in cybersecurity because most security tools and testing platforms are built for Linux environments.
Many security professionals prefer Linux because it offers greater control, flexibility, and transparency compared to other operating systems.
1. Security and Stability
2. Open Source Advantage
3. Powerful Command Line
4. Most Servers Run Linux
5. Cybersecurity Tools are Built for Linux
Many penetration testing tools run natively on Linux.
A Linux distribution (distro) is a complete operating system built on the Linux kernel with additional tools and software.
Different distributions are designed for different purposes.




Kali Linux is one of the most popular operating systems for penetration testing and ethical hacking.
Features include:
It is widely used by:



Parrot Security OS is another Linux distribution focused on security, privacy, and digital forensics.
Key features:

Ubuntu is one of the most beginner-friendly Linux distributions.
It is commonly used for:
Ubuntu is often recommended for beginners before moving into advanced security distributions.
Many cybersecurity professionals rely heavily on Linux in their daily work.
1. Penetration Tester
2. Ethical Hacker
3. Security Analyst
4. Digital Forensics Investigator
5. SOC Analyst (Security Operations Center)
Most tools used in these roles are designed for Linux environments.
Before learning cybersecurity tools, students need to install Linux.
A virtual machine (VM) allows Linux to run inside another operating system.
Popular VM software includes:
Advantages:
Dual boot allows users to install two operating systems on the same computer.
Example:
When the computer starts, the user can choose which OS to load.
Advantages:
Linux is made up of several important components.
The kernel is the core of the operating system.
It manages:
The shell is the interface that allows users to interact with the system.
Common shell:
The shell interprets commands entered by the user.
Linux organizes files in a hierarchical structure.
Important directories include:
| Directory | Purpose |
|---|---|
/home |
User files |
/etc |
System configuration |
/var |
Logs and variable data |
/bin |
Essential system commands |
/root |
Root user directory |
Applications are programs installed on Linux such as:
In this module, students learned:
This knowledge forms the foundation for learning Linux commands and cybersecurity tools.