title
Linux Commands for DevOps | Linux Essentials for DevOps | Linux Tutorial | Edureka

description
**DevOps Certification Courses - https://www.edureka.co/devops-certification-training ** This Edureka session on ‘Linux Commands for DevOps’ covers the most frequently used Linux commands in DevOps. It also covers basics of Shell scripting and few Git commands. This Session will focus on pointers like: 0:29 What is Linux? 1:38 Why is Linux preferred? 3:03 Linux Commands 1:02:52 Shell Scripting basics 1:07:04 Git commands Check out our Playlist: https://bit.ly/2KlsEva Blog Series: https://bit.ly/2KmfQVd Do subscribe to our channel and hit the bell icon to never miss an update from us in the future: https://goo.gl/6ohpTV ----------𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐃𝐞𝐯𝐎𝐩𝐬 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠𝐬----------- 🔵DevOps Online Training: https://bit.ly/3GOAlD5 🔵Kubernetes Online Training: https://bit.ly/3q0zrg1 🔵Docker Online Training: https://bit.ly/3DYPCj9 🔵AWS Certified DevOps Engineer Online Training: https://bit.ly/3pXnB6y 🔵Azure DevOps (Az-400) Online Training: https://bit.ly/3m8WmVr ----------𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐃𝐞𝐯𝐨𝐩𝐬 𝐌𝐚𝐬𝐭𝐞𝐫𝐬 𝐏𝐫𝐨𝐠𝐫𝐚𝐦---------- 🔵DevOps Engineer Masters Program: https://bit.ly/3pXp1Ou -----------𝐄𝐝𝐮𝐫𝐞𝐤𝐚 𝐔𝐧𝐢𝐯𝐞𝐫𝐬𝐢𝐭𝐲 𝐏𝐫𝐨𝐠𝐫𝐚𝐦---------- 🌕 Post Graduate Program in DevOps with Purdue University: https://bit.ly/3yqRlMS Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka Slideshare: https://www.slideshare.net/EdurekaIN Podcast :  https://castbox.fm/channel/id1684800   #Edureka #DevopsEdureka #LinuxCommandsForDevOps #DevOps #DevOpsCertificationTraining -------------------------------------------------------------------- How it Works? 1. This Certification Training courses span over a duration of 4-16 Weeks. 2. We have a 24x7 One-on-One LIVE Technical Support to help you with any problems you might face or any clarifications you may require during the course. 3. At the end of the training you will be working on a real time project for which we will provide you a Grade and a Verifiable Certificate -------------------------------------------------------------------- About These Courses Edureka’s DevOps online training is designed to help you master key tools of Devops lifecycle like Docker, Puppet, Jenkins, Nagios, GIT, Ansible, SaltStack and Chef used by a DevOps Engineer for automating multiple steps in SDLC. During this course, our expert DevOps instructors will help you: 1. Understand the concepts and necessities of DevOps 2. Understand the need for DevOps and the day-to-day real-life problems it resolves 3. Learn installation and configuration of common infrastructure servers like Apache, and Nginx for the Enterprise 4. Learn popular DevOps tools like Jenkins, Puppet, Chef, Ansible, SaltStack, Nagios and GIT 5. Implement automated system update, installations and deployments 6. Learn Virtualization Concepts 7. Configuration deployment and packaging, continuous integration using GIT 8. Fine tune Performance and set-up basic Security for Infrastructure 9. Manage server operations using Code which is popularly known as Infrastructure as a Code 10. Understand the need for and concepts of Monitoring and Logging. Along with the above-mentioned topics, to help you master the most popular DevOps tools, you will also receive 3 additional self-paced courses including presentations, class recordings, assignments, solutions for the following tools: 1: Ansible - Covers Introduction, Setup Configuration, Ansible Playbooks, 37 Ansible Modules, Different Roles and Command Line usage. 2: Chef - Covers Introduction, Building the Cook Book, Node Object & Search, Data-bags, Chef environment, Roles, Deploying Nodes in Production and using the Open Source Chef Server. 3: Puppet - Covers Puppet Infrastructure; run-cycle, the Puppet Language, Environment defining Nodes and Modules, Provisioning a Web Server and Executing Modules Against A Puppet Master.  -------------------------------------------------------------------- Who should go for this course? DevOps practitioners are among the highest paid IT professionals today, and the market demand for them is growing rapidly. With emergence of new job roles around DevOps philosophy, anyone aspiring to get into these new roles, can take up this DevOps course. Some of these roles are: 1. DevOps Architect 2. Automation Engineer 3. Software Tester 4. Security Engineer 5. Integration Specialist 6. Release Manager  --------------------------------------------------------------------------------------------------------- Got a question on the topic? Please share it in the comment section below and our experts will answer it for you. For more information, please write back to us at sales@edureka.in or call us at IND: 9606058406 / US: 18338555775 (toll free).

detail
{'title': 'Linux Commands for DevOps | Linux Essentials for DevOps | Linux Tutorial | Edureka', 'heatmap': [{'end': 674.252, 'start': 574.93, 'weight': 1}, {'end': 1685.317, 'start': 1633.305, 'weight': 0.71}, {'end': 2022.507, 'start': 1971.533, 'weight': 0.771}, {'end': 2313.005, 'start': 2211.32, 'weight': 0.829}], 'summary': 'This tutorial covers linux essentials for devops, including linux basics, commands, shell scripting, file security, network commands, unix commands, shell scripting, and git usage, emphasizing practical examples and command functionalities.', 'chapters': [{'end': 33.14, 'segs': [{'end': 33.14, 'src': 'embed', 'start': 0.009, 'weight': 0, 'content': [{'end': 1.329, 'text': 'for operating systems worldwide.', 'start': 0.009, 'duration': 1.32}, {'end': 8.311, 'text': 'Then we will talk about a few basic commands in Linux and then we will discuss the most frequently used commands while working in DevOps.', 'start': 1.829, 'duration': 6.482}, {'end': 16.073, 'text': 'We will also cover a bit of shell scripting that is the basic part and finally we will end the session by discussing about get commands.', 'start': 8.911, 'duration': 7.162}, {'end': 18.134, 'text': "I hope I'm clear with the agenda guys.", 'start': 16.753, 'duration': 1.381}, {'end': 22.255, 'text': 'Just a reminder in case you have not yet subscribed to our YouTube channel,', 'start': 18.794, 'duration': 3.461}, {'end': 26.956, 'text': 'please do subscribe and also click on the bell icon so that you never miss a video from edureka.', 'start': 22.255, 'duration': 4.701}, {'end': 30.997, 'text': "So let's not waste any time and straight away start with our first topic.", 'start': 27.592, 'duration': 3.405}, {'end': 33.14, 'text': 'That is what is Linux? Okay.', 'start': 31.257, 'duration': 1.883}], 'summary': 'The session will cover basic linux commands and frequently used commands in devops, and will also touch on shell scripting and git commands.', 'duration': 33.131, 'max_score': 0.009, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh89.jpg'}], 'start': 0.009, 'title': 'Introduction to linux and devops', 'summary': 'Introduces the basics of linux, devops commands, and shell scripting, emphasizing the importance of subscribing to the youtube channel for continuous updates from edureka.', 'chapters': [{'end': 33.14, 'start': 0.009, 'title': 'Introduction to linux and devops', 'summary': 'Introduces the agenda, covering the basics of linux, frequently used commands in devops, shell scripting, and get commands, while emphasizing the importance of subscribing to the youtube channel for continuous updates from edureka.', 'duration': 33.131, 'highlights': ['The chapter covers the basics of Linux, including a few basic commands and the most frequently used commands in DevOps.', 'The session includes the discussion of shell scripting, an essential part of the agenda.', 'The importance of subscribing to the YouTube channel for continuous updates from edureka is emphasized.']}], 'duration': 33.131, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh89.jpg', 'highlights': ['The chapter covers the basics of Linux, including a few basic commands and the most frequently used commands in DevOps.', 'The session includes the discussion of shell scripting, an essential part of the agenda.', 'The importance of subscribing to the YouTube channel for continuous updates from edureka is emphasized.']}, {'end': 541.844, 'segs': [{'end': 60.373, 'src': 'embed', 'start': 33.481, 'weight': 2, 'content': [{'end': 41.853, 'text': 'So Linux is an open source and a community developed operating systems for computers servers mainframes mobile devices and embedded devices.', 'start': 33.481, 'duration': 8.372}, {'end': 48.526, 'text': 'It is supported on almost every major computer platform including x86 ARM, etc.', 'start': 42.483, 'duration': 6.043}, {'end': 52.489, 'text': 'Making it one of the most widely supported operating systems.', 'start': 48.887, 'duration': 3.602}, {'end': 60.373, 'text': 'Linux was designed to be similar to Unix, but has evolved to run on a wide variety of hardware, from phones to supercomputers.', 'start': 52.489, 'duration': 7.884}], 'summary': 'Linux is widely supported on various platforms, from phones to supercomputers, making it one of the most widely supported operating systems.', 'duration': 26.892, 'max_score': 33.481, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh833481.jpg'}, {'end': 162.92, 'src': 'embed', 'start': 119.409, 'weight': 0, 'content': [{'end': 127.135, 'text': 'The code used to create Linux is free and available to the public to view, edit and for the users with appropriate skills to contribute to.', 'start': 119.409, 'duration': 7.726}, {'end': 132.924, 'text': 'Once you have Linux installed on your system, you no longer need an antivirus.', 'start': 127.939, 'duration': 4.985}, {'end': 134.525, 'text': 'Linux is a highly secure system.', 'start': 132.924, 'duration': 1.601}, {'end': 141.351, 'text': 'Moreover, there is a global development Community constantly looking at ways to enhance its security.', 'start': 135.146, 'duration': 6.205}, {'end': 145.215, 'text': 'with each upgrade, the OS becomes more secure and robust.', 'start': 141.351, 'duration': 3.864}, {'end': 146.857, 'text': 'Linux provides high stability.', 'start': 145.215, 'duration': 1.642}, {'end': 150.46, 'text': 'That is it does not need to be rebooted after a short period of time.', 'start': 147.277, 'duration': 3.183}, {'end': 155.159, 'text': 'Your Linux system rarely slows down or freezes as in Windows.', 'start': 151.158, 'duration': 4.001}, {'end': 162.92, 'text': 'You need to reboot your system after installing or uninstalling an application or updating your software, but this is not the case with Linux.', 'start': 155.359, 'duration': 7.561}], 'summary': 'Linux is a free, highly secure, and stable operating system, with global community constantly enhancing its security and stability.', 'duration': 43.511, 'max_score': 119.409, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8119409.jpg'}, {'end': 235.509, 'src': 'embed', 'start': 205.381, 'weight': 3, 'content': [{'end': 209.922, 'text': "I've tried to cover maximum number of commands so that you're comfortable working with devops.", 'start': 205.381, 'duration': 4.541}, {'end': 214.199, 'text': 'So now let us try to execute these commands in an Linux based system.', 'start': 210.757, 'duration': 3.442}, {'end': 218.241, 'text': 'So in my system, I have installed Ubuntu operating system.', 'start': 215.059, 'duration': 3.182}, {'end': 222.383, 'text': 'So let us start with the basic commands in Linux.', 'start': 218.981, 'duration': 3.402}, {'end': 226.604, 'text': 'So the first command that you must know is the man command.', 'start': 223.123, 'duration': 3.481}, {'end': 235.509, 'text': 'man stands for manual, like, if you want to know about any command in Linux, you can just type man, space the name of the command, say, for example,', 'start': 226.604, 'duration': 8.905}], 'summary': 'Covered maximum number of commands for devops on ubuntu system', 'duration': 30.128, 'max_score': 205.381, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8205381.jpg'}, {'end': 376.637, 'src': 'embed', 'start': 350.083, 'weight': 4, 'content': [{'end': 354.687, 'text': "He doesn't have any permissions related to file operations or any other operations.", 'start': 350.083, 'duration': 4.604}, {'end': 357.308, 'text': 'So root is a user the basic user.', 'start': 355.227, 'duration': 2.081}, {'end': 360.51, 'text': 'He has all the permissions on this Linux OS.', 'start': 357.889, 'duration': 2.621}, {'end': 368.791, 'text': "So if you want to switch to the root users simply type SU press enter It'll ask for a password type the password.", 'start': 361.211, 'duration': 7.58}, {'end': 372.234, 'text': 'So here it says authentication failure.', 'start': 370.312, 'duration': 1.922}, {'end': 376.637, 'text': "So there's one more command bash sudo bash.", 'start': 372.894, 'duration': 3.743}], 'summary': "Root user has all permissions on linux os. use 'su' command to switch to root user.", 'duration': 26.554, 'max_score': 350.083, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8350083.jpg'}, {'end': 484.142, 'src': 'embed', 'start': 452.085, 'weight': 5, 'content': [{'end': 461.193, 'text': 'So he has all the permissions to add a user and all so say for example, if you have to add a user so the command for that is pseudo user.', 'start': 452.085, 'duration': 9.108}, {'end': 465.837, 'text': 'Add and the name of the user say for example Arvind.', 'start': 462.534, 'duration': 3.303}, {'end': 469.4, 'text': 'Oh, it says Arvind already exists.', 'start': 467.798, 'duration': 1.602}, {'end': 473.383, 'text': 'So type Arvind 1 1.', 'start': 469.82, 'duration': 3.563}, {'end': 478.738, 'text': 'So it has created a user and say for example, if you have to add a password to this user.', 'start': 473.383, 'duration': 5.355}, {'end': 484.142, 'text': 'So the command for that is sudo passwd and the username.', 'start': 478.858, 'duration': 5.284}], 'summary': "User 'arvind' added successfully with sudo useradd and sudo passwd commands.", 'duration': 32.057, 'max_score': 452.085, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8452085.jpg'}, {'end': 541.844, 'src': 'embed', 'start': 512.332, 'weight': 6, 'content': [{'end': 518.977, 'text': 'Okay, so the user has been deleted say for example, you have to add a group a group can have multiple users.', 'start': 512.332, 'duration': 6.645}, {'end': 521.659, 'text': 'Okay, so you have to add a group to the system.', 'start': 519.057, 'duration': 2.602}, {'end': 530.787, 'text': 'So the command for that is pseudo group add and the group name so you can say the group name as techies.', 'start': 521.719, 'duration': 9.068}, {'end': 535.382, 'text': 'Okay, so the group has been added similarly if you want to remove this group.', 'start': 531.801, 'duration': 3.581}, {'end': 540.024, 'text': 'Sudo group del and the group name.', 'start': 537.383, 'duration': 2.641}, {'end': 541.844, 'text': 'Okay, pretty simple.', 'start': 540.424, 'duration': 1.42}], 'summary': "To add a group, use 'sudo group add' followed by the group name. to remove a group, use 'sudo group del' and the group name.", 'duration': 29.512, 'max_score': 512.332, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8512332.jpg'}], 'start': 33.481, 'title': 'Linux operating system and commands', 'summary': 'Introduces the linux operating system, highlighting its wide support, open-source nature, security, and stability. it also provides an overview of basic linux commands essential for working with devops and user management commands for a linux system.', 'chapters': [{'end': 162.92, 'start': 33.481, 'title': 'Linux operating system overview', 'summary': 'Introduces the linux operating system, highlighting its wide support across various platforms, open-source nature, security, and stability, making it a highly preferred and free alternative to other operating systems.', 'duration': 129.439, 'highlights': ['Linux is an open source and widely supported operating system, available on almost every major computer platform, making it one of the most widely supported operating systems. Linux is supported on almost every major computer platform including x86, ARM, etc., making it one of the most widely supported operating systems.', 'Linux is free, open-source, highly secure, and stable, eliminating the need for antivirus and frequent reboots, making it a highly preferred operating system. Linux is free, open-source, highly secure, and stable, eliminating the need for antivirus and frequent reboots, making it a highly preferred operating system.', "Linux provides high stability, as it does not need to be rebooted after a short period of time, rarely slows down or freezes, and doesn't require frequent reboots after software updates. Linux provides high stability, as it does not need to be rebooted after a short period of time, rarely slows down or freezes, and doesn't require frequent reboots after software updates."]}, {'end': 325.696, 'start': 163.501, 'title': 'Linux basic commands overview', 'summary': "Provides an overview of basic linux commands, including the 'man', 'clear', 'pwd', 'cd', and 'eco' commands, and their functionalities, which are essential for working with devops and linux based operating systems.", 'duration': 162.195, 'highlights': ["The chapter provides an overview of basic Linux commands, including the 'man', 'clear', 'PWD', 'CD', and 'Eco' commands, and their functionalities, which are essential for working with devops and Linux based operating systems.", 'Linux provides high performance on various networks and workstations, allowing a large number of users to work simultaneously and handling them efficiently.', 'Users can work without any disturbance on Linux systems, highlighting its advantages for seamless operation.']}, {'end': 541.844, 'start': 326.249, 'title': 'Linux user commands', 'summary': 'Introduces the su, sudo, and sudo bash commands for user management in a linux system, emphasizing the switch to root user, adding/deleting users and groups, and their associated commands.', 'duration': 215.595, 'highlights': ['The SU command allows switching to the root user, who has all permissions on the Linux OS, while the sudo command is used for users lacking proper privileges for specific operations. It explains the significance of switching to the root user using the SU command and the usage of the sudo command for users lacking proper permissions.', 'Demonstrates the process of adding a user and setting a password using the sudo command, exemplifying user management in a Linux system. Details the process of adding a user and setting a password using the sudo command for user management in a Linux system.', 'Illustrates the addition and removal of a group using the sudo command, showcasing the management of user groups in a Linux system. Explains the process of adding and removing a group using the sudo command, highlighting the management of user groups in a Linux system.']}], 'duration': 508.363, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh833481.jpg', 'highlights': ['Linux is free, open-source, highly secure, and stable, eliminating the need for antivirus and frequent reboots, making it a highly preferred operating system.', "Linux provides high stability, as it does not need to be rebooted after a short period of time, rarely slows down or freezes, and doesn't require frequent reboots after software updates.", 'Linux is an open source and widely supported operating system, available on almost every major computer platform, making it one of the most widely supported operating systems.', "The chapter provides an overview of basic Linux commands, including the 'man', 'clear', 'PWD', 'CD', and 'Eco' commands, and their functionalities, which are essential for working with devops and Linux based operating systems.", 'The SU command allows switching to the root user, who has all permissions on the Linux OS, while the sudo command is used for users lacking proper privileges for specific operations.', 'Demonstrates the process of adding a user and setting a password using the sudo command, exemplifying user management in a Linux system.', 'Illustrates the addition and removal of a group using the sudo command, showcasing the management of user groups in a Linux system.']}, {'end': 1375.026, 'segs': [{'end': 674.252, 'src': 'heatmap', 'start': 574.93, 'weight': 1, 'content': [{'end': 579.392, 'text': 'Can you see a big file that we have just created the cba.txt.', 'start': 574.93, 'duration': 4.462}, {'end': 583.133, 'text': 'So this is the use of the touch command to create a file.', 'start': 580.292, 'duration': 2.841}, {'end': 591.555, 'text': 'So the next command that we are going to talk about is the text editor command say for example, vi Nano vi mg edit and so on.', 'start': 583.913, 'duration': 7.642}, {'end': 596.766, 'text': 'So the VI editor is the most popular and a classic text editor in the Linux family.', 'start': 592.205, 'duration': 4.561}, {'end': 601.147, 'text': 'So to use it say for example, you have to write something into that file.', 'start': 597.466, 'duration': 3.681}, {'end': 607.308, 'text': 'So for that purpose you will use sudo VI and the name of the file CBA dot txt.', 'start': 601.187, 'duration': 6.121}, {'end': 615.11, 'text': 'Okay, so press enter the file has been open now and press I to insert anything into this say for example.', 'start': 607.488, 'duration': 7.622}, {'end': 619.251, 'text': 'Hi, this is a de Reka.', 'start': 615.15, 'duration': 4.101}, {'end': 626.552, 'text': 'So to save this file simply press escape colon w4 right and Q to quit.', 'start': 620.527, 'duration': 6.025}, {'end': 629.694, 'text': 'So our file has been saved.', 'start': 628.233, 'duration': 1.461}, {'end': 632.636, 'text': "So there's one more command called cat command.", 'start': 630.635, 'duration': 2.001}, {'end': 636.979, 'text': 'So this command can read modify or concatenate text files.', 'start': 633.236, 'duration': 3.743}, {'end': 640.702, 'text': 'So this command is also used to display the contents of the file.', 'start': 637.76, 'duration': 2.942}, {'end': 645.065, 'text': "So say for example, I've written something into this file called CBA dot txt.", 'start': 641.403, 'duration': 3.662}, {'end': 647.946, 'text': 'Now I have to display the contents of this file.', 'start': 645.625, 'duration': 2.321}, {'end': 652.588, 'text': "So what I'll do is cat and file name CBA dot txt.", 'start': 647.986, 'duration': 4.602}, {'end': 658.791, 'text': 'So here this was the line that I had written in this file CBA dot txt.', 'start': 654.429, 'duration': 4.362}, {'end': 660.752, 'text': 'So the cat command can be used for that.', 'start': 659.131, 'duration': 1.621}, {'end': 667.095, 'text': 'So there are also other flags that can be used with this command say for example hyphen B.', 'start': 661.613, 'duration': 5.482}, {'end': 670.557, 'text': 'So the command would be cat hyphen B and the file name.', 'start': 667.095, 'duration': 3.462}, {'end': 674.252, 'text': 'So this is used to add line numbers to the non blank lines.', 'start': 671.269, 'duration': 2.983}], 'summary': 'Learned about touch, vi editor, and cat command for file creation and manipulation in linux.', 'duration': 99.322, 'max_score': 574.93, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8574930.jpg'}, {'end': 619.251, 'src': 'embed', 'start': 592.205, 'weight': 0, 'content': [{'end': 596.766, 'text': 'So the VI editor is the most popular and a classic text editor in the Linux family.', 'start': 592.205, 'duration': 4.561}, {'end': 601.147, 'text': 'So to use it say for example, you have to write something into that file.', 'start': 597.466, 'duration': 3.681}, {'end': 607.308, 'text': 'So for that purpose you will use sudo VI and the name of the file CBA dot txt.', 'start': 601.187, 'duration': 6.121}, {'end': 615.11, 'text': 'Okay, so press enter the file has been open now and press I to insert anything into this say for example.', 'start': 607.488, 'duration': 7.622}, {'end': 619.251, 'text': 'Hi, this is a de Reka.', 'start': 615.15, 'duration': 4.101}], 'summary': 'Vi editor is a popular text editor in linux, used with sudo vi to edit files like cba.txt.', 'duration': 27.046, 'max_score': 592.205, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8592205.jpg'}, {'end': 724.351, 'src': 'embed', 'start': 693.728, 'weight': 1, 'content': [{'end': 696.811, 'text': 'So these were a few flags that you can use with cat command.', 'start': 693.728, 'duration': 3.083}, {'end': 702.114, 'text': 'So let me just clear the terminal So the next command that we are going to talk about is the copy command.', 'start': 697.111, 'duration': 5.003}, {'end': 710.26, 'text': 'This command is used to copy files and directories a copy of the file directory still remains in the working directory.', 'start': 702.794, 'duration': 7.466}, {'end': 715.884, 'text': 'So let me just show you how do you use this command? So it is very simple copy.', 'start': 711.041, 'duration': 4.843}, {'end': 724.351, 'text': 'So say for example CBA dot txt after copy this file to the location say for example home.', 'start': 715.965, 'duration': 8.386}], 'summary': 'Flags for cat command and usage of copy command demonstrated.', 'duration': 30.623, 'max_score': 693.728, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8693728.jpg'}, {'end': 799.865, 'src': 'embed', 'start': 774.935, 'weight': 2, 'content': [{'end': 780.159, 'text': 'so this command updates the destination file only when the source file is different from the destination file.', 'start': 774.935, 'duration': 5.224}, {'end': 785.657, 'text': "There's one more flag called hyphen capital R that is CP hyphen capital R.", 'start': 780.794, 'duration': 4.863}, {'end': 791.741, 'text': 'So this command is a recursive copy for copying directories and this command even copies the hidden files.', 'start': 785.657, 'duration': 6.084}, {'end': 795.723, 'text': 'So these were a few flags that you can use with the copy command.', 'start': 792.441, 'duration': 3.282}, {'end': 799.865, 'text': 'So the next command is the move command or the MV command.', 'start': 796.403, 'duration': 3.462}], 'summary': 'The cp command can recursively copy directories and hidden files.', 'duration': 24.93, 'max_score': 774.935, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8774935.jpg'}, {'end': 919.291, 'src': 'embed', 'start': 887.913, 'weight': 3, 'content': [{'end': 893.295, 'text': 'so this command enters into an interactive mode and the command line asks before overwriting the files.', 'start': 887.913, 'duration': 5.382}, {'end': 900.258, 'text': 'So the command MV hyphen you updates the destination file only when the source file is different from the destination file.', 'start': 894.056, 'duration': 6.202}, {'end': 903.546, 'text': 'and the third flag is the MV hyphen V.', 'start': 900.925, 'duration': 2.621}, {'end': 909.067, 'text': 'So this command enters the verbose mode and this command prints the source and the destination file.', 'start': 903.546, 'duration': 5.521}, {'end': 912.529, 'text': 'So, for those who are not aware of what verbose mode is,', 'start': 909.528, 'duration': 3.001}, {'end': 919.291, 'text': "so verbose mode provides additional details as to what drivers and software's it is loading during the startup.", 'start': 912.529, 'duration': 6.762}], 'summary': 'Mv command in interactive and verbose mode with explanation of verbose mode', 'duration': 31.378, 'max_score': 887.913, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8887913.jpg'}, {'end': 997.392, 'src': 'embed', 'start': 966.947, 'weight': 4, 'content': [{'end': 969.949, 'text': 'So the file has been removed and let us just verify this.', 'start': 966.947, 'duration': 3.002}, {'end': 974.392, 'text': 'Okay, so we cannot see anywhere the demo.txt file.', 'start': 970.129, 'duration': 4.263}, {'end': 976.073, 'text': 'So it has been removed.', 'start': 975.112, 'duration': 0.961}, {'end': 978.514, 'text': 'So this was a very simple command RM.', 'start': 976.593, 'duration': 1.921}, {'end': 981.857, 'text': 'So there are two flags that can be used along with this command.', 'start': 979.195, 'duration': 2.662}, {'end': 991.503, 'text': 'The first flag is the RM hyphen are so this command removes even the non-empty directories and the other flag is RM hyphen RP.', 'start': 982.417, 'duration': 9.086}, {'end': 997.392, 'text': 'So this command removes the non-empty directories including the parents and the sub directories.', 'start': 992.31, 'duration': 5.082}], 'summary': 'The rm command removed demo.txt file and has two flags for removing non-empty directories.', 'duration': 30.445, 'max_score': 966.947, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8966947.jpg'}, {'end': 1063.426, 'src': 'embed', 'start': 1037.58, 'weight': 5, 'content': [{'end': 1043.785, 'text': 'So the flag that can be used with this command is hyphen P that is mkdir hyphen P.', 'start': 1037.58, 'duration': 6.205}, {'end': 1047.067, 'text': 'So this command creates both a parent directory and a subdirectory.', 'start': 1043.785, 'duration': 3.282}, {'end': 1055.082, 'text': 'And if you want to create multiple files into a directory, you can use the command mkdir hyphen P and the file names.', 'start': 1047.819, 'duration': 7.263}, {'end': 1060.005, 'text': 'So this command will create multiple sub directories inside the new parent directory.', 'start': 1055.843, 'duration': 4.162}, {'end': 1063.426, 'text': 'So let me just clear the terminal.', 'start': 1060.865, 'duration': 2.561}], 'summary': "Using 'mkdir -p' command creates parent and subdirectories, enabling creation of multiple subdirectories within a new parent directory.", 'duration': 25.846, 'max_score': 1037.58, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81037579.jpg'}, {'end': 1147.462, 'src': 'embed', 'start': 1119.19, 'weight': 6, 'content': [{'end': 1121.911, 'text': 'So there are a couple of flags that you can use with this command.', 'start': 1119.19, 'duration': 2.721}, {'end': 1126.793, 'text': 'The first flag is hyphen P that is RMD IR hyphen P.', 'start': 1122.391, 'duration': 4.402}, {'end': 1130.095, 'text': 'So this command removes both the parent and the child directory.', 'start': 1126.793, 'duration': 3.302}, {'end': 1132.776, 'text': "There's one more flag called hyphen PV.", 'start': 1130.755, 'duration': 2.021}, {'end': 1135.657, 'text': 'So the command is RMD IR hyphen PV.', 'start': 1133.276, 'duration': 2.381}, {'end': 1140.539, 'text': 'So this command removes all the parent and the sub directories along with the verbose.', 'start': 1136.257, 'duration': 4.282}, {'end': 1143.88, 'text': "So I hope you're clear with this command RMD IR.", 'start': 1141.259, 'duration': 2.621}, {'end': 1147.462, 'text': 'So the next command that we are going to discuss is the grab command.', 'start': 1144.621, 'duration': 2.841}], 'summary': 'The rmdir command has flags -p and -pv, removing parent and child directories as well as sub directories along with verbosity.', 'duration': 28.272, 'max_score': 1119.19, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81119190.jpg'}, {'end': 1298.696, 'src': 'embed', 'start': 1246.553, 'weight': 7, 'content': [{'end': 1250.537, 'text': 'So this command returns the matching strings along with their line numbers.', 'start': 1246.553, 'duration': 3.984}, {'end': 1254.38, 'text': 'The next flag is the grep hyphen V.', 'start': 1251.397, 'duration': 2.983}, {'end': 1260.866, 'text': 'So this command returns the results of lines not matching the search string next flag is grep hyphen C.', 'start': 1254.38, 'duration': 6.486}, {'end': 1266.56, 'text': 'So this command returns the number of lines in which the results match the search string.', 'start': 1261.716, 'duration': 4.844}, {'end': 1272.345, 'text': 'So the next command that we are going to talk about is the sort command.', 'start': 1269.323, 'duration': 3.022}, {'end': 1278.751, 'text': 'So this command sorts the results of a search either alphabetically or numerically.', 'start': 1272.906, 'duration': 5.845}, {'end': 1283.755, 'text': 'files, file contents and directories can be sorted using this command.', 'start': 1278.751, 'duration': 5.004}, {'end': 1286.057, 'text': 'the syntax for this command is very simple.', 'start': 1283.755, 'duration': 2.302}, {'end': 1289.73, 'text': 'Let me just see the files that are present here.', 'start': 1287.508, 'duration': 2.222}, {'end': 1291.851, 'text': "So there's a file called sort test.", 'start': 1290.25, 'duration': 1.601}, {'end': 1298.696, 'text': 'So let me just see the contents of this file is or test dot txt.', 'start': 1292.432, 'duration': 6.264}], 'summary': 'The transcript explains commands like grep and sort, with a focus on their functionalities and syntax.', 'duration': 52.143, 'max_score': 1246.553, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81246553.jpg'}], 'start': 545.046, 'title': 'Linux command operations', 'summary': 'Covers basic linux command operations including copy, move, remove, create directory, search, and sort operations. key commands include cp, mv, rm, mkdir, rmdir, grep, and sort with various flags for each command.', 'chapters': [{'end': 693.147, 'start': 545.046, 'title': 'Linux file manipulation commands', 'summary': 'Covers the touch command to create files, the vi editor for text editing, and the cat command for reading, modifying, and concatenating text files with examples and use cases.', 'duration': 148.101, 'highlights': ['The VI editor is the most popular and a classic text editor in the Linux family, used for writing and saving files with commands like sudo VI and for quitting with escape colon w4 right and Q.', 'The touch command is used to create files, demonstrated by creating a file called cba.txt using the command sudo and verifying its creation with LS command.', 'The cat command is used to read, modify, or concatenate text files and display their contents, with examples of using flags like hyphen B, hyphen n, hyphen s, and hyphen capital E for specific functionalities.']}, {'end': 1375.026, 'start': 693.728, 'title': 'Linux command operations', 'summary': 'Covers basic linux command operations including copy, move, remove, create directory, search, and sort operations. key commands include copy (cp), move (mv), remove (rm), create directory (mkdir), remove directory (rmdir), search (grep), and sort (sort). key flags include cp -i, -u, -r; mv -i, -u, -v; rm -r, -rp; mkdir -p; rmdir -p, -pv; grep -i, -n, -v, -c; sort -r, -f, -n.', 'duration': 681.298, 'highlights': ['The chapter covers basic Linux command operations including copy, move, remove, create directory, search, and sort operations. Key commands include copy (CP), move (MV), remove (RM), create directory (mkdir), remove directory (rmdir), search (grep), and sort (sort). Key flags include CP -i, -u, -R; MV -i, -u, -V; RM -r, -RP; mkdir -P; rmdir -P, -PV; grep -i, -n, -V, -C; sort -R, -F, -n.', 'The CP command is used to copy files and directories, and supports flags such as -i (does not overwrite the file), -u (updates the destination file only when the source file is different), and -R (recursive copy for copying directories including hidden files).', 'The MV command moves files and directories from one directory to another, with flags including -i (enters into an interactive mode), -u (updates the destination file only when the source file is different), and -V (enters the verbose mode and prints the source and the destination file).', 'The RM command removes files from a directory and supports flags such as -r (removes even the non-empty directories) and -RP (removes the non-empty directories including the parents and the subdirectories).', 'The mkdir command is used to create a new directory, and the hyphen P flag creates both a parent directory and a subdirectory.', 'The rmdir command removes a specified directory and supports flags like -P (removes both the parent and the child directory) and -PV (removes all the parent and the subdirectories along with the verbose).', 'The grep command is used to search for a particular string or a word in a text file, and supports flags like -i (returns results for case-insensitive strings), -n (returns the matching strings along with their line numbers), -V (returns the results of lines not matching the search string), and -C (returns the number of lines in which the results match the search string).', 'The sort command sorts the results of a search either alphabetically or numerically and supports flags like -R (returns the results in reverse order), -F (does the case-insensitive sorting), and -in (returns the results as per the numerical order).']}], 'duration': 829.98, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh8545046.jpg', 'highlights': ['The VI editor is the most popular and a classic text editor in the Linux family, used for writing and saving files with commands like sudo VI and for quitting with escape colon w4 right and Q.', 'The chapter covers basic Linux command operations including copy, move, remove, create directory, search, and sort operations. Key commands include copy (CP), move (MV), remove (RM), create directory (mkdir), remove directory (rmdir), search (grep), and sort (sort). Key flags include CP -i, -u, -R; MV -i, -u, -V; RM -r, -RP; mkdir -P; rmdir -P, -PV; grep -i, -n, -V, -C; sort -R, -F, -n.', 'The CP command is used to copy files and directories, and supports flags such as -i (does not overwrite the file), -u (updates the destination file only when the source file is different), and -R (recursive copy for copying directories including hidden files).', 'The MV command moves files and directories from one directory to another, with flags including -i (enters into an interactive mode), -u (updates the destination file only when the source file is different), and -V (enters the verbose mode and prints the source and the destination file).', 'The RM command removes files from a directory and supports flags such as -r (removes even the non-empty directories) and -RP (removes the non-empty directories including the parents and the subdirectories).', 'The mkdir command is used to create a new directory, and the hyphen P flag creates both a parent directory and a subdirectory.', 'The rmdir command removes a specified directory and supports flags like -P (removes both the parent and the child directory) and -PV (removes all the parent and the subdirectories along with the verbose).', 'The grep command is used to search for a particular string or a word in a text file, and supports flags like -i (returns results for case-insensitive strings), -n (returns the matching strings along with their line numbers), -V (returns the results of lines not matching the search string), and -C (returns the number of lines in which the results match the search string).', 'The sort command sorts the results of a search either alphabetically or numerically and supports flags like -R (returns the results in reverse order), -F (does the case-insensitive sorting), and -in (returns the results as per the numerical order).']}, {'end': 1887.647, 'segs': [{'end': 1442.906, 'src': 'embed', 'start': 1377.268, 'weight': 0, 'content': [{'end': 1381.192, 'text': 'So the next command that we are going to talk about is the CH own command.', 'start': 1377.268, 'duration': 3.924}, {'end': 1383.815, 'text': 'So different uses in the OS,', 'start': 1381.753, 'duration': 2.062}, {'end': 1390.702, 'text': 'have ownerships and the permissions to ensure that the files are secure and put restrictions on who can modify the contents of the file.', 'start': 1383.815, 'duration': 6.887}, {'end': 1391.831, 'text': 'In Linux.', 'start': 1391.391, 'duration': 0.44}, {'end': 1394.252, 'text': 'There are different users who can use the system.', 'start': 1392.071, 'duration': 2.181}, {'end': 1400.733, 'text': 'So each user has some properties associated with them such as the user ID and a home directory.', 'start': 1394.792, 'duration': 5.941}, {'end': 1406.314, 'text': 'We can add users into a group to make the process of managing the users easier.', 'start': 1401.273, 'duration': 5.041}, {'end': 1409.235, 'text': 'a group can have zero or more users.', 'start': 1406.314, 'duration': 2.921}, {'end': 1412.515, 'text': 'a specified user can be associated with a default group.', 'start': 1409.235, 'duration': 3.28}, {'end': 1416.436, 'text': 'It can also be a member of other groups on the systems as well.', 'start': 1413.195, 'duration': 3.241}, {'end': 1419.846, 'text': 'So if you talk about the ownerships and the permissions,', 'start': 1417.023, 'duration': 2.823}, {'end': 1427.973, 'text': 'so to protect and secure the files and directories in Linux we use permissions to control what a user can do with a file or a directory.', 'start': 1419.846, 'duration': 8.127}, {'end': 1434.418, 'text': 'So in Linux, there are three types of permission the read permission the write permission and the execute permission.', 'start': 1428.833, 'duration': 5.585}, {'end': 1438.962, 'text': 'So the read permission allows the user to read files and directories.', 'start': 1435.119, 'duration': 3.843}, {'end': 1442.906, 'text': 'It lets the user read directories and sub directories stored in it.', 'start': 1439.603, 'duration': 3.303}], 'summary': 'In linux, ch own command manages file ownership and permissions to secure files, with three types of permissions: read, write, and execute.', 'duration': 65.638, 'max_score': 1377.268, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81377268.jpg'}, {'end': 1619.114, 'src': 'embed', 'start': 1588.875, 'weight': 3, 'content': [{'end': 1593.235, 'text': 'So this command is used to change the access permissions of files and directories.', 'start': 1588.875, 'duration': 4.36}, {'end': 1596.476, 'text': 'So the syntax for this command is pretty much simple.', 'start': 1593.856, 'duration': 2.62}, {'end': 1601.197, 'text': 'So say for example, if you want to change the permissions and the privileges of a file.', 'start': 1596.996, 'duration': 4.201}, {'end': 1606.558, 'text': 'So for that, let us just see the list of files that is present here and the permissions.', 'start': 1601.717, 'duration': 4.841}, {'end': 1612.359, 'text': 'So say, for example, this file BC dot text it has these permissions.', 'start': 1607.238, 'duration': 5.121}, {'end': 1619.114, 'text': 'So we want to give all the permissions to all the users and the groups that want to use this file.', 'start': 1613.149, 'duration': 5.965}], 'summary': 'Explains changing file permissions using a simple command.', 'duration': 30.239, 'max_score': 1588.875, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81588875.jpg'}, {'end': 1685.317, 'src': 'heatmap', 'start': 1633.305, 'weight': 0.71, 'content': [{'end': 1637.409, 'text': 'Okay So let us again have a look at the permissions of this file.', 'start': 1633.305, 'duration': 4.104}, {'end': 1645.08, 'text': 'Okay, So, as you can see here, previously these were the permissions read, write, read and read, and now it has changed to read, write,', 'start': 1637.549, 'duration': 7.531}, {'end': 1647.701, 'text': 'execute for the user, the group and the others.', 'start': 1645.08, 'duration': 2.621}, {'end': 1655.486, 'text': 'Okay, So there are a few numbers that are associated with the permissions, like zero means no permission at all.', 'start': 1648.002, 'duration': 7.484}, {'end': 1659.888, 'text': 'one means the execute permission, who means the right permission?', 'start': 1655.486, 'duration': 4.402}, {'end': 1661.549, 'text': 'and four means the read permission.', 'start': 1659.888, 'duration': 1.661}, {'end': 1665.462, 'text': 'So here we have used the command chmod 777.', 'start': 1662.179, 'duration': 3.283}, {'end': 1672.047, 'text': 'So 7 here means read write execute all the three four two and one so read write execute for the user.', 'start': 1665.462, 'duration': 6.585}, {'end': 1676.911, 'text': 'The second seven is for the group and the third seven is for any other users or the groups.', 'start': 1672.407, 'duration': 4.504}, {'end': 1682.035, 'text': 'So this was the chmod command and I hope you have understood this command.', 'start': 1677.671, 'duration': 4.364}, {'end': 1685.317, 'text': 'Let me just clear the terminal.', 'start': 1683.816, 'duration': 1.501}], 'summary': 'File permissions changed to read, write, execute for user, group, and others using chmod 777 command.', 'duration': 52.012, 'max_score': 1633.305, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81633305.jpg'}, {'end': 1716.679, 'src': 'embed', 'start': 1690.487, 'weight': 6, 'content': [{'end': 1696.49, 'text': 'So, while working in Linux or Unix based system, there might be several files and folders which are being used.', 'start': 1690.487, 'duration': 6.003}, {'end': 1699.131, 'text': 'some of them are visible and some of them are not visible.', 'start': 1696.49, 'duration': 2.641}, {'end': 1702.452, 'text': 'So LSOF stands for list of open files.', 'start': 1699.751, 'duration': 2.701}, {'end': 1706.714, 'text': 'So this command provides a list of files that are open.', 'start': 1703.113, 'duration': 3.601}, {'end': 1712.077, 'text': 'basically, it gives the information to find out the files which are opened by which process.', 'start': 1706.714, 'duration': 5.363}, {'end': 1716.679, 'text': 'so with one go, this command lists out all the open files in the output console.', 'start': 1712.077, 'duration': 4.602}], 'summary': 'Lsof command in linux/unix lists open files and processes.', 'duration': 26.192, 'max_score': 1690.487, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81690487.jpg'}, {'end': 1867.142, 'src': 'embed', 'start': 1840.524, 'weight': 7, 'content': [{'end': 1844.727, 'text': 'Okay So there are a few flags that you can use with this command.', 'start': 1840.524, 'duration': 4.203}, {'end': 1847.409, 'text': 'The first flag is the hyphen G.', 'start': 1845.327, 'duration': 2.082}, {'end': 1850.491, 'text': 'So the command would be ID hyphen G and the username.', 'start': 1847.409, 'duration': 3.082}, {'end': 1858.877, 'text': 'So this command prints only the effective group IDs, whereas ID hyphen capital G prints all the group IDs.', 'start': 1851.031, 'duration': 7.846}, {'end': 1861.799, 'text': 'ID hyphen in prints the names instead of numbers.', 'start': 1858.877, 'duration': 2.922}, {'end': 1867.142, 'text': 'and ID hyphen are prints real IDs instead of numbers.', 'start': 1862.541, 'duration': 4.601}], 'summary': "Explaining flags for the 'id' command: -g for effective group ids, -g for all group ids, -n for names, -r for real ids.", 'duration': 26.618, 'max_score': 1840.524, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81840524.jpg'}], 'start': 1377.268, 'title': 'Linux file security and commands', 'summary': 'Covers chown command and its relation to file security, user properties, user groups, permissions, different types of permissions, changing ownership and access permissions using chown and chmod commands, and listing open files and user ids using lsof and id commands.', 'chapters': [{'end': 1419.846, 'start': 1377.268, 'title': 'Linux file ownership and permissions', 'summary': 'Discusses the ch own command in linux, explaining how it relates to file security, user properties, user groups, and permissions.', 'duration': 42.578, 'highlights': ['The CH own command in Linux is used to manage file ownerships and permissions, ensuring file security and restricting modifications (4)', 'In Linux, each user has properties like user ID and a home directory, and users can be added to groups for easier management (3)', 'A group in Linux can have zero or more users, and a specified user can be associated with a default group or be a member of multiple groups (2)']}, {'end': 1887.647, 'start': 1419.846, 'title': 'Linux file permissions and commands', 'summary': 'Discusses linux file permissions and commands, covering the types of permissions (read, write, execute), changing ownership and access permissions using commands like chown and chmod, and listing open files and user ids using lsof and id commands.', 'duration': 467.801, 'highlights': ['The chapter explains Linux file permissions, which include read, write, and execute permissions, affecting users, groups, and others. The chapter explains the three types of file permissions in Linux: read, write, and execute, which affect users, groups, and others.', "It demonstrates the CHOWN command to change the owner and group of a file, using 'chown' followed by the owner name, new owner, and file name. The chapter demonstrates the usage of the CHOWN command to change the owner and group of a file, using the syntax 'chown [owner name] [new owner] [file name].'", "It details the CHMOD command, which is used to change access permissions of files and directories, and demonstrates the usage of 'chmod' followed by permission numbers and file name. The chapter details the usage of the CHMOD command, used to change access permissions of files and directories, and demonstrates the syntax 'chmod [permission numbers] [file name].'", 'The LSOF command is explained, which lists open files and provides detailed information about the files, including process ID, user, file descriptor, and size. The chapter explains the LSOF command, used to list open files and provide detailed information about them, including process ID, user, file descriptor, and size.', 'It covers the ID command to find user and group names and numeric IDs, with various flags like -G, -g, -n, -r, -u, -h, and -V for different purposes. The chapter covers the ID command, used to find user and group names and numeric IDs, with various flags for different purposes.']}], 'duration': 510.379, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81377268.jpg', 'highlights': ['The CH own command in Linux is used to manage file ownerships and permissions, ensuring file security and restricting modifications (4)', 'The chapter explains Linux file permissions, which include read, write, and execute permissions, affecting users, groups, and others (3)', "The chapter demonstrates the usage of the CHOWN command to change the owner and group of a file, using the syntax 'chown [owner name] [new owner] [file name].' (2)", "The chapter details the usage of the CHMOD command, used to change access permissions of files and directories, and demonstrates the syntax 'chmod [permission numbers] [file name].' (1)", 'In Linux, each user has properties like user ID and a home directory, and users can be added to groups for easier management (1)', 'A group in Linux can have zero or more users, and a specified user can be associated with a default group or be a member of multiple groups (1)', 'The LSOF command is explained, which lists open files and provides detailed information about the files, including process ID, user, file descriptor, and size (1)', 'It covers the ID command to find user and group names and numeric IDs, with various flags like -G, -g, -n, -r, -u, -h, and -V for different purposes (1)']}, {'end': 2583.916, 'segs': [{'end': 1917.897, 'src': 'embed', 'start': 1888.436, 'weight': 9, 'content': [{'end': 1897.342, 'text': 'So as you can see here it displays the UID for this user edureka the group ID and the group that he belongs to and the respective group IDs as well.', 'start': 1888.436, 'duration': 8.906}, {'end': 1906.769, 'text': 'So say, for example, if you want to know the user ID for this user called edureka, id-u edureka.', 'start': 1898.063, 'duration': 8.706}, {'end': 1907.55, 'text': 'so 1000.', 'start': 1906.769, 'duration': 0.781}, {'end': 1911.752, 'text': 'as you can see here, user ID is 1000 and group ID is also 1000..', 'start': 1907.55, 'duration': 4.202}, {'end': 1917.897, 'text': 'Let me just verify this the command for that is ID hyphen G.', 'start': 1911.752, 'duration': 6.145}], 'summary': "The user 'edureka' has a uid of 1000 and a gid of 1000.", 'duration': 29.461, 'max_score': 1888.436, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81888436.jpg'}, {'end': 2022.507, 'src': 'heatmap', 'start': 1971.533, 'weight': 0, 'content': [{'end': 1980.599, 'text': 'So this was a very easy syntax for the tar command and say, for example, if you want to unzip a file, so in DevOps, while installing something,', 'start': 1971.533, 'duration': 9.066}, {'end': 1986.922, 'text': 'you might be getting a file in the dot tar format while unzipping that file.', 'start': 1980.599, 'duration': 6.323}, {'end': 1992.264, 'text': 'You can use this command tar-x BF and the tar file name.', 'start': 1986.942, 'duration': 5.322}, {'end': 1997.866, 'text': 'So you can use this command to unzip a file.', 'start': 1995.365, 'duration': 2.501}, {'end': 2004.049, 'text': 'So this was about the tar command the next command that we are going to talk about is the cut command.', 'start': 1998.507, 'duration': 5.542}, {'end': 2010.039, 'text': 'So cut command is used for extracting a portion of a file using columns and delimiters.', 'start': 2004.875, 'duration': 5.164}, {'end': 2018.304, 'text': 'So say for example, if you want to list everything in a selected column, then in this case, you need to use the hyphen C flag with the cut command.', 'start': 2010.639, 'duration': 7.665}, {'end': 2022.507, 'text': 'So say for example, let me just see here.', 'start': 2018.924, 'duration': 3.583}], 'summary': 'Tar command for unzipping files, cut command for extracting file portions', 'duration': 50.974, 'max_score': 1971.533, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81971533.jpg'}, {'end': 2188.353, 'src': 'embed', 'start': 2162.662, 'weight': 2, 'content': [{'end': 2170.409, 'text': 'So say, for example, I have to replace this Baban by any other name, so I can use the SED command here, SED space.', 'start': 2162.662, 'duration': 7.747}, {'end': 2175.069, 'text': 'single quote s that is the flag that you can use with this command.', 'start': 2171.388, 'duration': 3.681}, {'end': 2181.011, 'text': 'So the word that you want to replace and the new word chagan.', 'start': 2175.689, 'duration': 5.322}, {'end': 2188.353, 'text': 'Okay, and the name of the file obviously SED test dot txt.', 'start': 2181.811, 'duration': 6.542}], 'summary': "Using sed command to replace 'baban' with 'chagan' in 'sed test.txt'", 'duration': 25.691, 'max_score': 2162.662, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82162662.jpg'}, {'end': 2313.005, 'src': 'heatmap', 'start': 2211.32, 'weight': 0.829, 'content': [{'end': 2214.043, 'text': 'So the syntax for this command is pretty much simple.', 'start': 2211.32, 'duration': 2.723}, {'end': 2222.749, 'text': 'So say for example, you have to remove all the duplicate lines from a file so you can use this command unique and the file name.', 'start': 2214.063, 'duration': 8.686}, {'end': 2226.672, 'text': 'So this was a very easy command.', 'start': 2224.891, 'duration': 1.781}, {'end': 2230.42, 'text': 'The next command that you are going to talk about is the watch command.', 'start': 2227.679, 'duration': 2.741}, {'end': 2237.024, 'text': 'So watch command in Linux is used to execute a program periodically showing output in full screen.', 'start': 2231.061, 'duration': 5.963}, {'end': 2244.468, 'text': 'This command will run a specified command in the argument repeatedly by showing its outputs and errors.', 'start': 2237.684, 'duration': 6.784}, {'end': 2250.511, 'text': 'by default, the specified command will run every two seconds and watch will run until interrupted.', 'start': 2244.468, 'duration': 6.043}, {'end': 2254.077, 'text': 'So the syntax for this command is very simple.', 'start': 2251.275, 'duration': 2.802}, {'end': 2259.402, 'text': 'You just have to type watch the flag and the command.', 'start': 2254.378, 'duration': 5.024}, {'end': 2263.485, 'text': 'Let me just show you an example using this.', 'start': 2261.463, 'duration': 2.022}, {'end': 2267.728, 'text': 'So this is flag called hyphen D that you can use with watch.', 'start': 2264.286, 'duration': 3.442}, {'end': 2273.173, 'text': 'So this parameter hyphen D highlights the differences between the successive updates.', 'start': 2268.229, 'duration': 4.944}, {'end': 2278.88, 'text': 'The options will read the optional arguments, which changes the highlight to be permanent,', 'start': 2273.897, 'duration': 4.983}, {'end': 2283.703, 'text': 'and this allows the user to see what has changed at least once since the first iteration.', 'start': 2278.88, 'duration': 4.823}, {'end': 2292.409, 'text': 'So let me just type hyphen D watch hyphen D free hyphen M.', 'start': 2284.224, 'duration': 8.185}, {'end': 2297.252, 'text': 'Free command we have used will see what free command is in the later part of this session.', 'start': 2292.409, 'duration': 4.843}, {'end': 2301.218, 'text': 'So the next command that we are going to talk about is the evil command.', 'start': 2298.416, 'duration': 2.802}, {'end': 2306.801, 'text': 'So evil is a built-in Linux command, which is used to execute arguments as a shell command.', 'start': 2301.738, 'duration': 5.063}, {'end': 2313.005, 'text': 'So it combines arguments into a single string and uses it as an input to the shell and execute commands.', 'start': 2307.322, 'duration': 5.683}], 'summary': 'Learned about unique, watch, and evil linux commands with their syntax and functionalities.', 'duration': 101.685, 'max_score': 2211.32, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82211320.jpg'}, {'end': 2237.024, 'src': 'embed', 'start': 2214.063, 'weight': 3, 'content': [{'end': 2222.749, 'text': 'So say for example, you have to remove all the duplicate lines from a file so you can use this command unique and the file name.', 'start': 2214.063, 'duration': 8.686}, {'end': 2226.672, 'text': 'So this was a very easy command.', 'start': 2224.891, 'duration': 1.781}, {'end': 2230.42, 'text': 'The next command that you are going to talk about is the watch command.', 'start': 2227.679, 'duration': 2.741}, {'end': 2237.024, 'text': 'So watch command in Linux is used to execute a program periodically showing output in full screen.', 'start': 2231.061, 'duration': 5.963}], 'summary': "Linux commands: 'unique' removes duplicates, 'watch' executes programs periodically.", 'duration': 22.961, 'max_score': 2214.063, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82214063.jpg'}, {'end': 2318.809, 'src': 'embed', 'start': 2292.409, 'weight': 5, 'content': [{'end': 2297.252, 'text': 'Free command we have used will see what free command is in the later part of this session.', 'start': 2292.409, 'duration': 4.843}, {'end': 2301.218, 'text': 'So the next command that we are going to talk about is the evil command.', 'start': 2298.416, 'duration': 2.802}, {'end': 2306.801, 'text': 'So evil is a built-in Linux command, which is used to execute arguments as a shell command.', 'start': 2301.738, 'duration': 5.063}, {'end': 2313.005, 'text': 'So it combines arguments into a single string and uses it as an input to the shell and execute commands.', 'start': 2307.322, 'duration': 5.683}, {'end': 2318.809, 'text': 'So the syntax for this command is very simple even and the arguments.', 'start': 2313.785, 'duration': 5.024}], 'summary': "The 'evil' command in linux combines arguments into a single string and executes them as shell commands.", 'duration': 26.4, 'max_score': 2292.409, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82292409.jpg'}, {'end': 2378.762, 'src': 'embed', 'start': 2353.336, 'weight': 6, 'content': [{'end': 2363.778, 'text': "in which every command is executed and is treated as the event and is associated with an event number using which they can be recalled and changed if there's a requirement to do so.", 'start': 2353.336, 'duration': 10.442}, {'end': 2366.959, 'text': 'So these commands are saved in a history file.', 'start': 2364.398, 'duration': 2.561}, {'end': 2370.76, 'text': 'So in bash shell history command shows the whole list of commands.', 'start': 2367.479, 'duration': 3.281}, {'end': 2376.061, 'text': 'So say for example, just type history here press enter.', 'start': 2371.44, 'duration': 4.621}, {'end': 2378.762, 'text': 'So this is the list of commands.', 'start': 2377.061, 'duration': 1.701}], 'summary': 'Bash shell stores commands as events with associated event numbers for recall and modification.', 'duration': 25.426, 'max_score': 2353.336, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82353336.jpg'}, {'end': 2435.012, 'src': 'embed', 'start': 2406.053, 'weight': 7, 'content': [{'end': 2413.335, 'text': 'So DD is a command line utility for Unix and Unix like OS, whose primary purpose is to convert and copy files.', 'start': 2406.053, 'duration': 7.282}, {'end': 2420.357, 'text': 'the command line syntax of DD differs from many other Unix programs in that it uses the syntax option.', 'start': 2413.335, 'duration': 7.022}, {'end': 2425.018, 'text': 'Equal to value.', 'start': 2422.738, 'duration': 2.28}, {'end': 2431.6, 'text': 'So this syntax option equal to value is used for its command line operations.', 'start': 2427.159, 'duration': 4.441}, {'end': 2435.012, 'text': "So I'll show you just a practical example of this command.", 'start': 2432.31, 'duration': 2.702}], 'summary': 'Dd is a command line utility for unix and unix-like os, used for converting and copying files.', 'duration': 28.959, 'max_score': 2406.053, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82406053.jpg'}, {'end': 2537.664, 'src': 'embed', 'start': 2508.884, 'weight': 8, 'content': [{'end': 2512.436, 'text': "Okay, so there's one more command that we talked about like the free command.", 'start': 2508.884, 'duration': 3.552}, {'end': 2517.358, 'text': 'Okay, so the free command displays the total amount of free space available,', 'start': 2512.496, 'duration': 4.862}, {'end': 2523.88, 'text': 'along with the amount of memory used and swap memory in the system and also the buffers used by the kernel.', 'start': 2517.358, 'duration': 6.522}, {'end': 2528.281, 'text': 'the syntax for this command is very simple free space or options.', 'start': 2523.88, 'duration': 4.401}, {'end': 2533.103, 'text': 'You can see so let me just type free command here and press enter.', 'start': 2528.481, 'duration': 4.622}, {'end': 2537.664, 'text': 'So as you can see here total installed memory that is present on the system.', 'start': 2533.723, 'duration': 3.941}], 'summary': "The 'free' command displays total free space, memory usage, and buffers on the system.", 'duration': 28.78, 'max_score': 2508.884, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82508884.jpg'}], 'start': 1888.436, 'title': 'Linux commands overview', 'summary': 'Covers the usage and syntax of linux commands such as tar, cut, sed, unique, watch, eval, history, dd, and free, with practical examples, emphasizing their functionalities.', 'chapters': [{'end': 1944.661, 'start': 1888.436, 'title': 'User id and group id commands', 'summary': "Explained the process of using the 'id' command to find user and group ids, with an example demonstrating user 'edureka' having a user id of 1000 and group id of 1000, along with the 'tar' command being mentioned.", 'duration': 56.225, 'highlights': ["The 'ID' command was demonstrated to find user and group IDs, revealing that user 'edureka' has a user ID of 1000 and group ID of 1000.", "The 'ID' command was used to find user and group IDs for another user, 'Arvin', showcasing the functionality of the command.", "The transcript briefly mentioned the 'tar' command, indicating it as the next topic of discussion."]}, {'end': 2583.916, 'start': 1945.296, 'title': 'Linux commands overview', 'summary': 'Discusses the usage and syntax of various linux commands including tar, cut, sed, unique, watch, eval, history, dd, and free, emphasizing their functionalities and practical examples.', 'duration': 638.62, 'highlights': ["The tar command is used to zip and unzip files of the dot tar format, with syntax 'tar -cvf ' for zipping and 'tar -xvf ' for unzipping, facilitating file compression and extraction in DevOps. The tar command syntax 'tar -cvf ' is used for zipping files, while 'tar -xvf ' is used for unzipping, aiding in file compression and extraction in DevOps.", "The cut command is utilized for extracting a portion of a file using columns and delimiters, with syntax 'cut -c 1-2 ' for displaying specific columns from a file, enabling precise data extraction. The cut command, with syntax 'cut -c 1-2 ', facilitates displaying specific columns from a file, enabling precise data extraction.", "The SED command is a text editor used for non-interactive editing operations on files, with the substitute 's' flag for replacing specific text in a file, allowing efficient file manipulations. The SED command, with the substitute 's' flag, enables efficient file manipulations by replacing specific text in a file.", "The unique command filters out duplicate lines in files, providing a simple syntax for removing duplicate lines from a file and ensuring data integrity. The unique command's simple syntax facilitates removing duplicate lines from a file, ensuring data integrity.", 'The watch command in Linux executes a program periodically, displaying output in full screen and highlighting differences between successive updates, providing a practical way to monitor program outputs. The watch command in Linux executes a program periodically, displaying output in full screen and highlighting differences between successive updates, providing a practical way to monitor program outputs.', 'The eval command in Linux executes arguments as a shell command, combining arguments into a single string and using it as an input to the shell, allowing for streamlined execution of commands. The eval command in Linux executes arguments as a shell command, allowing for streamlined execution of commands.', 'The history command is used to view previously executed commands, allowing for easy recall and modification of commands, enhancing command line efficiency. The history command facilitates easy recall and modification of previously executed commands, enhancing command line efficiency.', "The DD command is used for file conversion and copying, with a syntax of 'DD if= of=' for backup operations, providing a useful tool for file management and backup. The DD command, with syntax 'DD if= of=', provides a useful tool for file management and backup, with practical application for backup operations.", 'The free command displays the total amount of free space available, along with memory usage and swap memory in the system, providing insights into system resource allocation. The free command provides insights into system resource allocation by displaying total free space, memory usage, and swap memory in the system.']}], 'duration': 695.48, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh81888436.jpg', 'highlights': ['The tar command is used to zip and unzip files of the dot tar format, facilitating file compression and extraction in DevOps.', 'The cut command is utilized for extracting a portion of a file using columns and delimiters, enabling precise data extraction.', "The SED command, with the substitute 's' flag, enables efficient file manipulations by replacing specific text in a file.", "The unique command's simple syntax facilitates removing duplicate lines from a file, ensuring data integrity.", 'The watch command in Linux executes a program periodically, providing a practical way to monitor program outputs.', 'The eval command in Linux executes arguments as a shell command, allowing for streamlined execution of commands.', 'The history command facilitates easy recall and modification of previously executed commands, enhancing command line efficiency.', 'The DD command, with practical application for backup operations, provides a useful tool for file management and backup.', 'The free command provides insights into system resource allocation by displaying total free space, memory usage, and swap memory in the system.', "The 'ID' command was demonstrated to find user and group IDs, revealing that user 'edureka' has a user ID of 1000 and group ID of 1000."]}, {'end': 3445.876, 'segs': [{'end': 2625.982, 'src': 'embed', 'start': 2602.802, 'weight': 7, 'content': [{'end': 2611.148, 'text': 'Okay, So this command refers to a cryptographic Network protocol for operating Network services securely over an unsecured Network.', 'start': 2602.802, 'duration': 8.346}, {'end': 2617.732, 'text': 'typical use cases include remote command line execution, but any Network service can be secured with the command SSH.', 'start': 2611.148, 'duration': 6.584}, {'end': 2625.982, 'text': 'So say, for example, if you have a master node and the slave node, so if you are running this command,', 'start': 2619.059, 'duration': 6.923}], 'summary': 'Ssh is a cryptographic protocol for securing network services, including remote command line execution.', 'duration': 23.18, 'max_score': 2602.802, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82602802.jpg'}, {'end': 2680.262, 'src': 'embed', 'start': 2651.57, 'weight': 0, 'content': [{'end': 2653.511, 'text': 'You can get access to the slave machine.', 'start': 2651.57, 'duration': 1.941}, {'end': 2657.052, 'text': "So there's one more command called SSH key Jenny.", 'start': 2654.411, 'duration': 2.641}, {'end': 2664.715, 'text': 'So this command is used to generate a public private authentication key pair.', 'start': 2660.373, 'duration': 4.342}, {'end': 2671.297, 'text': 'So authentication keys allows a user to connect to a remote system without supplying the password.', 'start': 2665.473, 'duration': 5.824}, {'end': 2674.859, 'text': 'So keys must be generated for each user separately.', 'start': 2671.977, 'duration': 2.882}, {'end': 2680.262, 'text': 'So if you generate key pairs as the root user only the root user can use those key.', 'start': 2675.559, 'duration': 4.703}], 'summary': 'Ssh key jenny command generates public-private authentication key pair for accessing slave machine without password.', 'duration': 28.692, 'max_score': 2651.57, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82651570.jpg'}, {'end': 2783.24, 'src': 'embed', 'start': 2755.37, 'weight': 1, 'content': [{'end': 2762.492, 'text': 'So the IP command in Linux is present in the net tools, which is used for performing several network administration tasks.', 'start': 2755.37, 'duration': 7.122}, {'end': 2764.553, 'text': 'IP simply stands for internet protocol.', 'start': 2762.492, 'duration': 2.061}, {'end': 2769.254, 'text': 'So this command is used to show manipulative routing devices and tunnels.', 'start': 2765.253, 'duration': 4.001}, {'end': 2771.675, 'text': 'It is similar to the I have config command.', 'start': 2769.934, 'duration': 1.741}, {'end': 2775.796, 'text': 'Okay, the next command that we are going to discuss is the I have config command.', 'start': 2772.415, 'duration': 3.381}, {'end': 2783.24, 'text': 'So I have config that is interface configuration command is used to configure the kernel resident network interfaces.', 'start': 2776.579, 'duration': 6.661}], 'summary': 'Ip command in linux is used for network administration tasks and similar to ifconfig command.', 'duration': 27.87, 'max_score': 2755.37, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82755370.jpg'}, {'end': 3089.302, 'src': 'embed', 'start': 3039.958, 'weight': 2, 'content': [{'end': 3043.52, 'text': 'So this command will list all the TCP ports that are available.', 'start': 3039.958, 'duration': 3.562}, {'end': 3047.002, 'text': 'So as you can see here, these are the TCP ports.', 'start': 3044.301, 'duration': 2.701}, {'end': 3051.045, 'text': 'So this was about the netstat commands.', 'start': 3048.043, 'duration': 3.002}, {'end': 3054.221, 'text': 'So the next command is the NS lookup command.', 'start': 3052.139, 'duration': 2.082}, {'end': 3057.283, 'text': 'So NS lookup stands for name server lookup.', 'start': 3054.741, 'duration': 2.542}, {'end': 3061.527, 'text': 'This is a useful command for getting information from the DNS server.', 'start': 3058.024, 'duration': 3.503}, {'end': 3068.853, 'text': 'It is a network administration tool for querying the domain name system to obtain domain name or IP addresses,', 'start': 3062.327, 'duration': 6.526}, {'end': 3071.234, 'text': 'mapping or any other specific DNS record.', 'start': 3068.853, 'duration': 2.381}, {'end': 3075.037, 'text': 'It is also used to troubleshoot DNS related problems.', 'start': 3072.135, 'duration': 2.902}, {'end': 3079.241, 'text': 'So the syntax for this is very simple simply type NS lookup.', 'start': 3075.598, 'duration': 3.643}, {'end': 3089.302, 'text': 'And the option Let me just type NS lookup say for example google.com.', 'start': 3080.742, 'duration': 8.56}], 'summary': 'Netstat lists tcp ports. ns lookup queries dns for domain and ip information.', 'duration': 49.344, 'max_score': 3039.958, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83039958.jpg'}, {'end': 3140.525, 'src': 'embed', 'start': 3115.315, 'weight': 4, 'content': [{'end': 3121.018, 'text': 'So the next command that we are going to talk about is the C URL or curl command, as you can see.', 'start': 3115.315, 'duration': 5.703}, {'end': 3131.945, 'text': 'so curl is a command line tool to transfer data to or from a server using any of the supported protocols, such as HTTP, FTP, SCP, SMTP and so on.', 'start': 3121.018, 'duration': 10.927}, {'end': 3134.863, 'text': 'So curl is powered by a lip curl.', 'start': 3132.862, 'duration': 2.001}, {'end': 3140.525, 'text': 'So this tool is preferred for automation since it is designed to work without any user interaction.', 'start': 3135.343, 'duration': 5.182}], 'summary': 'Curl is a command line tool for data transfer using various protocols, designed for automation.', 'duration': 25.21, 'max_score': 3115.315, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83115315.jpg'}, {'end': 3201.854, 'src': 'embed', 'start': 3174.32, 'weight': 5, 'content': [{'end': 3177.283, 'text': 'The next command that we are going to talk about is the AWK command.', 'start': 3174.32, 'duration': 2.963}, {'end': 3183.028, 'text': 'So AWK is a scripting language used for manipulating data and generating reports.', 'start': 3178.123, 'duration': 4.905}, {'end': 3190.989, 'text': 'The AWK command programming language requires no compiling and allows the user to use variables, numeric functions,', 'start': 3183.866, 'duration': 7.123}, {'end': 3193.29, 'text': 'string functions and logical operators.', 'start': 3190.989, 'duration': 2.301}, {'end': 3201.854, 'text': 'So a WK is abbreviated from the names of the developers that is a whole when burger and the kernigan.', 'start': 3194.271, 'duration': 7.583}], 'summary': 'Awk is a scripting language for data manipulation and report generation, developed by aho, weinberger, and kernighan.', 'duration': 27.534, 'max_score': 3174.32, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83174320.jpg'}, {'end': 3396.938, 'src': 'embed', 'start': 3368.381, 'weight': 6, 'content': [{'end': 3374.785, 'text': 'It supports a range of transformations, including uppercase to lowercase, squeezing, repeating characters,', 'start': 3368.381, 'duration': 6.404}, {'end': 3379.468, 'text': 'deleting specific characters and basic find and replace.', 'start': 3374.785, 'duration': 4.683}, {'end': 3383.971, 'text': 'it can be used with Unix pipes to support more complex translations.', 'start': 3379.468, 'duration': 4.503}, {'end': 3388.094, 'text': "Okay, so I'll just show you an example of the PR command.", 'start': 3384.932, 'duration': 3.162}, {'end': 3393.215, 'text': 'So say for example this file called AWK test.', 'start': 3389.372, 'duration': 3.843}, {'end': 3396.938, 'text': 'Okay, so let us just see the contents of this file.', 'start': 3394.116, 'duration': 2.822}], 'summary': 'Tool supports various transformations for text processing, can be used with unix pipes for complex translations.', 'duration': 28.557, 'max_score': 3368.381, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83368381.jpg'}], 'start': 2584.757, 'title': 'Network commands in devops', 'summary': 'Covers ssh and ip commands for secure remote access and network administration tasks in linux, including practical examples and use cases for ip, netstat, ns lookup, curl, awk, and pr. it includes demonstrating tasks such as displaying link layer information, troubleshooting dns, transferring data using curl, manipulating data using awk, and performing character translations using pr.', 'chapters': [{'end': 2908.191, 'start': 2584.757, 'title': 'Ssh and ip commands in devops', 'summary': 'Covers ssh command for secure remote access and generating ssh keys, as well as ip command for network administration tasks in linux, including i have config command for interface configuration.', 'duration': 323.434, 'highlights': ['The SSH command allows secure remote access to network services over an unsecured network, enabling remote command line execution and secure access to network services.', "The SSH command can be used to access a master node from a slave node or vice versa using the syntax 'SSH ' or 'SSH '.", 'The SSH key gen command is used to generate a public-private authentication key pair, allowing users to connect to a remote system without supplying a password.', 'The IP command in Linux is used for performing network administration tasks, including showing and manipulating routing devices and tunnels.', "The I have config command is used for configuring kernel resident network interfaces, assigning IP addresses, enabling/disabling interfaces, and displaying interface details using options like 'ifconfig -a' and 'ifconfig -s'."]}, {'end': 3445.876, 'start': 2908.191, 'title': 'Ip and network commands', 'summary': 'Covers several network commands including ip, netstat, ns lookup, curl, awk, and pr, providing practical examples and use cases. it demonstrates how to show ip addresses, display link layer information, list tcp ports, troubleshoot dns, transfer data using curl, manipulate data using awk, and perform character translations using pr.', 'duration': 537.685, 'highlights': ["The 'IP' command is used to perform tasks such as assigning addresses to network interfaces, configuring network interface parameters, and listing IP addresses and property information. Tasks performed by the IP command include assigning addresses to network interfaces, configuring network interface parameters, and listing IP addresses and property information.", "The 'netstat' command lists all the TCP ports that are available and provides useful network-related information such as network connections, routing tables, and interface statistics. The 'netstat' command lists available TCP ports and provides network-related information including network connections, routing tables, and interface statistics.", "The 'NS lookup' command is a useful tool for querying the domain name system to obtain domain names or IP addresses and troubleshoot DNS related problems. The 'NS lookup' command queries the domain name system to obtain domain names or IP addresses and troubleshoot DNS related problems.", "The 'curl' command line tool is used to transfer data to or from a server using supported protocols such as HTTP, FTP, and SMTP, and is designed to work without user interaction. The 'curl' command line tool transfers data using supported protocols and is designed to work without user interaction.", "The 'AWK' command is a scripting language used for manipulating data and generating reports, requiring no compiling and allowing the user to use variables, numeric functions, string functions, and logical operators. The 'AWK' command is a scripting language used for manipulating data, generating reports, and allows the use of variables, numeric functions, string functions, and logical operators.", "The 'PR' command in Unix is a command-line utility used for translating and deleting characters, supporting transformations such as uppercase to lowercase, squeezing repeating characters, deleting specific characters, and basic find and replace. The 'PR' command in Unix is a command-line utility used for translating and deleting characters, supporting various transformations and complex translations."]}], 'duration': 861.119, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh82584757.jpg', 'highlights': ['The SSH key gen command generates a public-private authentication key pair for secure remote access.', "The 'IP' command in Linux is used for performing network administration tasks, including showing and manipulating routing devices and tunnels.", "The 'netstat' command lists available TCP ports and provides network-related information including network connections, routing tables, and interface statistics.", "The 'NS lookup' command queries the domain name system to obtain domain names or IP addresses and troubleshoot DNS related problems.", "The 'curl' command line tool transfers data using supported protocols and is designed to work without user interaction.", "The 'AWK' command is a scripting language used for manipulating data, generating reports, and allows the use of variables, numeric functions, string functions, and logical operators.", "The 'PR' command in Unix is a command-line utility used for translating and deleting characters, supporting various transformations and complex translations.", 'The SSH command allows secure remote access to network services over an unsecured network, enabling remote command line execution and secure access to network services.', 'The IP command in Linux is used for performing network administration tasks, including showing and manipulating routing devices and tunnels.', "The 'netstat' command lists available TCP ports and provides network-related information including network connections, routing tables, and interface statistics.", "The 'NS lookup' command queries the domain name system to obtain domain names or IP addresses and troubleshoot DNS related problems.", "The 'curl' command line tool transfers data using supported protocols and is designed to work without user interaction.", "The 'AWK' command is a scripting language used for manipulating data, generating reports, and allows the use of variables, numeric functions, string functions, and logical operators.", "The 'PR' command in Unix is a command-line utility used for translating and deleting characters, supporting various transformations and complex translations."]}, {'end': 3774.441, 'segs': [{'end': 3529.597, 'src': 'embed', 'start': 3472.808, 'weight': 0, 'content': [{'end': 3480.77, 'text': 'In practice Env command has another common use it is often used by shell scripts to launch a correct interpreter in this usage.', 'start': 3472.808, 'duration': 7.962}, {'end': 3482.911, 'text': 'The environment is typically not changed.', 'start': 3480.97, 'duration': 1.941}, {'end': 3488.312, 'text': 'So say for example, I have to see a list of all the environment variables that are present on my system.', 'start': 3483.891, 'duration': 4.421}, {'end': 3490.933, 'text': "So I'll simply type Env and press enter.", 'start': 3489.012, 'duration': 1.921}, {'end': 3499.355, 'text': 'Okay So these are the list of environment variables that are present say for example, if you want to run a command with an empty environment.', 'start': 3491.453, 'duration': 7.902}, {'end': 3513.225, 'text': 'So for that the syntax is Env hyphen I and the command okay and say, for example, if you want to remove a variable from the environment,', 'start': 3499.955, 'duration': 13.27}, {'end': 3525.634, 'text': 'so for that the syntax is ENV hyphen you and the variable name okay.', 'start': 3513.225, 'duration': 12.409}, {'end': 3529.597, 'text': 'so I hope you have understood this command ENV.', 'start': 3525.634, 'duration': 3.963}], 'summary': 'The env command is used to manage environment variables in shell scripts and can display, modify, and run commands with the environment variables.', 'duration': 56.789, 'max_score': 3472.808, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83472808.jpg'}, {'end': 3612.232, 'src': 'embed', 'start': 3556.607, 'weight': 3, 'content': [{'end': 3560.849, 'text': "So I'm going to tell you the usage of the IP tables commands.", 'start': 3556.607, 'duration': 4.242}, {'end': 3566.218, 'text': 'So say for example while working in DevOps for some reason you need to disable the firewalls.', 'start': 3561.454, 'duration': 4.764}, {'end': 3575.606, 'text': 'So for that this command IP tables can be used say for example service service IP tables.', 'start': 3566.879, 'duration': 8.727}, {'end': 3582.792, 'text': 'Stop so this command can be used to disable the firewalls.', 'start': 3578.969, 'duration': 3.823}, {'end': 3588.76, 'text': 'Okay, so this was one use of the command called IP tables.', 'start': 3583.957, 'duration': 4.803}, {'end': 3592.381, 'text': 'Okay So as of now we are not running this command on our system.', 'start': 3589.2, 'duration': 3.181}, {'end': 3596.964, 'text': 'So the next command that we are going to talk about is the apt-get command.', 'start': 3593.442, 'duration': 3.522}, {'end': 3602.007, 'text': 'So apt-get is a command line tool which helps in handling packages in Linux.', 'start': 3597.884, 'duration': 4.123}, {'end': 3610.911, 'text': 'Its main task is to retrieve the information and packages from the authenticated sources for installation, upgrade and removal of packages,', 'start': 3602.807, 'duration': 8.104}, {'end': 3612.232, 'text': 'along with their dependencies.', 'start': 3610.911, 'duration': 1.321}], 'summary': 'Usage of ip tables & apt-get commands for devops tasks.', 'duration': 55.625, 'max_score': 3556.607, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83556607.jpg'}, {'end': 3699.613, 'src': 'embed', 'start': 3673.694, 'weight': 4, 'content': [{'end': 3681.199, 'text': 'the DF or the disk free command reports the amount of available disk space being used by the file systems.', 'start': 3673.694, 'duration': 7.505}, {'end': 3688.525, 'text': 'the do or the disk usage command reports the size of directory trees, inclusive of all their contents, and the size of individual files.', 'start': 3681.199, 'duration': 7.326}, {'end': 3694.129, 'text': 'The aim is to make sure you are not over shooting the 80% threshold.', 'start': 3689.485, 'duration': 4.644}, {'end': 3699.613, 'text': 'If you exceed the threshold it is time to scale or clean up the mess because you are running out of the resources.', 'start': 3694.809, 'duration': 4.804}], 'summary': 'Df reports available disk space, aim to stay under 80% threshold to avoid resource shortage.', 'duration': 25.919, 'max_score': 3673.694, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83673694.jpg'}], 'start': 3448.178, 'title': 'Unix and linux commands', 'summary': 'Delves into unix commands including pr and env, focusing on printing environment variables, running utilities in custom environments, and managing variables. it also covers linux commands such as ip tables, apt-get, df, and du, addressing their practical applications and syntax for managing firewalls, handling packages, monitoring disk space, and identifying resource-intensive directories.', 'chapters': [{'end': 3529.597, 'start': 3448.178, 'title': 'Usage of pr and env commands', 'summary': 'Discusses the usage of the pr and env commands in unix, highlighting how the env command is used to print environment variables, run a utility in a custom environment, and manage variables such as removing and running commands with an empty environment.', 'duration': 81.419, 'highlights': ['The ENV command is used to print environment variables and run a utility or a command in a custom environment, demonstrating its practical usage. It is also commonly used by shell scripts to launch a correct interpreter without changing the environment.', "The syntax 'Env -i' is used to run a command with an empty environment, providing a practical example of its usage.", "The syntax 'ENV -u' is used to remove a variable from the environment, showcasing the command's capability to manage environment variables."]}, {'end': 3774.441, 'start': 3529.597, 'title': 'Linux commands overview', 'summary': 'Covers the usage of ip tables, apt-get, df, and du commands, emphasizing the practical applications and syntax for executing these commands in various scenarios, such as managing firewalls, handling packages, monitoring disk space, and identifying resource-intensive directories.', 'duration': 244.844, 'highlights': ["IP tables command usage for disabling firewalls in DevOps The IP tables command can be used to disable firewalls in DevOps, for example, by using the command 'service iptables stop'.", 'Practical application of apt-get command for package installation, upgrade, and removal apt-get is a command line tool used for handling packages in Linux, allowing tasks such as installation, upgrade, and removal of packages, along with their dependencies, with specific syntax for different Linux systems.', 'Explanation of DF and du commands for monitoring disk space and identifying resource-intensive directories The DF command reports available disk space, while the du command reports the size of directory trees and individual files, aiming to ensure disk space does not exceed the 80% threshold and providing syntax for human-readable output and identifying disk space-consuming locations.']}], 'duration': 326.263, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83448178.jpg', 'highlights': ["The syntax 'ENV -u' is used to remove a variable from the environment, showcasing the command's capability to manage environment variables.", 'The ENV command is used to print environment variables and run a utility or a command in a custom environment, demonstrating its practical usage.', "The syntax 'Env -i' is used to run a command with an empty environment, providing a practical example of its usage.", 'Practical application of apt-get command for package installation, upgrade, and removal apt-get is a command line tool used for handling packages in Linux, allowing tasks such as installation, upgrade, and removal of packages, along with their dependencies, with specific syntax for different Linux systems.', 'Explanation of DF and du commands for monitoring disk space and identifying resource-intensive directories The DF command reports available disk space, while the du command reports the size of directory trees and individual files, aiming to ensure disk space does not exceed the 80% threshold and providing syntax for human-readable output and identifying disk space-consuming locations.', "IP tables command usage for disabling firewalls in DevOps The IP tables command can be used to disable firewalls in DevOps, for example, by using the command 'service iptables stop'."]}, {'end': 4008.557, 'segs': [{'end': 3834.155, 'src': 'embed', 'start': 3793.602, 'weight': 0, 'content': [{'end': 3799.486, 'text': 'while the kernel is the innermost part of an operating system, a shell is the outermost one.', 'start': 3793.602, 'duration': 5.884}, {'end': 3805.851, 'text': 'a shell in a Linux OS takes input from you in the form of commands, processes it and then gives an output.', 'start': 3799.486, 'duration': 6.365}, {'end': 3810.635, 'text': 'It is the interface through which a user works on the programs commands and scripts.', 'start': 3806.291, 'duration': 4.344}, {'end': 3813.805, 'text': 'A shell is accessed by a terminal which runs it.', 'start': 3811.244, 'duration': 2.561}, {'end': 3822.149, 'text': 'So whenever you run the terminal the shell issues a command prompt where you can type your input which is then executed when you hit the enter key.', 'start': 3814.326, 'duration': 7.823}, {'end': 3826.331, 'text': 'So the output or the result is thereafter displayed on the terminal.', 'start': 3822.709, 'duration': 3.622}, {'end': 3832.634, 'text': 'the shell wraps around the delicate interior of an operating system, thereby protecting it from accidental damage.', 'start': 3826.331, 'duration': 6.303}, {'end': 3834.155, 'text': 'Hence it is named as shell.', 'start': 3833.054, 'duration': 1.101}], 'summary': 'A linux shell processes user input as commands and protects the os, accessed via a terminal.', 'duration': 40.553, 'max_score': 3793.602, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83793602.jpg'}, {'end': 3902.805, 'src': 'embed', 'start': 3879.603, 'weight': 3, 'content': [{'end': 3886.947, 'text': 'it can combine lengthy and repetitive sequences of commands into a single and a simple script which can be stored and executed anytime.', 'start': 3879.603, 'duration': 7.344}, {'end': 3893.817, 'text': 'So this reduces the effort required by the end user So let us understand the various steps in creating a shell script.', 'start': 3887.527, 'duration': 6.29}, {'end': 3902.805, 'text': 'So what you do is first you create a file using the VI editor or any other editor, and you name the script with an extension dot sh.', 'start': 3894.358, 'duration': 8.447}], 'summary': 'Shell script simplifies commands, reducing user effort. create file with .sh extension.', 'duration': 23.202, 'max_score': 3879.603, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83879603.jpg'}, {'end': 3975.147, 'src': 'embed', 'start': 3947.222, 'weight': 2, 'content': [{'end': 3955.244, 'text': 'So we have to type say for example ABC dot sh We have to write something here.', 'start': 3947.222, 'duration': 8.022}, {'end': 3962.086, 'text': "So what we'll do is I have a simple program which calculates the sum of the digits of a number.", 'start': 3955.924, 'duration': 6.162}, {'end': 3967.968, 'text': 'it accepts a number from a user and it calculates the sum of its digits and it displays the result.', 'start': 3962.086, 'duration': 5.882}, {'end': 3970.028, 'text': 'So this is a very simple program.', 'start': 3968.648, 'duration': 1.38}, {'end': 3971.649, 'text': "I'll just write it here.", 'start': 3970.389, 'duration': 1.26}, {'end': 3975.147, 'text': "I'll just save it WQ.", 'start': 3973.286, 'duration': 1.861}], 'summary': 'A simple program calculates sum of digits in a number.', 'duration': 27.925, 'max_score': 3947.222, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83947222.jpg'}], 'start': 3775.181, 'title': 'Shell in linux os and shell scripting', 'summary': 'Delves into the role of the shell in a linux os, its functions, and the process of creating and executing shell scripts. it also demonstrates a simple shell script for reducing user effort.', 'chapters': [{'end': 3834.155, 'start': 3775.181, 'title': 'Understanding the shell in linux os', 'summary': 'Explains the role of the shell as the interface for user interaction in a linux os, highlighting its function of processing commands and protecting the operating system, with the kernel being the innermost component and the shell being the outermost.', 'duration': 58.974, 'highlights': ['The shell in a Linux OS serves as the interface through which a user works on programs, commands, and scripts, processing input and providing output.', 'A kernel is the nucleus of a computer, facilitating communication between hardware and software, while the shell is the outermost component of an operating system.', 'The shell protects the delicate interior of an operating system from accidental damage, highlighting its significance in maintaining system integrity.', 'When a user runs the terminal, the shell issues a command prompt for input, which is then executed upon pressing the enter key, with the result being displayed on the terminal.']}, {'end': 4008.557, 'start': 3834.795, 'title': 'Understanding shell scripting', 'summary': 'Introduces different types of shells including bond shell and seashell, explains the process of creating and executing a shell script, and demonstrates an example of a simple shell script for calculating the sum of digits, reducing user effort.', 'duration': 173.762, 'highlights': ['The bash shell is the most popular shell. The bash shell is the most popular shell.', 'Shell scripting is writing a series of commands for the shell to execute, reducing the effort required by the end user. Shell scripting is writing a series of commands for the shell to execute, reducing the effort required by the end user.', 'The process of creating a shell script involves creating a file using an editor, naming the script with a .sh extension, and starting the script with the shebang operator to direct the script to the interpreter location. The process of creating a shell script involves creating a file using an editor, naming the script with a .sh extension, and starting the script with the shebang operator to direct the script to the interpreter location.', 'Demonstration of a simple program in a shell script for calculating the sum of digits of a number and displaying the result. Demonstration of a simple program in a shell script for calculating the sum of digits of a number and displaying the result.']}], 'duration': 233.376, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh83775181.jpg', 'highlights': ['The shell in a Linux OS serves as the interface through which a user works on programs, commands, and scripts, processing input and providing output.', 'The shell protects the delicate interior of an operating system from accidental damage, highlighting its significance in maintaining system integrity.', 'Demonstration of a simple program in a shell script for calculating the sum of digits of a number and displaying the result.', 'Shell scripting is writing a series of commands for the shell to execute, reducing the effort required by the end user.']}, {'end': 4592.149, 'segs': [{'end': 4063.534, 'src': 'embed', 'start': 4033.068, 'weight': 0, 'content': [{'end': 4034.909, 'text': 'so get is a free, open source,', 'start': 4033.068, 'duration': 1.841}, {'end': 4042.452, 'text': 'distributed version control system tool designed to handle everything from small to very large projects with speed and efficiency.', 'start': 4034.909, 'duration': 7.543}, {'end': 4050.175, 'text': 'So get has the functionality, performance, security and flexibility that most teams and individual developers need.', 'start': 4043.052, 'duration': 7.123}, {'end': 4054.277, 'text': 'it also serves as an important distributed version control tool that is used in devops.', 'start': 4050.175, 'duration': 4.102}, {'end': 4059.211, 'text': 'Tools like it enable the communication between the development and the operations team.', 'start': 4055.089, 'duration': 4.122}, {'end': 4063.534, 'text': "So whenever you're developing a large project with a huge number of collaborators,", 'start': 4059.772, 'duration': 3.762}], 'summary': 'Git is a free, open source version control system for small to large projects, offering functionality, performance, security, and flexibility. it is essential for communication between development and operations teams.', 'duration': 30.466, 'max_score': 4033.068, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh84033068.jpg'}, {'end': 4099.814, 'src': 'embed', 'start': 4073.059, 'weight': 1, 'content': [{'end': 4077.462, 'text': 'the bits and pieces that we all deploy lies in the version control system like it.', 'start': 4073.059, 'duration': 4.403}, {'end': 4086.084, 'text': 'So to succeed in devops, you need to have all the communication in the version control and hence get plays a very vital role in succeeding at devops.', 'start': 4078.098, 'duration': 7.986}, {'end': 4094.731, 'text': 'So this was the definition of get and this is the diagram that you must remember, like the working directory, the staging area,', 'start': 4086.825, 'duration': 7.906}, {'end': 4097.433, 'text': 'the local repository and the remote repository.', 'start': 4094.731, 'duration': 2.702}, {'end': 4099.814, 'text': 'You just need to remember these things.', 'start': 4098.113, 'duration': 1.701}], 'summary': "In devops, communication in version control is vital. git's components include working directory, staging area, local repository, and remote repository.", 'duration': 26.755, 'max_score': 4073.059, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh84073059.jpg'}, {'end': 4321.636, 'src': 'embed', 'start': 4272.195, 'weight': 3, 'content': [{'end': 4273.735, 'text': 'So this was a very easy command.', 'start': 4272.195, 'duration': 1.54}, {'end': 4276.476, 'text': 'Just clear the terminal.', 'start': 4275.576, 'duration': 0.9}, {'end': 4279.257, 'text': 'So the next command is the git add command.', 'start': 4277.156, 'duration': 2.101}, {'end': 4288.175, 'text': 'So this command adds a file to the staging area and the command for that is very simple get add and the file name.', 'start': 4279.992, 'duration': 8.183}, {'end': 4298.899, 'text': 'So this is a syntax for the add command and suppose if you have more than one file to add to the staging area, you can simply use the star option.', 'start': 4290.336, 'duration': 8.563}, {'end': 4302.94, 'text': 'Okay, so it will add everything like more than one file or multiple files.', 'start': 4298.979, 'duration': 3.961}, {'end': 4305.501, 'text': 'So this was about the git add command.', 'start': 4303.66, 'duration': 1.841}, {'end': 4308.162, 'text': 'The next command is the git commit command.', 'start': 4306.081, 'duration': 2.081}, {'end': 4313.433, 'text': 'So this command records or snapshots the file permanently in the version history.', 'start': 4308.971, 'duration': 4.462}, {'end': 4316.794, 'text': 'So the syntax for this command is get commit.', 'start': 4314.073, 'duration': 2.721}, {'end': 4321.636, 'text': 'Hyphen M and any of the message that you want to type.', 'start': 4318.374, 'duration': 3.262}], 'summary': 'Introduction to git commands: git add and git commit for staging and recording files.', 'duration': 49.441, 'max_score': 4272.195, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh84272195.jpg'}, {'end': 4462.029, 'src': 'embed', 'start': 4432.086, 'weight': 2, 'content': [{'end': 4433.886, 'text': 'So the next command is the git pull command.', 'start': 4432.086, 'duration': 1.8}, {'end': 4439.308, 'text': 'So this command fetches and merges changes on the remote server to your working directory.', 'start': 4434.626, 'duration': 4.682}, {'end': 4445.01, 'text': 'So the syntax is pretty simple git pull and the repository link.', 'start': 4440.048, 'duration': 4.962}, {'end': 4453.813, 'text': 'So this is a very simple command the next command that we are going to talk about is the git branch command.', 'start': 4448.651, 'duration': 5.162}, {'end': 4462.029, 'text': 'This command lists all the local branches in your current repository and its syntax is very simple just get an branch.', 'start': 4454.426, 'duration': 7.603}], 'summary': 'Git pull fetches and merges changes, git branch lists local branches.', 'duration': 29.943, 'max_score': 4432.086, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh84432086.jpg'}], 'start': 4008.557, 'title': 'Git commands and usage', 'summary': 'Covers the concept of git, its importance in devops, and essential commands such as git config, git init, git clone, git add, git commit, git remote, git branch, git checkout, git merge, and git rebase. it includes examples, functionalities, and syntax.', 'chapters': [{'end': 4271.355, 'start': 4008.557, 'title': 'Understanding git commands', 'summary': 'Explains the concept of git, its importance in devops, and covers essential git commands such as git config, git init, and git clone, with examples and syntax.', 'duration': 262.798, 'highlights': ['Git is a free, open-source version control system tool designed for small to large projects, offering functionality, performance, security, and flexibility. Git is a free, open-source, distributed version control system tool designed to handle everything from small to very large projects with speed and efficiency, offering functionality, performance, security, and flexibility.', 'Importance of Git in DevOps for enabling communication, collaboration, and version control, emphasizing the vital role of Git in succeeding at DevOps. Git plays a vital role in enabling communication between development and operations teams, serving as an important distributed version control tool in DevOps, and succeeding in DevOps requires communication in the version control, where Git plays a vital role.', 'Explanation of essential Git commands like git config, git init, and git clone, with syntax and practical examples. The chapter explains essential Git commands such as git config, used to set author name and email address, git init for starting a new repository, and git clone for obtaining a repository from an existing URL, with syntax and practical examples.']}, {'end': 4592.149, 'start': 4272.195, 'title': 'Git commands tutorial', 'summary': 'Covers the usage and syntax of essential git commands, including git add, git commit, git remote, git branch, git checkout, git merge, and git rebase, with details on their functionalities and syntax.', 'duration': 319.954, 'highlights': ['The git commit command records or snapshots the file permanently in the version history, with the syntax git commit -m [message].', 'The git pull command fetches and merges changes on the remote server to your working directory, with the syntax git pull [repository link].', 'The git add command adds a file to the staging area, and when used with the star option, it adds multiple files, making it a valuable command for efficient version control and collaboration.']}], 'duration': 583.592, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/GzIFoJBVwh8/pics/GzIFoJBVwh84008557.jpg', 'highlights': ['Git is a free, open-source version control system tool designed for small to large projects, offering functionality, performance, security, and flexibility.', 'Importance of Git in DevOps for enabling communication, collaboration, and version control, emphasizing the vital role of Git in succeeding at DevOps.', 'Explanation of essential Git commands like git config, git init, and git clone, with syntax and practical examples.', 'The git commit command records or snapshots the file permanently in the version history, with the syntax git commit -m [message].', 'The git pull command fetches and merges changes on the remote server to your working directory, with the syntax git pull [repository link].', 'The git add command adds a file to the staging area, and when used with the star option, it adds multiple files, making it a valuable command for efficient version control and collaboration.']}], 'highlights': ['Linux is free, open-source, highly secure, and stable, eliminating the need for antivirus and frequent reboots, making it a highly preferred operating system.', 'The chapter covers the basics of Linux, including a few basic commands and the most frequently used commands in DevOps.', 'The session includes the discussion of shell scripting, an essential part of the agenda.', 'The importance of subscribing to the YouTube channel for continuous updates from edureka is emphasized.', 'The VI editor is the most popular and a classic text editor in the Linux family, used for writing and saving files with commands like sudo VI and for quitting with escape colon w4 right and Q.', 'The chapter covers basic Linux command operations including copy, move, remove, create directory, search, and sort operations.', 'The CH own command in Linux is used to manage file ownerships and permissions, ensuring file security and restricting modifications (4)', 'The tar command is used to zip and unzip files of the dot tar format, facilitating file compression and extraction in DevOps.', 'The SSH key gen command generates a public-private authentication key pair for secure remote access.', "The syntax 'ENV -u' is used to remove a variable from the environment, showcasing the command's capability to manage environment variables.", 'The shell in a Linux OS serves as the interface through which a user works on programs, commands, and scripts, processing input and providing output.', 'Git is a free, open-source version control system tool designed for small to large projects, offering functionality, performance, security, and flexibility.', 'Shell scripting is writing a series of commands for the shell to execute, reducing the effort required by the end user.']}