As we know, our computer understands only binary language i.e 1 and 0 which is very difficult for all of us to read and write. So in Operating System, there is special program called Shell.
Shell accepts your instruction or commands in English and if its a valid command, it is pass to kernel.
What Shell is ?
– Shell is a user program or it’s environment provided for user interaction.
– Shell is an command language interpreter that executes commands read from the standard input device or from a file.
– Shell is not part of system kernel, but uses the system kernel to execute programs, create files etc.
There are several SHELLS available in Linux are like Bash Shell, Bourne Shell, Korn Shell etc.
Also Read: Bash External Variables | Bash Environment Variables | Bash Inbuilt Variables
Presenter – Mr. Chetan Soni, a cyber security expert that has been continuously adapting its information protection strategies for over a years. Chetan Soni born on the , 5th of January has created a revolution in the field of cyber security. He has over 5 years of Experience in IT Security and has been with C-DAC from last two years. He has extensively worked in the domain of Cyber Security & Penetration Testing and has helped not only to develop India but also has supported a lot of National / International projects.
This shell scripting series does not go into great detail or cover advanced topics, the topics which he generally covers are –
- Chapter 1 – Linux Shell Scripting
- Chapter 2 – Types of Shells
- Chapter 3 – BASH in detail
- Chapter 4 – Types of Built-in commands which supports BASH
- Chapter 5 – What is SHELL Script and Why to Write Shell Script ?
- Chapter 6 – Steps for Shell Scripting
- Chapter 7 – Variables in Shell
- Chapter 8 – Echo Command and its use
- Chapter 9 – Arithmetic Operations in BASH Shell Scripting
- Chapter 10 – Read Statement in BASH Scripting
- Chapter 11 – Command Line Arguments in Linux
- Chapter 12 – Bash Redirection
- Chapter 13 – Pipes in LINUX
- Chapter 14 – Add Two Numbers By Using Command Line Arguments
- Chapter 15 – Find Biggest Number using Command Line Arguments
- Chapter 16 – Print 5,4,3,2,1 using while loop
- Chapter 17 – Perform Basic Math Operations using Command Line Arguments
- Chapter 18 – Script to Reverse a Given No
For any kind of query or help, you can drop a mail at iamchetansoni@gmail.com
To download all 14 scripts used in above series – Click Here
You may also like:- CTEM – A Strategic Approach to Mitigating Cyber Risks
- AI in Penetration Testing – Revolutionizing Security Assessments
- Protecting Your Organization from AI-Enhanced Social Engineering Attacks
- The Rise of AI-Powered Cyber Attacks in 2025
- Top 5 Penetration Testing Methodologies to Follow in 2025
- Top 10 Penetration Testing Tools Every Security Professional Should Know in 2025
- Emerging Trends in Vulnerability Assessment and Penetration Testing (VAPT) for 2025
- The Role of Cybersecurity in Protecting IoT Devices in 2025
- Understanding the Five Phases of Penetration Testing
- Top 20 Cybersecurity Career Options