Give me six hours to chop down a tree, and I will spend the first four sharpening the axe.
Unknown
In Part I, we begin with a primer on the command line, bash shell, and regular expressions, and review the fundamental principles of cybersecurity.