Lesson Notes

Understanding Users and Groups

User accounts, UIDs, GIDs, primary vs secondary groups. The root user, sudo command, and privilege escalation concepts.

Overview

User accounts, UIDs, GIDs, primary vs secondary groups. The root user, sudo command, and privilege escalation concepts. This lesson is designed for understanding and applying the concept safely and should be completed with clear notes on what changed before and after each practice action.

Key Ideas To Understand

Focus on the meaning behind "Understanding Users and Groups". Understand why this concept matters in real cybersecurity work, where beginners usually make mistakes, and what a correct result looks like.

How To Study This Lesson

Read the concept first, run one practice action at a time, verify output, then summarize in your own words. If something fails, do not rush: check current directory, command spelling, and required permissions.

Real-World Relevance

This lesson maps to common SOC/IT security activities: controlled execution, evidence capture, and repeatable process. The goal is not only to finish commands, but to explain what each command changed and why that is secure.