AACC – Fall 2021 – CTS-233 – DevNet Associate: Linux CLI Tutorial ‘ls’ Command Deep Dive

In this deep dive tutorial, created for my Anne Arundel Community College (AACC) CTS-233 DevNet Associate course learners, we take a comprehensive look at the Linux ‘ls’ command and its various CLI options. We discuss the default display of the ‘ls’ command and take a very detailed look at the similarities and differences between the ctime, access time, and modification time along with the different options to list out files and directories. Lastly, we introduce the idea of the hidden file/directory, detail how to see said files, and briefly cover the permission bits and to whom they apply for a given file.

***This video is an in-depth tutorial and is far more than simply an answer key to the aforementioned Packet Tracer/Lab activity. This tutorial is being made to assist my AACC CTS-233 learners in their journey through the Cisco Networking Academy DevNet Associate course curriculum. So, if you are just looking for a shortcut or easy answers for the activity, this is not the video you should watch. However, if you are looking to gain a deeper understanding of the topic being covered and how things might be configured in a real-world scenario, my hope is that this will increase your comprehension and help you to become a better and more effective full-stack network administrator/engineer. Enjoy!

*This techtorial/Packet Tracer activity is all done running Cisco Modeling Labs (CML) v2.1.1-b19, some physical routers in my Evil Command Center Lab, and/or Packet Tracer version 8.0.0.0212 (for the Mac) which was just recently released! The MINIMUM version you can use for any of the new CCNAv7 curriculum activities is Packet Tracer v7.3.0, but I would upgrade to whatever the most current/latest version! For all Linux tutorials, I will be using an Ubuntu VM running in VMware Fusion on my iMac Pro. Be sure to leave your feedback and questions below and I hope I have earned the privilege of your time! Here is the link: https://youtu.be/3I_Vqvrqkb4