Learning Windows and Linux Command Line Through TryHackMe
Learning Windows and Linux Command Line Through TryHackMe
Introduction
If you’re starting your cybersecurity journey, mastering both Windows Command Line and Linux Shells is essential. These tools give you direct control of an operating system — whether you’re managing files, troubleshooting networks, or automating tasks. To sharpen my skills, I completed two hands-on courses on TryHackMe: Windows Command Line and Linux Shells. In this post, I’ll share what I learned from both labs, how they compare, and why these fundamentals matter for IT security professionals.
As part of my ongoing journey to strengthen my IT security skills, I’ve been diving deeper into both Windows and Linux fundamentals. I decided to take the Windows Command Line and Linux Shells courses on TryHackMe to sharpen my practical skills and better understand how attackers and defenders use these systems every day. Both courses provided hands-on labs that reinforced not just theory, but the kind of real-world problem-solving I’ll need in cybersecurity.
Windows Command Line
Before starting, I already had some experience with Linux from previous labs, but I wasn’t as familiar with Windows Command Line. One key takeaway was realizing how similar — yet different — the two environments can be. For example, in Linux I would use cat to view the contents of a file, but in Command Line the equivalent would be type. At the same time, some commands remain consistent, such as cd to change directories.
In the Windows Command Line course (link to room), I learned how to:
- Display basic system information
- Check and troubleshoot network configurations
- Manage files and folders
- Review and monitor running processes
Working through these exercises gave me a better understanding of how to navigate Windows systems from the terminal, which is crucial for both system administration and security investigations.
Linux Shells
I learned how Linux shells accept and run commands, how to interact with different types of shells, and why they are so important for both system administration and security work. Through the guided tasks, I practiced navigating the Linux environment, using the shell to run commands, and understanding the differences between shells. Working directly on a deployed machine gave me valuable hands-on experience and helped me see how shells play a role in both defensive and offensive security operations.
I also gained practical skills in shell scripting by learning the building blocks such as shebangs, variables, control flow, redirection, and file permissions. I applied these skills by writing, editing, and executing my own scripts to automate tasks and solve challenges. The “locker script” exercise and the final practical gave me the confidence to move from simply reading shell syntax to creating and troubleshooting my own working scripts — a critical step in developing reliable automation for security tasks and penetration testing.
An important part of the course was working as the root user on the deployed system. I was able to update and run my own scripts with elevated privileges, which showed me both the power and responsibility that come with root access. By modifying scripts, adjusting permissions with tools like chmod, and executing them as root, I saw firsthand how full system control impacts file ownership, service management, and security risks. This reinforced the importance of validating code, adding safety checks, and being cautious when working with root privileges, since even small mistakes can have major consequences.
Closing Takeaway
Both the Windows Command Line and Linux Shells courses taught me far more than just commands — they showed me how attackers and defenders alike rely on terminal access to gain visibility, automate tasks, and control systems. On the Windows side, I can now confidently gather system and network information or manage processes without relying on a GUI. On the Linux side, I went beyond navigation and learned to script, troubleshoot, and operate as root in a safe, controlled lab environment.
For me, this training is another step toward becoming a stronger IT security professional. Mastering the basics of both operating systems means I can approach investigations, automation, or penetration tests with confidence, regardless of which platform I’m working on. TryHackMe’s hands-on approach made these concepts click, and I plan to continue stacking more rooms like these to deepen my skills even further.