CMD - Command Prompt Training for IT Professionals (Full Course)

Jobskillshare Skills-Based Platform139 minutes read

CMD knowledge is crucial for IT professionals of all skill levels, allowing for effective task simplification, system management, and troubleshooting. Starting with CMD before moving to PowerShell is recommended to build a strong foundation in basic commands and functionalities essential for IT operations.

Insights

  • Learning CMD is essential for mastering descriptions and effectively countering them, regardless of IT expertise level, due to its daily use and relevance in tasks like network engineering and system administration.
  • Starting with CMD before moving to PowerShell is advisable to establish a strong foundation in basic operations before advancing to more complex tools.
  • Practical knowledge gained from CMD facilitates simplifying tasks, gaining experience, and potentially transitioning to command line scripting and cloud technologies.
  • CMD commands differ from GUI operations, requiring specific commands for tasks like file management, user account control, and network troubleshooting.
  • Utilizing commands like ping, ipconfig, and netstat in CMD provides quick and efficient ways to troubleshoot network issues, check connectivity, and monitor network activity, enhancing overall IT proficiency.

Get key ideas from YouTube videos. It’s free

Recent questions

  • What is CMD?

    Command Prompt tool for Windows.

Related videos

Summary

00:00

Mastering CMD for IT Efficiency and Growth

  • Learning about CMD is crucial for gaining confidence in handling descriptions and countering them effectively.
  • CMD knowledge is essential regardless of IT expertise level, from help desk to master engineer, due to its daily use, especially with tools like ping.
  • Starting with CMD before advancing to PowerShell is recommended to grasp the basics before delving into more advanced tools.
  • CMD familiarity is vital for simplifying tasks, gaining experience, and potentially moving on to command line scripting and cloud technologies.
  • Practical knowledge gained from CMD learning can be applied in various IT courses, such as network engineering and system administration.
  • The course emphasizes the importance of CMD in daily operations, networking tasks, issue resolution, and even hacking.
  • CMD's command line interface differs from the graphical user interface, requiring specific commands for operations.
  • PowerShell, a more advanced tool than CMD, allows for script running and object management, offering more functionalities.
  • The course covers basic file commands, folder operations, and essential CMD functions like creating, copying, moving, and deleting files and folders.
  • Through practical demonstrations in the course, users learn how to navigate directories, create folders, change folder names, and execute basic CMD commands effectively.

17:37

Managing Files and Folders in Windows

  • To create a new file in the P-lab directory, type "cd p-labs" to access the directory.
  • Type "type null > jss.pptx" to create a new file named "jss.pptx" in the P-lab directory.
  • To check the newly created file, type "dir" to view the files in the directory.
  • To rename a file, use the command "rename jss.pptx p-lab.pptx" to change the file name.
  • To copy a file, use the command "copy p-lab.pptx destination_folder" to duplicate the file.
  • To delete a file, type "del p-lab.pptx" to remove the file from the directory.
  • To create a new folder, use the command "mkdir jss" to make a new directory.
  • To move a file to a different folder, type "move p-lab.pptx new_folder" to relocate the file.
  • To remove a directory, use the command "rmdir jss" to delete the specified folder.
  • In managing tasks and services in Windows, use commands like "tasklist" to list running tasks and "taskkill" to stop a specific task by its ID.

38:13

Essential Command Line Functions for System Management

  • The "list disk" command provides information on the number of disks installed in the machine, showing only one disk attached.
  • To access disk details, use the "select disk" command followed by the disk number, then use the "detailed disk" command to view volume information.
  • The "chkdsk" command scans for errors and bad sectors on the disk, helping to repair disk issues caused by corrupted areas.
  • Use the "get mac" command to quickly find the physical address of your machine, essential for network settings and restrictions.
  • Obtain comprehensive system details by entering the "system info" command, revealing network cards, RAM usage, and OS specifics.
  • To view driver details and troubleshoot driver-related issues, utilize the "driver query" command to identify and update necessary drivers.
  • Manage user accounts through the command line by using the "net user" command to check, create, and delete user accounts.
  • Enable or disable the administrator account with the "net user" command, ensuring access to necessary accounts.
  • Hide and encrypt files using the "attrib" command with attributes like +h for hidden, +r for read-only, and +s for system, ensuring file security.
  • Reveal hidden files by reversing the attributes with the "attrib" command, allowing access to previously hidden files.

57:32

"File Encryption and Security Commands Explained"

  • Encryption converts information into a code to make it unreadable, ensuring data security during file transfer.
  • To encrypt a file, use the command "cipher /e" to make it unreadable and anonymous.
  • Encrypted files display a lock icon, indicating their secure status.
  • To decrypt files, add "d" after the forward slash in the command.
  • Upgrading encryption keys is possible with the command "cipher /re-key" to enhance file security.
  • Keys are crucial for decrypting files, and updating them prevents unauthorized access.
  • Use the command "assoc" to determine the parent application of a file based on its extension.
  • The command "type" followed by the file name allows viewing text files in the command prompt.
  • Create and export text files using commands like "echo" and "copy con" to input and save text content.
  • Generate new text documents through the command line by using "type null" followed by the desired file name and extension.

01:16:52

"Creating and Managing Partitions and Commands"

  • The command "create primary partition" is used to create a primary partition on a drive.
  • After creating the partition, the command "select partition one" is used to select the newly created partition.
  • To format a partition quickly with the NTFS file system, the command "format fs=ntfs quick" is used.
  • The partition is then marked as active using the command "active" and assigned a drive letter.
  • To name the drive, the command "label f: jss" is used to change the label to "jss".
  • To create a bootable USB for Windows, the ISO content is copied to the USB after following the same commands.
  • The command "tree" displays the directory structure of a folder, including subfolders and files.
  • The commands "date" and "time" are used to change the date and time settings on the system.
  • The command "tasklist /history" lists previously executed commands in the command prompt.
  • The command "shutdown -s -t xx" shuts down the machine after a specified number of seconds, with options to restart using "-r" and add a time delay using "-t".

01:36:30

Network Troubleshooting with ipconfig Command

  • To troubleshoot network issues, start by using the ipconfig command, which is the initial tool for investigating network details.
  • By right-clicking on network and internet settings, you can access network and adapter details, although this method involves multiple clicks and windows.
  • To view network parameters like IP address, subnet, DHCP server, and DNS server, click on the adapter and then details.
  • The ipconfig command in the command prompt quickly provides information on the number of adapters, IP address, subnet, and default gateway.
  • For more detailed network information like DHCP server and DNS server, use the ipconfig command with the argument "ipconfig /all."
  • The "ipconfig /all" command reveals host name, adapter details, DHCP status, IPv6 and IPv4 addresses, subnet mask, lease time, default gateway, DHCP server, and DNS server.
  • To troubleshoot DHCP conflicts, use the "ipconfig /renew" command to refresh the IP address.
  • The "ipconfig /displaydns" command shows DNS details and history of connections, aiding in identifying malicious activities or connectivity issues.
  • Resolve DNS-related issues by using the "ipconfig /flushdns" command to clear the DNS cache and refresh DNS activity.
  • The ping tool, part of the ICMP protocol, tests the reachability of devices on a network by sending and receiving packets, providing a quick way to check device connectivity.
  • Use the ping tool in the command prompt by typing "ping [IP address]" to test connectivity, with options like "ping -t" for continuous pinging and additional functionalities available by typing "ping /?" for more options.

01:58:01

Troubleshoot network connectivity with continuous pinging

  • To ping a device continuously, use the option minus t and type 192.168.1, then hit enter.
  • The minus t option is crucial to maintain continuous pinging to troubleshoot devices that may not reply.
  • Minus a resolves addresses to post names, providing information about the device being pinged.
  • Use minus n to specify the number of pings to send, aiding in troubleshooting cable issues by sending a single ping.
  • Minus t is the most commonly used option for continuous pinging to monitor internet connectivity.
  • MS in ping responses indicates the time taken to hit a device in milliseconds, aiding in assessing internet connectivity stability.
  • Destination host unreachable signifies issues within the same subnet, while request timeout indicates issues outside the subnet.
  • Packet loss in pings indicates network issues, such as cable problems or network interface card malfunctions.
  • Traceroute, or trace route, is a tool to track the path of packets on an IP network from source to destination, aiding in diagnosing network issues.
  • Traceroute is valuable in identifying network problems, like router failures, by tracing the path packets take through routers.

02:20:49

Network Tools for Troubleshooting and Security

  • The router inside a device functions as both a switch and a router, displaying three houses.
  • Layer three switches possess capabilities for routing, not transforming the entire switch into a router.
  • Tracer command is used similarly to ping, with less activity, and can be enhanced with "-d" to avoid DNS resolution delays.
  • Statics in tracer indicate a firewall blocking ICMP pings for security reasons.
  • Traceroute reveals the path taken by packets, potentially varying based on server availability.
  • Netstat is a command utility displaying current network connections and port activity on a computer.
  • Netstat can be optimized with "-n" to speed up processing by avoiding DNS resolution.
  • Netstat can further detail connections with "-b" to show application names and "-d" for protocol and application information.
  • Netstat's "-a" option reveals listening ports, essential for network security.
  • Additional tools like ipconfig, arp, nslookup, system info, and route print offer further network insights and troubleshooting capabilities.

02:43:28

Essential Windows Command Line Functions

  • The "arp -a" command provides information on the host machines your computer has learned, such as the physical address of your access point.
  • NSLookup helps identify gateway addresses and can provide details on mail exchange servers, like ns1.cloudfit.com for www.jobskill.
  • The "system info" command quickly offers detailed information about your computer, including processor type, operating system version, and more.
  • "Route print" displays routing table information, including default gateways, aiding in network destination identification.
  • To save command outputs, use the ">" command followed by the desired file name, like "system info.txt," to store system information.
  • The "slash more" command allows for viewing command outputs page by page, useful for managing large amounts of data.
  • The "taskkill" command terminates tasks, with options like "/f" for forceful termination and specifying the process ID for specific tasks.
  • "gpupdate" synchronizes local policies with group policies, with options like "/force" for quick execution and "/target:user" for user-specific policies.
  • "gpresult" displays resultant set of policies, with options like "/r" for summary data and "/z" for detailed policy information.
  • "net use" connects to shared folders or drives on the network, allowing for viewing existing connections, mapping network shares, and deleting network drives.

03:05:01

Managing User Accounts and File Copying

  • The "net user" command on the computer allows for user account-related tasks, including creating new users and modifying account parameters.
  • By typing "net user" in the command prompt, a list of local users on the system can be viewed.
  • Specific user information, such as permissions, passwords, account expiry, and group memberships, can be accessed by typing "net user [specific user]".
  • To create a new user account, use the command "net user [username] [password] /add /times:all" to instantly create the account.
  • Deleting a user account is done by typing "net user [specific user] /delete".
  • Verification is essential after performing actions, ensuring the changes are reflected in the user list.
  • The "copy" command in the command prompt allows for copying files to specified locations, with the option to suppress confirmation prompts using "/y".
  • The "xcopy" command copies files and directories, including subdirectories, from a source location to a specified destination, enabling the download of files along with their directories.
  • To copy folders with multiple directories within, use the "xcopy" command with the "/e" parameter to copy all files and directories to the destination location.
  • The "robocopy" command replicates the original file's content to a specified location, keeping the original file intact, and offers various parameters for different functionalities.
  • Further learning and practice can be done by exploring additional commands available in the CMD documentation, leading to the creation of batch files and more advanced scripting tasks.
Channel avatarChannel avatarChannel avatarChannel avatarChannel avatar

Try it yourself — It’s free.