chmod
In a hands-on exercise, I audited file permissions, such as removing unauthorized write access from hidden files to ensure the principle of least privilege.
I wrote SQL queries to filter failed login attempts, isolate events on specific dates, and exclude some geolocations to support incident triage.