{"id":328,"date":"2023-12-08T10:26:12","date_gmt":"2023-12-08T10:26:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abrow174200t\/?page_id=328"},"modified":"2023-12-09T02:40:06","modified_gmt":"2023-12-09T02:40:06","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/abrow174200t\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p>Course Objectives<br>\u2022 Introduce the basic concept and knowledge about different Linux distros, including the most<br>popular distribution for cybersecurity, Kali Linux,<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<ul>\n<li>Install and operate different Linux distros locally and remotely (on AWS cloud),<\/li>\n\n\n\n<li>Understand the ownership and permissions of the files and directories,<\/li>\n\n\n\n<li>Understand the shell scripts,<\/li>\n\n\n\n<li>Perform essential system administration functions, such as network configuration, process and<br>log administration, and software management, and<\/li>\n\n\n\n<li>Perform security tasks, such as footprinting, firewalls, and tools in relation to Intrusion<br>Detection.<\/li>\n<\/ul>\n\n\n\n<p>Learning Outcomes: <\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<ul>\n<li>Can perform the essential system administration functions in Linux systems<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Can write shell scripts to automate tasks in Linux systems<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Can perform the necessary security tasks to secure the Linux systems<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/12\/annotated-Lab204.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Lab204.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>File Permissions lab explained<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-content\/uploads\/sites\/33898\/2023\/12\/Untitled-document-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Untitled-document-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Objectives\u2022 Introduce the basic concept and knowledge about different Linux distros, including the mostpopular distribution for cybersecurity, Kali Linux, Learning Outcomes: File Permissions lab explained<\/p>\n","protected":false},"author":21507,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/users\/21507"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/328\/revisions"}],"predecessor-version":[{"id":349,"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/pages\/328\/revisions\/349"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abrow174200t\/wp-json\/wp\/v2\/media?parent=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}