Introduction to Linux System for Cybersecurity
This course introduces the basic operations in major Linux distributions for cybersecurity using both graphical interface and command-line interface. Learning about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems. This course provides a foundation for further study in cybersecurity.
The course objectives are:
- Introduce the basic concept and knowledge about different Linux distribution, including the most popular distribution for cybersecurity, Kali Linux
- Install and operate different Linux distribution locally and remotely on Amazon Web Services (AWS cloud)
- Understand the ownership and permissions of the files and directories
- Understand the shell scripts
- Perform essential system administration functions, such as network configuration, process and log administration, and software management
- Perform security tasks, such as footprinting, firewalls, and tools in relation to Intrusion Detection
Course Material
In CYSE 270, I fully engaged with the learning outcome regarding the basic concepts of the Linux system and its administration through a multifaceted approach that demonstrated my working knowledge, practical skills, and the value of delving deeper into this area. Through hands-on lab sessions and assignments, I demonstrated my ability to navigate the Linux command line, perform essential administrative tasks, and troubleshoot common issues. Looking forward, my experience in Linux system administration is important especially with the career I want of being a cyber-crime analyst. In cybersecurity, Linux is essential for tasks ranging from securing networks and servers to conducting penetration testing and forensic analysis. By expanding my knowledge of Linux, I can effectively safeguard systems, detect vulnerabilities, and respond to cyber threats, contributing to the field of cybersecurity.