{"id":375,"date":"2025-10-13T23:14:11","date_gmt":"2025-10-13T23:14:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/?page_id=375"},"modified":"2026-02-11T02:29:01","modified_gmt":"2026-02-11T02:29:01","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Linux System for Cybersecurity<\/h2>\n\n\n\n<p>This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems. The learning outcomes for this course are as follows:<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p>1: Introduce the basic concept and knowledge about different Linux distros, including the most popular distribution for cybersecurity, Kali Linux. <\/p>\n\n\n\n<ul>\n<li>Install and operate different Linux distros locally and remotely (on AWS cloud)<\/li>\n\n\n\n<li>Understand the ownership and permissions of the files and directories<\/li>\n\n\n\n<li>Understand the shell scripts<\/li>\n<\/ul>\n\n\n\n<p>2: Perform essential system administration functions, such as network configuration,<br>process and log administration, and software management.<\/p>\n\n\n\n<p>3: Perform security tasks, such as foot printing, firewalls, and tools in relation<br>to Intrusion Detection.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Labs<\/h2>\n\n\n\n<p>In Lab 1, we created a virtual Linux machine and practiced basic commands. The lab itself was simple, but I found the Linux setup and and learning how it worked to be the most challenging part of this lab.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-Lab2012028129.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab2012028129.\"><\/object><a id=\"wp-block-file--media-ad56138a-873d-43ba-8e40-11d7bd19b0bb\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-Lab2012028129.pdf\">annotated-Lab2012028129<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-Lab2012028129.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ad56138a-873d-43ba-8e40-11d7bd19b0bb\">Download<\/a><\/div>\n\n\n\n<p>Lab 2 involved working with the command line and learning fundamental Linux commands. The most challenging part of this lab for me was interpreting the error messages and determining how to fix them.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-CYSE2027020Assignment202.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-CYSE2027020Assignment202.\"><\/object><a id=\"wp-block-file--media-5b459523-afbd-4bb6-8cd9-2a3a698f65fc\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-CYSE2027020Assignment202.pdf\">annotated-CYSE2027020Assignment202<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-CYSE2027020Assignment202.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5b459523-afbd-4bb6-8cd9-2a3a698f65fc\">Download<\/a><\/div>\n\n\n\n<p>Lab 3 introduced vi editor and the basic modes, functions, and commands involved. Understanding the differences between modes was the hardest part of this lab for me, as I would often use commands in the wrong mode and have trouble fixing my mistakes.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Assignment-3-CYSE-270-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-3-CYSE-270-Ava.\"><\/object><a id=\"wp-block-file--media-8364fa5e-e382-423c-b002-f8445573f727\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Assignment-3-CYSE-270-Ava.pdf\">Assignment-3-CYSE-270-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Assignment-3-CYSE-270-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8364fa5e-e382-423c-b002-f8445573f727\">Download<\/a><\/div>\n\n\n\n<p>Lab 4 focused on managing groups and users within the system. In this Lab, I had trouble understanding some functions\/commands and what they did; for example, in Task B, step 12, I couldn&#8217;t figure out why the user wouldn&#8217;t delete.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-Assignment20420CYSE2702028Ava29-compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment20420CYSE2702028Ava29-compressed.\"><\/object><a id=\"wp-block-file--media-582eb524-87a5-4d4b-9c2a-ff0155d7f99c\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-Assignment20420CYSE2702028Ava29-compressed.pdf\">annotated-Assignment20420CYSE2702028Ava29-compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/annotated-Assignment20420CYSE2702028Ava29-compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-582eb524-87a5-4d4b-9c2a-ff0155d7f99c\">Download<\/a><\/div>\n\n\n\n<p>In Lab 5, we tested the strength of different passwords using the John the Ripper password cracker. I found this lab enjoyable, however, I ran into trouble when I discovered that the Rockyou text file was not included with my personal Linux version. As a result, I had to switch to the school&#8217;s version of Linux to complete the lab.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/CYSE270-Lab-5-Password-Cracking-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE270-Lab-5-Password-Cracking-Ava.\"><\/object><a id=\"wp-block-file--media-3e9b8764-8fb1-44d2-9c15-e8fef7f62b99\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/CYSE270-Lab-5-Password-Cracking-Ava.pdf\">CYSE270-Lab-5-Password-Cracking-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/CYSE270-Lab-5-Password-Cracking-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3e9b8764-8fb1-44d2-9c15-e8fef7f62b99\">Download<\/a><\/div>\n\n\n\n<p>In Lab 6, we practiced adding and removing file permissions for users and groups. I found this Lab to be pretty challenging, especially when I reached Task C. The file permissions did not behave as i thought they would; I later discovered that I had used the wrong command, and it turned out to be an easy fix.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-6-File-Permission-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-6-File-Permission-Ava.\"><\/object><a id=\"wp-block-file--media-d6de47d0-ffb0-4abe-9be1-9d04b68cf8ff\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-6-File-Permission-Ava.pdf\">Lab-6-File-Permission-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-6-File-Permission-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d6de47d0-ffb0-4abe-9be1-9d04b68cf8ff\">Download<\/a><\/div>\n\n\n\n<p>In Lab 7, we worked with local storage systems. We used commands to check the file system and create virtual disks, partitions, and filesystems. I didn&#8217;t run into much trouble during this lab, but the most challenging aspect for me was finding and highlighting the differences when making changes.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-7-\u2013-Manage-Local-Storage-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-7-\u2013-Manage-Local-Storage-Ava.\"><\/object><a id=\"wp-block-file--media-09ee4fa0-10d8-4e24-bb35-85a158e53e82\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-7-\u2013-Manage-Local-Storage-Ava.pdf\">Lab-7-\u2013-Manage-Local-Storage-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-7-\u2013-Manage-Local-Storage-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-09ee4fa0-10d8-4e24-bb35-85a158e53e82\">Download<\/a><\/div>\n\n\n\n<p>Lab 8 introduced skills and techniques used with shell scripting. I enjoyed this lab because it combined skills I&#8217;ve learned previously, like programming in Python\/Java and working with the vi editor. I did have some formatting issues when the tasks would run, however, they were easily fixable.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-8-Shell-Scripting-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-8-Shell-Scripting-Ava.\"><\/object><a id=\"wp-block-file--media-8f112877-e91c-49c2-9087-7bc9b3148d94\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-8-Shell-Scripting-Ava.pdf\">Lab-8-Shell-Scripting-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-8-Shell-Scripting-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8f112877-e91c-49c2-9087-7bc9b3148d94\">Download<\/a><\/div>\n\n\n\n<p>In Lab 9, we used shell scripting as a foundation to explore task automation using tools like crontab. This lab was more difficult for me than the previous one because it had many steps and several new commands, and I faced more challenges when resolving errors.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-9-Task-Automation-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-9-Task-Automation-Ava.\"><\/object><a id=\"wp-block-file--media-39dbd71f-8f93-4c51-9762-3b95e629316f\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-9-Task-Automation-Ava.pdf\">Lab-9-Task-Automation-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-9-Task-Automation-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-39dbd71f-8f93-4c51-9762-3b95e629316f\">Download<\/a><\/div>\n\n\n\n<p>Lab 10 differed from the previous labs by shifting the focus away from Linux operations and instead prioritizing networking concepts and binary fundamentals. I enjoyed this lab because the values were easy to figure out once I knew the pattern. The most challenging part of this lab for me was discovering how to get one value from another.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Assignment-10-Networking-Basics-and-Subnetting-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-10-Networking-Basics-and-Subnetting-Ava.\"><\/object><a id=\"wp-block-file--media-750d46cd-6f1c-48ec-b8d2-43d3a59ad595\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Assignment-10-Networking-Basics-and-Subnetting-Ava.pdf\">Assignment-10-Networking-Basics-and-Subnetting-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Assignment-10-Networking-Basics-and-Subnetting-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-750d46cd-6f1c-48ec-b8d2-43d3a59ad595\">Download<\/a><\/div>\n\n\n\n<p>Lab 11 was the final lab of CYSE 270, and also one of the most challenging for me. I encountered multiple issues because my personal Linux did not include the necessary tools. As a result, I switched back to the school\u2019s Linux system to complete the lab, however, I could not change the network connection from NAT to bridged in this Linux system. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-11-Network-Basics-Configuration-Ava.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-11-Network-Basics-Configuration-Ava.\"><\/object><a id=\"wp-block-file--media-6a651337-b771-45e4-92a5-2bd1e806c5af\" href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-11-Network-Basics-Configuration-Ava.pdf\">Lab-11-Network-Basics-Configuration-Ava<\/a><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-content\/uploads\/sites\/38413\/2025\/12\/Lab-11-Network-Basics-Configuration-Ava.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6a651337-b771-45e4-92a5-2bd1e806c5af\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Reflection<\/h2>\n\n\n\n<p>Overall, I thoroughly enjoyed CYSE 270 at Old Dominion University, where I gained foundational, hands-on technical skills in Kali Linux\/Virtual machines, secure system administration, and cybersecurity operational tools that support my career goals. The course was engaging, challenging, and reinforced principles from previous courses, giving me confidence in my ability to apply essential cybersecurity skills moving forward.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux System for Cybersecurity This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems. The learning outcomes for this course are as follows: 1: Introduce the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/avamclaughlin\/cyse-270\/\">Read More<\/a><\/div>\n","protected":false},"author":30509,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/pages\/375"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/users\/30509"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":6,"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/pages\/375\/revisions"}],"predecessor-version":[{"id":414,"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/pages\/375\/revisions\/414"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/avamclaughlin\/wp-json\/wp\/v2\/media?parent=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}