{"id":336,"date":"2026-04-29T20:19:35","date_gmt":"2026-04-29T20:19:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/calebbaines\/?page_id=336"},"modified":"2026-04-30T00:20:57","modified_gmt":"2026-04-30T00:20:57","slug":"cyse-270-linux-systems-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/calebbaines\/cyse-270-linux-systems-for-cybersecurity\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">CYSE 270 &#8211; Linux Systems for Cybersecurity<\/h2>\n\n\n\n<p>Course Description<br>This course introduces the basic operations in major Linux distros for cybersecurity using<br>both graphical interface and command-line interface. Students will learn about the basic<br>installation and configuration, file systems management, shell scripts, and user<br>authentication in Linux systems.<\/p>\n\n\n\n<p><strong>Lab Reflections<\/strong> &#8211; A summary of all labs\/assignments we did throughout the course:<\/p>\n\n\n\n<p>Lab 1 \u2013 Create a Virtual Machine<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 1 was my first time installing a virtual machine on my PC. My former experience with Linux past this point has been through using the command prompt on my own machine.<\/li>\n\n\n\n<li>Key skills or concepts learned: Installing the VM for the first time.<\/li>\n\n\n\n<li>Challenges: Long installment time<\/li>\n\n\n\n<li>Overall takeaway: I now have downloaded not only a VirtualBox, but also a kali disk; and have knowledge of installing a virtual machine. <\/li>\n<\/ul>\n\n\n\n<p>Lab 2 \u2013 Working with Command Line<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 2 was learning the basics of using command prompt on a virtual machine. Nothing too challenging compared to other material we learn further on.<\/li>\n\n\n\n<li>Key skills or concepts learned: Using the Command Prompt inside the virtual machine.<\/li>\n\n\n\n<li>Challenges: None<\/li>\n\n\n\n<li>Overall takeaway: Using the command prompt with a VM is not that far off using your typical command prompt.<\/li>\n<\/ul>\n\n\n\n<p>Lab 3 \u2013 VI Editor<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 3 was pleasant using my preferred VI editor to edit text files through the Kali Linux virtual machine.<\/li>\n\n\n\n<li>Key skills or concepts learned: Using different text editors in Linux (vim, emacs, nano, etc.)<\/li>\n\n\n\n<li>Challenges: Some editors suck<\/li>\n\n\n\n<li>Overall takeaway: Using your preferred editor, is amazing to use on Linux.<\/li>\n<\/ul>\n\n\n\n<p>Lab 4 \u2013 User and Group Accounts<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 4 was learning how to create and view user accounts, groups, and permissions.<\/li>\n\n\n\n<li>Key skills or concepts learned: Manage and view user and group accounts<\/li>\n\n\n\n<li>Challenges: None<\/li>\n\n\n\n<li>Overall takeaway: Gateway introduction to root users and groups, as well as managing group\/user permissions.<\/li>\n<\/ul>\n\n\n\n<p>Lab 5 \u2013 Security Policy and password cracking<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 5 was learning about Linux tools, like Wireshark and John the Ripper the one that I seem to used the most for this class.<\/li>\n\n\n\n<li>Key skills or concepts learned: Professional use of the John the Ripper tool<\/li>\n\n\n\n<li>Challenges: Execute time was typically a long process<\/li>\n\n\n\n<li>Overall takeaway: I learned how to use the John the Ripper tool and create users and passwords for said users.<\/li>\n<\/ul>\n\n\n\n<p>Lab 6 \u2013 File Permissions<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 6 was very easy going; learned about granting and viewing file permissions, commands, and numerical values.<\/li>\n\n\n\n<li>Key skills or concepts learned: Read, Write, and Execute permissions and their numerical values (4, 2, and 1)<\/li>\n\n\n\n<li>Challenges: None<\/li>\n\n\n\n<li>Overall takeaway: Really loved this part as this is one that I remember very well.<\/li>\n<\/ul>\n\n\n\n<p>Lab 7 \u2013 Storage Management<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 7 was for the first time learning more about the hard disk as the kali disk was another part of the Linux machine.<\/li>\n\n\n\n<li>Key skills or concepts learned: Checking and creating a new Hard disk<\/li>\n\n\n\n<li>Challenges: Creating it was hard to get the first try<\/li>\n\n\n\n<li>Overall takeaway: I got to learn more about the hard disk and creating one through the Linux machine.<\/li>\n<\/ul>\n\n\n\n<p>Lab 8 \u2013 Shell Scripting<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 8 was shell scripting using similar language to python, a coding language that I really enjoy using.<\/li>\n\n\n\n<li>Key skills or concepts learned: Command Prompt Shell Scripting through the Kali Linux virtual machine<\/li>\n\n\n\n<li>Challenges: Shell Scripting was trial and error; long process to get it right<\/li>\n\n\n\n<li>Overall takeaway: I learned to code through Linux virtual machine and through the command prompt.<\/li>\n<\/ul>\n\n\n\n<p>Lab 9 \u2013 Automation tasks<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 9 was very stressful for this segment; I never actually got the expected result and never really understood how to manage the automation task.<\/li>\n\n\n\n<li>Key skills or concepts learned:  Creating a Crontab file to schedule a shell script task in x amount of minutes<\/li>\n\n\n\n<li>Challenges: I never actually got this to work\/still not sure why<\/li>\n\n\n\n<li>Overall takeaway: not the most pleasant experience, but worth to try than to not try at all.<\/li>\n<\/ul>\n\n\n\n<p>Lab 10 \u2013 Networking Basics and Subnetting<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 10 was very short, though tricky, but not impossible and it was just number conversion which made this only partially difficult.<\/li>\n\n\n\n<li>Key skills or concepts learned: Converting networks to IP addresses and Binary format<\/li>\n\n\n\n<li>Challenges: Trying to accomplish this outside of the module slides is VERY difficult<\/li>\n\n\n\n<li>Overall takeaway: A difficult but neat task and something interesting to take away from this semester. <\/li>\n<\/ul>\n\n\n\n<p>Lab 11 \u2013 Basic Network Configuration<\/p>\n\n\n\n<ul>\n<li>My experience completing Lab 11 was the easier of tasks throughout this semester, which is funny cause for being the last module\/task it subverted my expectation of how much more difficult the material would get.<\/li>\n\n\n\n<li>Key skills or concepts learned: Running the Linux machine through NAT Mode and Bridge Mode <\/li>\n\n\n\n<li>Challenges: None<\/li>\n\n\n\n<li>Overall takeaway: This was our last lab\/assignment done and it&#8217;s neat to see how far we&#8217;ve gotten to learning the virtual machine and using Linux.<\/li>\n<\/ul>\n\n\n\n<p><strong>Overall Reflection<\/strong> &#8211; Final take away from this course:<\/p>\n\n\n\n<p>I&#8217;ll honestly miss this class, there were very high moments and funny memories of Kahoots and never-ending victories from the middle table. It was a great experience learning the ins and outs of the Linux Virtual Machine, with a solid professor and simple, short, and to-the-point modules. The class structure really helped in my academic success as the modules were broke down to short quizzes and assignments that wrapped up the modules. I really enjoyed the professor, he was really easy going, made a really chill and pleasant class environment, and explained the material in a straight-forward and simple matter. To sum it up, I&#8217;ll miss this class going forward, and will gladly take the many things that I have learned though Linux Systems in Cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 270 &#8211; Linux Systems for Cybersecurity Course DescriptionThis course introduces the basic operations in major Linux distros for cybersecurity usingboth graphical interface and command-line interface. Students will learn about the basicinstallation and configuration, file systems management, shell scripts, and userauthentication in Linux systems. Lab Reflections &#8211; A summary of all labs\/assignments we did throughout&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/calebbaines\/cyse-270-linux-systems-for-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31579,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/pages\/336"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/users\/31579"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/pages\/336\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/pages\/336\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/calebbaines\/wp-json\/wp\/v2\/media?parent=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}