{"id":510,"date":"2026-05-01T21:32:56","date_gmt":"2026-05-01T21:32:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dianegilzow\/?page_id=510"},"modified":"2026-05-06T01:06:50","modified_gmt":"2026-05-06T01:06:50","slug":"defensive-security","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dianegilzow\/defensive-security\/","title":{"rendered":"Linux System Administration &amp; Security"},"content":{"rendered":"\n<p>Linux system administration and security involve managing and securing systems using command-line tools, user and group management, and file permission settings. Through my coursework, I gained hands-on experience working in the Linux terminal, where I learned how to create and manage user and group accounts and configure file permissions to control access. I worked with read, write, and execute permissions that helped me understand how access control can be implemented in a real-world setting.<\/p>\n\n\n\n<p><strong>Artifact 1<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-content\/uploads\/sites\/38356\/2026\/05\/Assignment-6-File-Permissions.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-6-File-Permissions<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Artifact 2<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-content\/uploads\/sites\/38356\/2026\/05\/Assignment-6.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-6<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Artifact 3<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-content\/uploads\/sites\/38356\/2026\/05\/Assignment-9-Task-Automation.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-9-Task-Automation<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux system administration and security involve managing and securing systems using command-line tools, user and group management, and file permission settings. Through my coursework, I gained hands-on experience working in the Linux terminal, where I learned how to create and&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/dianegilzow\/defensive-security\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30413,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/pages\/510"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/users\/30413"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/comments?post=510"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/pages\/510\/revisions"}],"predecessor-version":[{"id":591,"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/pages\/510\/revisions\/591"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dianegilzow\/wp-json\/wp\/v2\/media?parent=510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}