{"id":386,"date":"2026-03-07T18:52:05","date_gmt":"2026-03-07T18:52:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/?page_id=386"},"modified":"2026-03-07T18:52:05","modified_gmt":"2026-03-07T18:52:05","slug":"cyse-270-linux-in-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cyse-270-linux-in-cybersecurity\/","title":{"rendered":"CYSE 270 &#8211; Linux in Cybersecurity"},"content":{"rendered":"\n<p><em>Old Dominion University | Spring 2025<\/em><\/p>\n\n\n\n<p>Linux | System Administration | Automation<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"520\" src=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security.jpg\" alt=\"\" class=\"wp-image-390\" style=\"width:563px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security.jpg 1000w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security-300x156.jpg 300w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security-768x399.jpg 768w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security-833x433.jpg 833w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/linux-security-192x100.jpg 192w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Course Overview<\/h2>\n\n\n\n<p>CYSE 270 introduced fundamental Linux system administration skills used in cybersecurity environments. Throughout this course I worked extensively with the Linux command line to manage storage, configure networking, automate system tasks, and analyze system configurations. These labs were completed using Kali Linux and Ubuntu virtual machines.<\/p>\n\n\n\n<p>The course emphasized hands-on practice with real administrative tasks that security professionals frequently perform in enterprise environments such as disk management, scripting, and system monitoring.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\">Skills Demonstrated<\/h1>\n\n\n\n<p>\u2022 Linux system administration<br>\u2022 Bash scripting<br>\u2022 Network configuration and troubleshooting<br>\u2022 Storage management and filesystem configuration<br>\u2022 Task automation using cron jobs<br>\u2022 Command line utilities used in cybersecurity<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">My favorite labs from the course:<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">Network Configuration Lab<\/h2>\n\n\n\n<p>This lab focused on identifying and analyzing Linux network configurations. I used command line utilities such as <strong>ifconfig<\/strong>, <strong>route<\/strong>, <strong>netstat<\/strong>, <strong>ping<\/strong>, and <strong>host<\/strong> to examine network interfaces and routing tables.<\/p>\n\n\n\n<p>The lab also required switching a virtual machine from <strong>NAT mode to Bridged mode<\/strong> and comparing the network behavior in both configurations. The analysis demonstrated how IP addresses, gateways, and DNS settings change depending on network topology. <\/p>\n\n\n\n<p>Key commands used:<\/p>\n\n\n\n<ul>\n<li>ifconfig<\/li>\n\n\n\n<li>route<\/li>\n\n\n\n<li>netstat<\/li>\n\n\n\n<li>ping<\/li>\n\n\n\n<li>host<\/li>\n\n\n\n<li>cat<\/li>\n<\/ul>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Lab_11_Network_Basics_Config.docx_compressed.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab_11_Network_Basics_Config.docx_compressed<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Task Automation with Cron<\/h2>\n\n\n\n<p>In this assignment I created a <strong>Linux backup automation script<\/strong> that archived a user&#8217;s home directory using the <code>tar<\/code> command and compressed the file for storage efficiency.<\/p>\n\n\n\n<p>The script generated backup files using a timestamp and MIDAS ID, then moved the archive into the <code>\/var\/backups<\/code> directory. I scheduled the script to run automatically using <strong>crontab<\/strong>, demonstrating how system administrators automate maintenance tasks in Linux environments. <\/p>\n\n\n\n<p>Skills demonstrated:<\/p>\n\n\n\n<ul>\n<li>Bash scripting<\/li>\n\n\n\n<li>tar archive creation<\/li>\n\n\n\n<li>file compression<\/li>\n\n\n\n<li>automated task scheduling<\/li>\n\n\n\n<li>cron configuration<\/li>\n<\/ul>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE270-Lab-9-Task-Automation.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE270-Lab-9-Task-Automation<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Storage Management and Partitioning<\/h2>\n\n\n\n<p>This lab involved analyzing and managing local storage devices within a Linux virtual machine. I inspected disk devices, created partitions, and mounted a new filesystem.<\/p>\n\n\n\n<p>Key tools used included:<\/p>\n\n\n\n<ul>\n<li><code>fdisk<\/code><\/li>\n\n\n\n<li><code>parted<\/code><\/li>\n\n\n\n<li><code>lsblk<\/code><\/li>\n\n\n\n<li><code>df<\/code><\/li>\n\n\n\n<li>filesystem mounting and unmounting<\/li>\n<\/ul>\n\n\n\n<p>I also attached a new virtual disk to the VM, created a primary partition, formatted it with <strong>ext4<\/strong>, and mounted it to a new directory for use by the system. <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE270-Lab-7.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE270-Lab-7<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\">Reflection<\/h1>\n\n\n\n<p>This course strengthened my comfort working in Linux environments and using command line tools to manage systems. These labs reinforced how Linux is widely used in cybersecurity for system monitoring, automation, and forensic analysis. Through hands-on labs I gained experience troubleshooting network configurations, writing automation scripts, and managing system storage\u2014skills that directly translate to real-world cybersecurity and IT operations roles.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\">Small Design Tip (this will make your portfolio look way better)<\/h1>\n\n\n\n<p>At the top of the page add a <strong>small header block<\/strong> like this:<\/p>\n\n\n\n<p><strong>CYSE 270 \u2013 Linux in Cybersecurity<\/strong><br><em>Old Dominion University | Spring 2025<\/em><\/p>\n\n\n\n<p>Then add <strong>three quick badges<\/strong><\/p>\n\n\n\n<p>Linux | System Administration | Automation<\/p>\n\n\n\n<p>It makes it look <strong>much more like a professional portfolio<\/strong> instead of a class assignment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Old Dominion University | Spring 2025 Linux | System Administration | Automation Course Overview CYSE 270 introduced fundamental Linux system administration skills used in cybersecurity environments. Throughout this course I worked extensively with the Linux command line to manage storage, configure networking, automate system tasks, and analyze system configurations. These labs were completed using Kali &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cyse-270-linux-in-cybersecurity\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 270 &#8211; Linux in Cybersecurity<\/span><\/a><\/p>\n","protected":false},"author":30417,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/386"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/users\/30417"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/386\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/386\/revisions\/391"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/media?parent=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}