{"id":359,"date":"2025-12-06T08:45:35","date_gmt":"2025-12-06T08:45:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/georgesmith\/?page_id=359"},"modified":"2025-12-10T02:36:12","modified_gmt":"2025-12-10T02:36:12","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/georgesmith\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Linux Systems for Cybersecurity<\/strong><\/h2>\n\n\n\n<p>This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interfaces. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems.<\/p>\n\n\n\n<p>Course Objectives<\/p>\n\n\n\n<ul>\n<li>Introduce the basic concept and knowledge about different Linux distros, including the most popular distribution for cybersecurity, Kali Linux\n<ul>\n<li>Install and operate different Linux distros locally and remotely (on AWS cloud)<\/li>\n\n\n\n<li>Understand the ownership and permissions of the files and directories<\/li>\n\n\n\n<li>Understand the shell scripts<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Perform essential system administration functions, such as network configuration, process and<br>log administration, and software management<\/li>\n\n\n\n<li>Perform security tasks,  such as footprinting, firewalls, and tools in relation to Intrusion Detection<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Linux Systems for Cybersecurity This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interfaces. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/georgesmith\/cyse-270\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30474,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/359"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/users\/30474"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/359\/revisions"}],"predecessor-version":[{"id":442,"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/pages\/359\/revisions\/442"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/georgesmith\/wp-json\/wp\/v2\/media?parent=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}