{"id":321,"date":"2023-07-30T06:00:22","date_gmt":"2023-07-30T06:00:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hbramow\/?page_id=321"},"modified":"2023-08-04T00:30:48","modified_gmt":"2023-08-04T00:30:48","slug":"cyse-270-linux-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-270-linux-for-cybersecurity\/","title":{"rendered":"CYSE 270 &#8211; Linux System for Cybersecurity"},"content":{"rendered":"\n<p class=\"has-text-align-center has-pale-ocean-gradient-background has-background has-x-large-font-size\"><strong>Linux System for Cybersecurity<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command line interface.  Students learn about the following:<\/p>\n\n\n\n<ul>\n<li class=\"has-medium-font-size\">the basic installation and configuration, <\/li>\n\n\n\n<li class=\"has-medium-font-size\">file systems management, <\/li>\n\n\n\n<li class=\"has-medium-font-size\">shell scripts, and <\/li>\n\n\n\n<li class=\"has-medium-font-size\">user authentication in Linux systems. <br><br>This course is the<strong><em> technical base for students to take<\/em><\/strong> <em><strong>cybersecurity major<\/strong><\/em> courses.  The lab was set up on our own personal computers versus the ODU computer lab.  <\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-large-font-size\"><strong>Course Objectives <\/strong><\/h2>\n\n\n\n<ul>\n<li class=\"has-medium-font-size\">Learn about Linux distros, including Kali Linux;<\/li>\n\n\n\n<li class=\"has-medium-font-size\">learn basic concepts\/knowledge about the different distros;<\/li>\n\n\n\n<li class=\"has-medium-font-size\">install\/operate distros;<\/li>\n\n\n\n<li class=\"has-medium-font-size\">work with ownership, permissions of files\/directories;<\/li>\n\n\n\n<li class=\"has-medium-font-size\">write shell scripts to automate daily tasks;<\/li>\n\n\n\n<li class=\"has-medium-font-size\">perform administrative functions like:   <br>&#8211;   network configuration, <br>&#8211;   processes, <br>&#8211;   logs, and <br>&#8211;   manage software;<\/li>\n\n\n\n<li class=\"has-medium-font-size\">learn security tasks like:  <br>&#8211;   firewalls, <br>&#8211;   footprinting, and <br>&#8211;   Intrusion Detection tools.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\"><strong>Materials<\/strong><\/p>\n\n\n\n<ul>\n<li>Textbook &#8211; &#8220;Lab Manual &#8211; Linux Essentials for Cybersecurity 1st Ed.&#8221; by William Rothwell and Denise Kinsey, ISBN: 0789759357<\/li>\n\n\n\n<li>Textbook &#8211; &#8220;The Linux Bible, 10th Ed.&#8221; by Christopher Negus<\/li>\n\n\n\n<li>Textbook &#8211; &#8220;Linux+ and LPIC-1 Guide to Linux Certification, 5th Ed.&#8221; &#8211; Jason Eckert, ISBN-13: 9781337569798<\/li>\n\n\n\n<li>Textbook &#8211; &#8220;Mastering Modern Linux. 2nd Ed.&#8221; by Paul S. Wang June 2018 <\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\"> <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"http:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/07\/pexels-pixabay-207580-1-1024x768.jpg\" alt=\"\" class=\"wp-image-367\" srcset=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/07\/pexels-pixabay-207580-1-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/07\/pexels-pixabay-207580-1-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/07\/pexels-pixabay-207580-1-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/07\/pexels-pixabay-207580-1-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2023\/07\/pexels-pixabay-207580-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Linux System for Cybersecurity This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command line interface. Students learn about the following: Course Objectives Materials<\/p>\n","protected":false},"author":27054,"featured_media":367,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/users\/27054"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/321\/revisions"}],"predecessor-version":[{"id":694,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/321\/revisions\/694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media\/367"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media?parent=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}