{"id":231,"date":"2023-02-02T21:33:42","date_gmt":"2023-02-02T21:33:42","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2025-04-25T03:23:05","modified_gmt":"2025-04-25T03:23:05","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ismael200t\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Linux System for Cybersecurity<\/h2>\n\n\n\n<p>This course introduced me to the basic Linux operations of cybersecurity through a variety of Linux distros, such as kali and Ubuntu. This course allowed me to use both graphical interface, and command line interface to complete task. These task included, basic installation and configuration of VM machine, file system management, Group and user account management, firewalls and network configurations, and shell scripting. This class has helped develop me in the field of cybersecurity, that mainly relies on the knowledge of Linux systems. When I first joined the class, I was very nervous on the success, I would have with the course, since Linux was new to me. However, with the help of my professor Shobha Vasta, she helped me master the basics of Linux.        <\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Hands on labs:<\/h1>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 style=\"text-align: left\">\u00a0<\/h2>\n<h2>Assignment#9 &#8211; Task Automation<\/h2>\n<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Lab9-2.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab9-2.docx-1.\"><\/object><a id=\"wp-block-file--media-de1c4d26-90a2-4c83-9463-aceda47c7c15\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Lab9-2.docx-1.pdf\">annotated-Lab9-2.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Lab9-2.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-de1c4d26-90a2-4c83-9463-aceda47c7c15\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Assignment#10 &#8211; Networking Basics <\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Assignment-10-Networking20Basics20and20Subnetting2028129-1.pdf.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-10-Networking20Basics20and20Subnetting2028129-1.pdf.docx.\"><\/object><a id=\"wp-block-file--media-a70d5777-dfe7-4b6f-a7eb-a8389add99a7\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Assignment-10-Networking20Basics20and20Subnetting2028129-1.pdf.docx.pdf\">annotated-Assignment-10-Networking20Basics20and20Subnetting2028129-1.pdf.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Assignment-10-Networking20Basics20and20Subnetting2028129-1.pdf.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a70d5777-dfe7-4b6f-a7eb-a8389add99a7\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Assignment#12 &#8211; Advance Network Configuration <\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Assigment2012.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:610px\" aria-label=\"Embed of annotated-Assigment2012.docx.\"><\/object><a id=\"wp-block-file--media-03822795-50a1-4ad4-bec2-16029be434d5\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Assigment2012.docx.pdf\">annotated-Assigment2012.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Assigment2012.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-03822795-50a1-4ad4-bec2-16029be434d5\">Download<\/a><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Assignment#8 &#8211; Shell Script<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Lab820shell20script20sahmer.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab820shell20script20sahmer.docx.\"><\/object><a id=\"wp-block-file--media-cc52926f-7960-4439-b359-a3ca17b67516\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Lab820shell20script20sahmer.docx.pdf\">annotated-Lab820shell20script20sahmer.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/03\/annotated-Lab820shell20script20sahmer.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cc52926f-7960-4439-b359-a3ca17b67516\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/9a030fb6-2c02-4758-a5f6-183b0134baeb\" class=\"wp-block-file__button wp-element-button\" download>Download<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux System for Cybersecurity This course introduced me to the basic Linux operations of cybersecurity through a variety of Linux distros, such as kali and Ubuntu. This course allowed me to use both graphical interface, and command line interface to complete task. These task included, basic installation and configuration of VM machine, file system management, &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/cyse-270\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 270<\/span><\/a><\/p>\n","protected":false},"author":26135,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/users\/26135"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":610,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/231\/revisions\/610"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}