{"id":427,"date":"2024-11-04T00:45:08","date_gmt":"2024-11-04T00:45:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaredgibson\/?page_id=427"},"modified":"2024-11-04T01:48:07","modified_gmt":"2024-11-04T01:48:07","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaredgibson\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<header>\n    <h1>Introduction to Linux for Cybersecurity<\/h1>\n<\/header>\n\n<div class=\"container\">\n\n    <section class=\"section\">\n        <h2>Course Overview<\/h2>\n        <p>This course introduces essential Linux operations and configurations that form a foundation for cybersecurity studies. I\u2019ve been able to directly apply these skills in managing a home Minecraft server on Linux, which has deepened my understanding of system management and security concepts. The course covers:<\/p>\n        <ul>\n            <li>Installation and configuration of Linux environments<\/li>\n            <li>File system management for secure data handling<\/li>\n            <li>Shell scripting for task automation<\/li>\n            <li>User authentication and permissions setup<\/li>\n        <\/ul>\n        <p>Learning these skills has been invaluable, not only for managing my server but also for developing a stronger technical base for advanced cybersecurity courses.<\/p>\n    <\/section>\n\n    <section class=\"section\">\n        <h2>Skills Gained<\/h2>\n        <p>Through both coursework and hands-on experience with my Minecraft server, I\u2019ve gained skills that are critical for system administration and security:<\/p>\n        <ul>\n            <li><strong>Linux System Configuration<\/strong>: Setting up and maintaining a Linux environment for my server has solidified my knowledge in secure system configurations.<\/li>\n            <li><strong>File and Permissions Management<\/strong>: Managing user roles and file permissions on the server has given me insight into secure access control.<\/li>\n            <li><strong>Shell Scripting and Task Automation<\/strong>: In Assignment 9, I created a shell script to automate system backups, taking inputs for the filename and compressing backup files for efficient storage. This reinforced my understanding of `tar`, compression methods, and scheduling tasks using `crontab`.<\/li>\n            <li><strong>Network Security Basics<\/strong>: Setting up network configurations, such as managing OpenVPN and monitoring traffic, has provided a real-world application of security principles.<\/li>\n        <\/ul>\n    <\/section>\n\n    <section class=\"section\">\n        <h2>Personal Experience<\/h2>\n        <p>Running my own Minecraft server has allowed me to apply course concepts in real-time. Key experiences include:<\/p>\n        <ul>\n            <li>Configuring server settings and troubleshooting issues on a Linux system<\/li>\n            <li>Using tools like the <code>spark<\/code> plugin to monitor server performance and optimize resources<\/li>\n            <li>Practicing network security concepts by managing access and monitoring activity on my server<\/li>\n            <li>Using scripting and automation techniques to ensure regular system maintenance, including automated backups and resource management as practiced in CYSE 270<\/li>\n        <\/ul>\n        <p>This hands-on application has made the coursework in CYSE 270 even more relevant, providing me with practical experience that directly supports my cybersecurity studies.<\/p>\n    <\/section>\n\n<\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-content\/uploads\/sites\/32536\/2024\/11\/annotated-Assignment-9-CYSE-270-Summer2023.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-9-CYSE-270-Summer2023.docx.\"><\/object><a id=\"wp-block-file--media-899a3144-913c-4121-8fdf-9c55d1ca8d6b\" href=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-content\/uploads\/sites\/32536\/2024\/11\/annotated-Assignment-9-CYSE-270-Summer2023.docx.pdf\">annotated-Assignment-9-CYSE-270-Summer2023.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-content\/uploads\/sites\/32536\/2024\/11\/annotated-Assignment-9-CYSE-270-Summer2023.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-899a3144-913c-4121-8fdf-9c55d1ca8d6b\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Linux for Cybersecurity Course Overview This course introduces essential Linux operations and configurations that form a foundation for cybersecurity studies. I\u2019ve been able to directly apply these skills <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/cyse-270\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26177,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages\/427"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/users\/26177"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/comments?post=427"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages\/427\/revisions"}],"predecessor-version":[{"id":436,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages\/427\/revisions\/436"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/media?parent=427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}