This page highlights a series of Linux-based cybersecurity labs completed for CYSE 301: Cybersecurity Techniques and Operations. These hands-on projects involved practicing system hardening, incident response, ethical hacking, and securing operating systems against common cyber threats. Each lab focused on applying operational security concepts in real-world scenarios to strengthen technical skills and critical thinking.


Module 0 – Basic Linux Commands

This lab focused on practicing essential Linux terminal commands used for file navigation, permissions, user management, and basic system control in cybersecurity environments.


Lab-Report-for-Assignment-1


Module 1 – Traffic Tracing and Sniffing

This lab involved using network analysis tools to trace, capture, and interpret network traffic, helping to identify potential security vulnerabilities and understand normal versus abnormal network behavior.


Lab-Report-for-Assignment-2


Module 2 – Sword vs. Shield

This lab simulated offensive and defensive cybersecurity operations by testing vulnerabilities in a controlled environment and applying defense techniques to secure the system.


Lab-Report-for-Assignment-3


Module 3 – Ethical Hacking

This lab explored ethical hacking principles and penetration testing strategies, using practical exercises to demonstrate how attackers exploit vulnerabilities and how defenders can identify and patch security gaps.


Lab-Report-for-Assignment-4


Module 4 – Password Cracking

In this part of the lab, I explored how different systems store and protect passwords. I practiced using cybersecurity tools to crack passwords, gaining a deeper understanding of password vulnerabilities and the importance of strong authentication methods.

Module 5 – Wireless Security

In this part of the lab, I focused on the vulnerabilities of Wi-Fi networks. I used security tools to capture wireless traffic, decrypt network communications, and analyze weaknesses in common wireless encryption protocols.


Lab-Report-for-Assignment-5


Module 6 – Hide Your Secret!

In this lab, I practiced using steganography techniques to hide sensitive information within files and learned methods for detecting hidden data, highlighting the challenges of data protection and cyber forensics.

(No report available to attach.)