{"id":1031,"date":"2025-01-11T20:37:45","date_gmt":"2025-01-12T01:37:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=1031"},"modified":"2025-04-26T20:24:02","modified_gmt":"2025-04-27T00:24:02","slug":"cyse-270-lab-reports","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-270-lab-reports\/","title":{"rendered":"Linux System Administration Labs"},"content":{"rendered":"\n<p>This page showcases a series of Linux-based lab projects completed for <strong>CYSE 270: Linux System for Cybersecurity<\/strong>. Each lab involved building and configuring Linux systems within a virtual machine environment, using command-line tools, managing users and permissions, scripting, and securing local storage and networks. The labs provided hands-on experience with system administration tasks and foundational cybersecurity practices. Each report includes detailed steps, screenshots, and configurations demonstrating the applied skills.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 1 \u2013 Create a Virtual Machine<\/h3>\n\n\n\n<p>For this lab, I created a virtual machine (VM) environment using virtualization software. I installed a Linux operating system within the VM and configured basic system settings, preparing a controlled environment for future cybersecurity labs and exercises. This project introduced foundational virtualization concepts and system setup procedures.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/04\/CYSE-270-Lab-1-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-270-Lab-1-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 2 &#8211; Basic Linux Commands<\/h3>\n\n\n\n<p>This lab focused on using essential Linux terminal commands for file navigation, system operations, and user environment management.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 3 &#8211; VI Editor<\/h3>\n\n\n\n<p>This lab involved using the VI text editor to create and modify files within the Linux environment, practicing basic and advanced editing commands.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-3.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-3<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 4 &#8211; User and Group Accounts<\/h3>\n\n\n\n<p>This lab explored the creation, management, and permission settings of Linux user and group accounts to control system access.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-4-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-4-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 5 &#8211; Password Cracking<\/h3>\n\n\n\n<p>This lab examined password security by testing how passwords are stored and applying tools to demonstrate common cracking techniques.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-5-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-5-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 6 &#8211; File Permissions<\/h3>\n\n\n\n<p>This lab practiced setting and modifying Linux file permissions to ensure the confidentiality, integrity, and availability of system resources.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-6-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-6-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 7 &#8211; Managing Local Storage<\/h3>\n\n\n\n<p>This lab focused on managing disk partitions, mounting storage devices, and configuring Linux file systems for efficient storage management.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-7-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-7-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 8 &#8211; Shell Scripting<\/h3>\n\n\n\n<p>This lab involved writing basic shell scripts to automate administrative tasks and processes in the Linux environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-8-Shell-Scripting-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-8-Shell-Scripting-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 9 &#8211; Crontab and System Cleanup<\/h3>\n\n\n\n<p>This lab explored using crontab to automate tasks and maintain system health through scheduled cleanups and administrative commands.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-9-Task-Automation-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-9-Task-Automation-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 10 &#8211; Networking Basics: Subnetting<\/h3>\n\n\n\n<p>This lab covered subnetting concepts and calculations to understand IP address management and basic network configurations.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-10-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-10-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Lab 11 &#8211; Basic Network Configurations<\/h3>\n\n\n\n<p>This lab practiced setting up and troubleshooting basic network configurations within a Linux system environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2025\/01\/Lab-11-Submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-11-Submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page showcases a series of Linux-based lab projects completed for CYSE 270: Linux System for Cybersecurity. Each lab involved building and configuring Linux systems within a virtual machine environment, using command-line tools, managing users and permissions, scripting, and securing&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-270-lab-reports\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1031"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=1031"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1031\/revisions"}],"predecessor-version":[{"id":1266,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/1031\/revisions\/1266"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=1031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}