CYSE 270

Linux System for Cybersecurity 

This course built a strong technical foundation in Linux systems administration, focusing on cybersecurity applications. Through hands-on practice in graphical and command-line environments, I gained experience installing and configuring major Linux distributions, managing file systems and permissions, writing basic shell scripts, and configuring user authentication.

Skills

  1. Linux Command-Line Proficiency
  2. Shell Scripting Basics
  3. User & File System Management
  4. Technical Problem-Solving
  5. Adaptability
  6. Attention to Detail

Experience

Skill Highlighted: Linux Command-Line Proficiency
Also Demonstrates: User & File System ManagementAttention to Detail

In this assignment, I used over 15 Linux terminal commands—including pwdcdlscpmvrm, and mkdir—to navigate directories, manage files, and manipulate system structures. I worked with both absolute and relative pathnames, created and removed directories, and verified actions through follow-up commands. This artifact demonstrates my fluency with essential command-line operations and my ability to perform accurate, permission-aware file system tasks in a Linux environment.

a

Skill Highlighted: User & File System Management
Also Demonstrates: Linux Command-Line ProficiencyAttention to DetailTechnical Problem-Solving

In this lab, I managed user and group accounts through command-line operations in a Kali Linux environment. Tasks included creating and deleting users and groups, modifying user privileges, assigning shells and passwords, and adjusting ownership of files and directories. I applied useraddusermodgroupaddchown, and chmod commands with elevated privileges, all while ensuring accuracy through verification steps. This artifact showcases my ability to perform administrative-level system tasks while maintaining attention to detail and problem-solving through permission and process-related errors.

b

Skill Highlighted: Technical Problem-Solving
Also Demonstrates: Linux Command-Line ProficiencyAttention to DetailAdaptability

This lab focused on user creation, password complexity testing, and password cracking using John the Ripper with a wordlist. I created six users with varying password complexities and used the terminal to manage user accounts and extract password hashes. I installed and configured the rockyou.txt wordlist, experimented with multiple download and extraction methods, and used johngrep, and cat commands to run cracking tests. The lab required detailed troubleshooting, output verification, and flexible problem-solving when certain passwords didn’t appear in the default wordlist, showcasing my ability to adapt and apply command-line tools to real-world password security scenarios.

c

Skill Highlighted: User & File System Management
Also Demonstrates: Attention to DetailTechnical Problem-SolvingLinux Command-Line Proficiency

In this lab, I created and managed multiple user and group accounts, set file system permissions using both symbolic and octal notation, and configured advanced access controls such as SGID and sticky bit permissions. I used commands like chmodchownumask, and groupmod to assign and enforce access rules, and tested permission behavior by switching between users. The lab required precise command usage, verification with ls -l, and careful tracking of user roles and group assignments. This artifact reflects my ability to secure shared environments and implement Linux file permission best practices with high attention to system integrity.

d

Skill Highlighted: Linux Command-Line Proficiency
Also Demonstrates: Technical Problem-SolvingUser & File System ManagementAttention to Detail

In this lab, I attached and configured a new virtual hard disk, created a partition, and formatted it with the ext4 file system. I used commands such as fdiskmkfs.ext4mountdf -h, and umount to manage disk partitions and mount points, verifying each step through command-line checks. This artifact showcases my ability to manage Linux-based local storage, ensure proper mounting and file writing, and troubleshoot partitioning through detailed system feedback — all performed with accuracy and command-line fluency.

e

Skill Highlighted: Shell Scripting Basics
Also Demonstrates: Technical Problem-SolvingAttention to DetailAdaptability

In this assignment, I wrote and executed a shell script to back up a user’s home directory, compress the archive using gzip, and move it to a secure directory. I used variables, the tar and gzip commands, and tested the output format for accuracy. I automated the script using crontab to schedule recurring backups and later wrote a cleanup script to manage file count based on a custom threshold. This task required writing secure, executable scripts with conditional logic, managing root-level permissions, and testing automation workflows—demonstrating both scripting proficiency and a proactive approach to system resource management.

f

Skill Highlighted: Technical Problem-Solving
Also Demonstrates: Shell Scripting BasicsAttention to Detail

In this assignment, I calculated subnetting ranges using CIDR notation, binary conversion, and IP classification for both Class B and Class C addresses. I derived network addresses, broadcast addresses, and valid host ranges manually, reinforcing my understanding of network segmentation. For extra credit, I created a Bash script using both for and while loops to automate number printing—demonstrating control structure knowledge and basic script execution in Linux.

g

Skill Highlighted: Technical Problem-Solving
Also Demonstrates: Linux Command-Line ProficiencyAdaptabilityAttention to Detail

In this lab, I used key networking commands—ifconfigroute -nnetstatping, and host—to inspect network settings, check DNS resolution, and verify connectivity. I compared VM behavior in NAT and Bridged network modes, identifying differences in IP assignment, gateway configuration, and DNS servers. I also modified my system hostname using echo and tee, and confirmed persistent changes after reboot. This artifact demonstrates my ability to navigate, analyze, and troubleshoot network configurations in dynamic virtual environments.

h