Linux System for Cybersecurity
This course built a strong technical foundation in Linux systems administration, focusing on cybersecurity applications. Through hands-on practice in graphical and command-line environments, I gained experience installing and configuring major Linux distributions, managing file systems and permissions, writing basic shell scripts, and configuring user authentication.
Skills
- Linux Command-Line Proficiency
- Shell Scripting Basics
- User & File System Management
- Technical Problem-Solving
- Adaptability
- Attention to Detail
Experience
Skill Highlighted: Linux Command-Line Proficiency
Also Demonstrates: User & File System Management, Attention to Detail
aIn this assignment, I used over 15 Linux terminal commands—including
pwd
,cd
,ls
,cp
,mv
,rm
, andmkdir
—to navigate directories, manage files, and manipulate system structures. I worked with both absolute and relative pathnames, created and removed directories, and verified actions through follow-up commands. This artifact demonstrates my fluency with essential command-line operations and my ability to perform accurate, permission-aware file system tasks in a Linux environment.
Skill Highlighted: User & File System Management
Also Demonstrates: Linux Command-Line Proficiency, Attention to Detail, Technical Problem-Solving
bIn this lab, I managed user and group accounts through command-line operations in a Kali Linux environment. Tasks included creating and deleting users and groups, modifying user privileges, assigning shells and passwords, and adjusting ownership of files and directories. I applied
useradd
,usermod
,groupadd
,chown
, andchmod
commands with elevated privileges, all while ensuring accuracy through verification steps. This artifact showcases my ability to perform administrative-level system tasks while maintaining attention to detail and problem-solving through permission and process-related errors.
Skill Highlighted: Technical Problem-Solving
Also Demonstrates: Linux Command-Line Proficiency, Attention to Detail, Adaptability
cThis lab focused on user creation, password complexity testing, and password cracking using John the Ripper with a wordlist. I created six users with varying password complexities and used the terminal to manage user accounts and extract password hashes. I installed and configured the rockyou.txt wordlist, experimented with multiple download and extraction methods, and used
john
,grep
, andcat
commands to run cracking tests. The lab required detailed troubleshooting, output verification, and flexible problem-solving when certain passwords didn’t appear in the default wordlist, showcasing my ability to adapt and apply command-line tools to real-world password security scenarios.
Skill Highlighted: User & File System Management
Also Demonstrates: Attention to Detail, Technical Problem-Solving, Linux Command-Line Proficiency
dIn this lab, I created and managed multiple user and group accounts, set file system permissions using both symbolic and octal notation, and configured advanced access controls such as SGID and sticky bit permissions. I used commands like
chmod
,chown
,umask
, andgroupmod
to assign and enforce access rules, and tested permission behavior by switching between users. The lab required precise command usage, verification withls -l
, and careful tracking of user roles and group assignments. This artifact reflects my ability to secure shared environments and implement Linux file permission best practices with high attention to system integrity.
Skill Highlighted: Linux Command-Line Proficiency
Also Demonstrates: Technical Problem-Solving, User & File System Management, Attention to Detail
eIn this lab, I attached and configured a new virtual hard disk, created a partition, and formatted it with the ext4 file system. I used commands such as
fdisk
,mkfs.ext4
,mount
,df -h
, andumount
to manage disk partitions and mount points, verifying each step through command-line checks. This artifact showcases my ability to manage Linux-based local storage, ensure proper mounting and file writing, and troubleshoot partitioning through detailed system feedback — all performed with accuracy and command-line fluency.
Skill Highlighted: Shell Scripting Basics
Also Demonstrates: Technical Problem-Solving, Attention to Detail, Adaptability
fIn this assignment, I wrote and executed a shell script to back up a user’s home directory, compress the archive using gzip, and move it to a secure directory. I used variables, the
tar
andgzip
commands, and tested the output format for accuracy. I automated the script usingcrontab
to schedule recurring backups and later wrote a cleanup script to manage file count based on a custom threshold. This task required writing secure, executable scripts with conditional logic, managing root-level permissions, and testing automation workflows—demonstrating both scripting proficiency and a proactive approach to system resource management.
Skill Highlighted: Technical Problem-Solving
Also Demonstrates: Shell Scripting Basics, Attention to Detail
gIn this assignment, I calculated subnetting ranges using CIDR notation, binary conversion, and IP classification for both Class B and Class C addresses. I derived network addresses, broadcast addresses, and valid host ranges manually, reinforcing my understanding of network segmentation. For extra credit, I created a Bash script using both
for
andwhile
loops to automate number printing—demonstrating control structure knowledge and basic script execution in Linux.
Skill Highlighted: Technical Problem-Solving
Also Demonstrates: Linux Command-Line Proficiency, Adaptability, Attention to Detail
hIn this lab, I used key networking commands—
ifconfig
,route -n
,netstat
,ping
, andhost
—to inspect network settings, check DNS resolution, and verify connectivity. I compared VM behavior in NAT and Bridged network modes, identifying differences in IP assignment, gateway configuration, and DNS servers. I also modified my system hostname usingecho
andtee
, and confirmed persistent changes after reboot. This artifact demonstrates my ability to navigate, analyze, and troubleshoot network configurations in dynamic virtual environments.