{"id":318,"date":"2025-06-08T20:35:47","date_gmt":"2025-06-08T20:35:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/?page_id=318"},"modified":"2025-06-12T23:53:35","modified_gmt":"2025-06-12T23:53:35","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Linux System for Cybersecurity<\/strong>&nbsp;<\/h2>\n\n\n\n<p class=\"has-text-align-left\">This course built a strong technical foundation in Linux systems administration, focusing on cybersecurity applications. Through hands-on practice in graphical and command-line environments, I gained experience installing and configuring major Linux distributions, managing file systems and permissions, writing basic shell scripts, and configuring user authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">Skills<\/h2>\n\n\n\n<ol>\n<li>Linux Command-Line Proficiency<\/li>\n\n\n\n<li>Shell Scripting Basics<\/li>\n\n\n\n<li>User &amp; File System Management<\/li>\n\n\n\n<li>Technical Problem-Solving<\/li>\n\n\n\n<li>Adaptability<\/li>\n\n\n\n<li>Attention to Detail<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">Experience<\/h2>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Linux Command-Line Proficiency<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>User &amp; File System Management<\/em>,&nbsp;<em>Attention to Detail<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this assignment, I used over 15 Linux terminal commands\u2014including&nbsp;<code>pwd<\/code>,&nbsp;<code>cd<\/code>,&nbsp;<code>ls<\/code>,&nbsp;<code>cp<\/code>,&nbsp;<code>mv<\/code>,&nbsp;<code>rm<\/code>, and&nbsp;<code>mkdir<\/code>\u2014to navigate directories, manage files, and manipulate system structures. I worked with both absolute and relative pathnames, created and removed directories, and verified actions through follow-up commands. This artifact demonstrates my fluency with essential command-line operations and my ability to perform accurate, permission-aware file system tasks in a Linux environment.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/a.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">a<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>User &amp; File System Management<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Linux Command-Line Proficiency<\/em>,&nbsp;<em>Attention to Detail<\/em>,&nbsp;<em>Technical Problem-Solving<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this lab, I managed user and group accounts through command-line operations in a Kali Linux environment. Tasks included creating and deleting users and groups, modifying user privileges, assigning shells and passwords, and adjusting ownership of files and directories. I applied&nbsp;<code>useradd<\/code>,&nbsp;<code>usermod<\/code>,&nbsp;<code>groupadd<\/code>,&nbsp;<code>chown<\/code>, and&nbsp;<code>chmod<\/code>&nbsp;commands with elevated privileges, all while ensuring accuracy through verification steps. This artifact showcases my ability to perform administrative-level system tasks while maintaining attention to detail and problem-solving through permission and process-related errors.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/b.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">b<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Technical Problem-Solving<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Linux Command-Line Proficiency<\/em>,&nbsp;<em>Attention to Detail<\/em>,&nbsp;<em>Adaptability<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This lab focused on user creation, password complexity testing, and password cracking using John the Ripper with a wordlist. I created six users with varying password complexities and used the terminal to manage user accounts and extract password hashes. I installed and configured the rockyou.txt wordlist, experimented with multiple download and extraction methods, and used&nbsp;<code>john<\/code>,&nbsp;<code>grep<\/code>, and&nbsp;<code>cat<\/code>&nbsp;commands to run cracking tests. The lab required detailed troubleshooting, output verification, and flexible problem-solving when certain passwords didn\u2019t appear in the default wordlist, showcasing my ability to adapt and apply command-line tools to real-world password security scenarios.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/c.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">c<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>User &amp; File System Management<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Attention to Detail<\/em>,&nbsp;<em>Technical Problem-Solving<\/em>,&nbsp;<em>Linux Command-Line Proficiency<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this lab, I created and managed multiple user and group accounts, set file system permissions using both symbolic and octal notation, and configured advanced access controls such as SGID and sticky bit permissions. I used commands like&nbsp;<code>chmod<\/code>,&nbsp;<code>chown<\/code>,&nbsp;<code>umask<\/code>, and&nbsp;<code>groupmod<\/code>&nbsp;to assign and enforce access rules, and tested permission behavior by switching between users. The lab required precise command usage, verification with&nbsp;<code>ls -l<\/code>, and careful tracking of user roles and group assignments. This artifact reflects my ability to secure shared environments and implement Linux file permission best practices with high attention to system integrity.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/d.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">d<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Linux Command-Line Proficiency<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Technical Problem-Solving<\/em>,&nbsp;<em>User &amp; File System Management<\/em>,&nbsp;<em>Attention to Detail<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this lab, I attached and configured a new virtual hard disk, created a partition, and formatted it with the ext4 file system. I used commands such as&nbsp;<code>fdisk<\/code>,&nbsp;<code>mkfs.ext4<\/code>,&nbsp;<code>mount<\/code>,&nbsp;<code>df -h<\/code>, and&nbsp;<code>umount<\/code>&nbsp;to manage disk partitions and mount points, verifying each step through command-line checks. This artifact showcases my ability to manage Linux-based local storage, ensure proper mounting and file writing, and troubleshoot partitioning through detailed system feedback \u2014 all performed with accuracy and command-line fluency.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/e.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">e<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Shell Scripting Basics<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Technical Problem-Solving<\/em>,&nbsp;<em>Attention to Detail<\/em>,&nbsp;<em>Adaptability<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this assignment, I wrote and executed a shell script to back up a user\u2019s home directory, compress the archive using gzip, and move it to a secure directory. I used variables, the&nbsp;<code>tar<\/code>&nbsp;and&nbsp;<code>gzip<\/code>&nbsp;commands, and tested the output format for accuracy. I automated the script using&nbsp;<code>crontab<\/code>&nbsp;to schedule recurring backups and later wrote a cleanup script to manage file count based on a custom threshold. This task required writing secure, executable scripts with conditional logic, managing root-level permissions, and testing automation workflows\u2014demonstrating both scripting proficiency and a proactive approach to system resource management.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/f.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">f<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Technical Problem-Solving<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Shell Scripting Basics<\/em>,&nbsp;<em>Attention to Detail<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this assignment, I calculated subnetting ranges using CIDR notation, binary conversion, and IP classification for both Class B and Class C addresses. I derived network addresses, broadcast addresses, and valid host ranges manually, reinforcing my understanding of network segmentation. For extra credit, I created a Bash script using both&nbsp;<code>for<\/code>&nbsp;and&nbsp;<code>while<\/code>&nbsp;loops to automate number printing\u2014demonstrating control structure knowledge and basic script execution in Linux.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/g.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">g<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Technical Problem-Solving<\/em><br><strong>Also Demonstrates:<\/strong>&nbsp;<em>Linux Command-Line Proficiency<\/em>,&nbsp;<em>Adaptability<\/em>,&nbsp;<em>Attention to Detail<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>In this lab, I used key networking commands\u2014<code>ifconfig<\/code>,&nbsp;<code>route -n<\/code>,&nbsp;<code>netstat<\/code>,&nbsp;<code>ping<\/code>, and&nbsp;<code>host<\/code>\u2014to inspect network settings, check DNS resolution, and verify connectivity. I compared VM behavior in NAT and Bridged network modes, identifying differences in IP assignment, gateway configuration, and DNS servers. I also modified my system hostname using&nbsp;<code>echo<\/code>&nbsp;and&nbsp;<code>tee<\/code>, and confirmed persistent changes after reboot. This artifact demonstrates my ability to navigate, analyze, and troubleshoot network configurations in dynamic virtual environments.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/h.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">h<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux System for Cybersecurity&nbsp; This course built a strong technical foundation in Linux systems administration, focusing on cybersecurity applications. Through hands-on practice in graphical and command-line environments, I gained experience installing and configuring major Linux distributions, managing file systems and permissions, writing basic shell scripts, and configuring user authentication. Skills Experience Skill Highlighted:&nbsp;Linux Command-Line ProficiencyAlso&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/cyse-270\/\">Read More<\/a><\/div>\n","protected":false},"author":15711,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/318"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/users\/15711"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":464,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/318\/revisions\/464"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/media?parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}