This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. We learned about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems.
During the completion of this course, I have broadening my understanding of just how critical Linux is to establishing a solid foundation for a career in Cyber Security. Although Linux was a little reserved in my initial experience with Linux, through this course I feel much more confident providing command-line assistance to others, plus handling files and permission assignments, along with creating automated processes to perform specific tasks through the writing of scripts. Utilizing real life tools associated with the operating system, such as networking commands, user and group creation/management, basic security configurations, etc. are proving to me how much more powerful and flexible Linux can be for both defensive and administrational purposes.
Working on these course project assignments, has allowed me to gain real-world experience and develop the skills needed to become proficient in working within a security environment. This has enhanced my ability to identify and monitor system activity associated with Networking Information, Process Management, and other associated information regarding Security. It has been instilled into me, that working on a Linux-based operating system, requires paying close attention to detail, as well as having the ability to logically troubleshoot issues as they arise. Overall, I feel this has progressed my Technical Foundation for Technical Proficiency with Linux and provided me with a much clearer understanding of the Interrelationship between Cybersecurity and Systems Administration as they exist in practical application. Based on my overall experience with this course, it has inspired and motivated me to want to further advance my Cybersecurity Skills in order to become more knowledgeable and proficient in using more Advanced Security Tools/Concepts in the future.