Linux System for Cybersecurity
This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems.
The course objectives are:
- Introduce the basic concept and knowledge about different Linux distros, including the most
popular distribution for cybersecurity, Kali Linux - Install and operate different Linux distros locally and remotely (on AWS cloud),
- Understand the ownership and permissions of the files and directories,
- Understand the shell scripts,
- Perform essential system administration functions, such as network configuration, process and
log administration, and software management, and - Perform security tasks, such as footprinting, firewalls, and tools in relation to Intrusion
Detection.
Course Material
During my attendance in this course, I have had exposure to numerous Linux distributions, as well as how to install, and maintain these distributions on virtual machines. I have demonstrated knowledge in how to navigate the Linux command line and its functions, including but not limited to file/user access, file/user management, shell scripting, configuring networks and software, and performing various security tasks such utilizing John the Ripper and Wire Shark, and identifying and exploiting vulnerabilities through the use of Metasploit.
Examples of course material I have completed include creating and managing user groups and accounts, as well as permissions on files and directories, creating shell scripts to perform various functions such as automating file management and backups through cronjobs and the at command, identifying and exploiting vulnerabilities on other systems, packet sniffing through Wire Shark, cracking passwords utilizing John the Ripper, among many others. With my current knowledge, I feel confident in my ability to further my knowledge of Linux distributions and the Linux command line through advanced courses and techniques. I believe this knowledge to be an invaluable asset to utilize within my target profession of Cybersecurity Analyst.