Linux System for Cybersecurity

During my college journey, delving into the world of Linux configurations has been both enlightening and empowering. Understanding the intricacies of the Linux file system hierarchy and navigating the command line interface has been a fundamental aspect of my learning. Managing user accounts and permissions not only provided insights into securing system access but also highlighted the importance of meticulous user privilege assignments. Configuring firewalls using tools like iptables has allowed me to fortify network security, and the implementation of secure shell (SSH) has enhanced my ability to establish and manage secure remote connections. As I honed my skills in system hardening, I became adept at securing the Linux kernel, disabling unnecessary services, and configuring robust authentication mechanisms. The practical labs and exercises were particularly valuable, allowing me to apply theoretical knowledge in real-world scenarios, solidifying my grasp on Linux configurations and setting a strong foundation for my cybersecurity journey. Below are some of my hands-on assignments that show my growth in Linux.