CYSE 270

Course Grade Received: A


Linux System for Cybersecurity

This course provided hands-on experience with Linux systems in cybersecurity environments, focusing on system administration, security operations, and automation. Students worked with multiple Linux distributions—including Kali Linux and Ubuntu. The course emphasized file system management, permissions, shell scripting, and security tools used for intrusion detection and system hardening.

Course Objectives

  • Deploy and manage Linux systems across local and cloud (AWS) environments
  • Configure and operate cybersecurity-focused distributions such as Kali Linux
  • Manage file systems, permissions, and user authentication securely
  • Develop and execute shell scripts for automation and task efficiency
  • Perform core system administration tasks (networking, logging, software management)
  • Apply Linux-based security tools for footprinting and intrusion detection
  • Implement system hardening techniques to secure Linux environments

Key Skills & Topics

🐧 Linux & System Administration

  • Linux distributions (Kali, Ubuntu)
  • File systems & permissions (chmod, chown)
  • User & group management
  • Process and service management

💻 Scripting & Automation

  • Bash / shell scripting
  • Task automation
  • Log parsing and system monitoring

🌐 Networking & Cloud

  • Linux networking configuration
  • Remote system management

🔐 Cybersecurity Applications

  • Intrusion detection tools
  • Footprinting & reconnaissance basics
  • Firewall configuration
  • System hardening techniques

Course Material


Shell Scripting, Redirection, & Directory Checking

Lab-8-Shell-Scripting-fd


Crontab, Task Scheduling, & Automation

Lab-9-Task-Automation-FD-version-1


Manage Local Storage

Week-8-HW-Lab-7-–-Manage-Local-Storage-fd


File Permissions and Sticky Bit

Module-3_Week-7-Lab-6-File-Permission-fd


Group & User Management

CYSE-270-Assignment-4-fd


Cracking Passwords

CYSE-270-Assignment-5-Password-Cracking-fd