{"id":554,"date":"2025-01-31T00:39:47","date_gmt":"2025-01-31T00:39:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?page_id=554"},"modified":"2026-03-22T14:14:38","modified_gmt":"2026-03-22T14:14:38","slug":"cyse-270-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-applications\/cyse-270-2\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-center\">Course Grade Received: A<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Linux System for Cybersecurity<\/h1>\n\n\n\n<p class=\"has-text-align-justify\">This course provided hands-on experience with Linux systems in cybersecurity environments, focusing on system administration, security operations, and automation. Students worked with multiple Linux distributions\u2014including Kali Linux and Ubuntu. The course emphasized file system management, permissions, shell scripting, and security tools used for intrusion detection and system hardening.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Course Objectives<\/h2>\n\n\n\n<ul>\n<li>Deploy and manage Linux systems across local and cloud (AWS) environments<\/li>\n\n\n\n<li>Configure and operate cybersecurity-focused distributions such as Kali Linux<\/li>\n\n\n\n<li>Manage file systems, permissions, and user authentication securely<\/li>\n\n\n\n<li>Develop and execute shell scripts for automation and task efficiency<\/li>\n\n\n\n<li>Perform core system administration tasks (networking, logging, software management)<\/li>\n\n\n\n<li>Apply Linux-based security tools for footprinting and intrusion detection<\/li>\n\n\n\n<li>Implement system hardening techniques to secure Linux environments<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Key Skills &amp; Topics<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udc27 Linux &amp; System Administration<\/h3>\n\n\n\n<ul>\n<li>Linux distributions (Kali, Ubuntu)<\/li>\n\n\n\n<li>File systems &amp; permissions (chmod, chown)<\/li>\n\n\n\n<li>User &amp; group management<\/li>\n\n\n\n<li>Process and service management<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udcbb Scripting &amp; Automation<\/h3>\n\n\n\n<ul>\n<li>Bash \/ shell scripting<\/li>\n\n\n\n<li>Task automation<\/li>\n\n\n\n<li>Log parsing and system monitoring<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udf10 Networking &amp; Cloud<\/h3>\n\n\n\n<ul>\n<li>Linux networking configuration<\/li>\n\n\n\n<li>Remote system management<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 Cybersecurity Applications<\/h3>\n\n\n\n<ul>\n<li>Intrusion detection tools<\/li>\n\n\n\n<li>Footprinting &amp; reconnaissance basics<\/li>\n\n\n\n<li>Firewall configuration<\/li>\n\n\n\n<li>System hardening techniques<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Shell Scripting, Redirection, &amp; Directory Checking<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/07\/Lab-8-Shell-Scripting-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Lab-8-Shell-Scripting-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/07\/Lab-8-Shell-Scripting-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Crontab, Task Scheduling, &amp; Automation<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/08\/Lab-9-Task-Automation-FD-version-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Lab-9-Task-Automation-FD-version-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/08\/Lab-9-Task-Automation-FD-version-1.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Manage Local Storage<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/07\/Week-8-HW-Lab-7-\u2013-Manage-Local-Storage-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Week-8-HW-Lab-7-\u2013-Manage-Local-Storage-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-3 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/07\/Week-8-HW-Lab-7-\u2013-Manage-Local-Storage-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">File Permissions and Sticky Bit<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/Module-3_Week-7-Lab-6-File-Permission-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Module-3_Week-7-Lab-6-File-Permission-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-4 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/Module-3_Week-7-Lab-6-File-Permission-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Group &amp; User Management<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/CYSE-270-Assignment-4-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-270-Assignment-4-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-5 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/CYSE-270-Assignment-4-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Cracking Passwords<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/CYSE-270-Assignment-5-Password-Cracking-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-270-Assignment-5-Password-Cracking-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-6 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/06\/CYSE-270-Assignment-5-Password-Cracking-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Hands-on cybersecurity labs covering system security, networking, vulnerability analysis, and defensive techniques.<\/p>\n","protected":false},"author":30379,"featured_media":0,"parent":2309,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"Hands-on Linux system administration for cybersecurity, including Kali Linux, AWS labs, shell scripting, permissions, and system security.","jetpack_seo_html_title":"CYSE 270 Linux for Cybersecurity & System Administration | ODU","jetpack_seo_noindex":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/554"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=554"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/554\/revisions"}],"predecessor-version":[{"id":2208,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/554\/revisions\/2208"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/2309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}