CYSE 270

Linux System for Cybersecurity

This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems.


Throughout the semester, I have been working with a Linux VM working on various tasks and assignments corresponding to Linux Administration. This has easily been my favorite and most impactful course, the challenges and tasks assigned to me were difficult but yet I prevailed and completed each assignment to its entirety every week. Professor Shobha was my professor and I can say that she is an intelligent instructor that has mastered the Linux Operating System. At first I was hesitant to take the course online synchronously, but with Professor Shobha instructing, it felt as if I was in a physical classroom with her face-to-face instruction.

Two assignments that I would like to briefly speak on are Assignment 10- Subnetting, and Assignment 12- Advanced Network configuration.

During the week of the assignment 10, we began to learn networking basics. Networking is a topic that has never immediately clicked to me, but I recognize the importance which is why I made an emphasis to really focus during this week. As a result, I was able to obtain a refresh on basic networking vocabulary, as well as understand, binary conversion, and IP subnetting. This was definitely one of the most tedious assignments; it took me over 2 hours to complete this assignment and I had to pull out a sheet of paper to make sure that I was doing my conversions correctly

Assignment 10:

Breakdown of IP subnetting

In the week of Assignment 12, we are still on the topic of Networking but are now diving deeper. The end goal of this assignment was to have two Linux machines communicate with each other. Machine A would have two network adapters, one connected to the internet and another internal network. Machine B would then connect to the same internal network that machine A is connected to. Through modifications, your end result in Machine B would be to also be able to make network requests after performing specific configurations. This assignment was extremely difficult for me, one mistake and you would easily break the connection between the two machines. I restarted my programs over 10 times, and for the first time throughout this course, I wanted to quit this assignment and try again another day. After 4 hours, I carefully took my time and was able to successfully complete this assignment

Assignment 12: