{"id":93,"date":"2025-06-02T01:58:00","date_gmt":"2025-06-02T01:58:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=93"},"modified":"2025-12-04T04:24:01","modified_gmt":"2025-12-04T04:24:01","slug":"law-ethics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nconsidine\/law-ethics\/","title":{"rendered":"CYSE 270: Linux System for Cybersecurity"},"content":{"rendered":"\n<p>Taking CYSE 270: Linux System for Cybersecurity was a foundational experience in both my growth and learning process as a Cybersecurity student. I had a basic, but underdeveloped understanding of Linux while entering this course, but through this semester, CYSE 270 pushed me to work hands-on with the operating system, enhancing both my technical skills and my confidence. I gained practical experience with core Linux concepts such as permissions, while also expanding my know-how of user and group management, as well as system monitoring. CYSE 270 also improved my knowledge of log analysis, service configuration, and command line problem solving skills, all of which are essential for pursuing a career in cybersecurity.<\/p>\n\n\n\n<p>This course helped me to understand the deep importance of knowledge of the base operating system in the role of a cybersecurity professional. The labs challenged me to make troubleshooting decisions, combine learned knowledge with prior know-how, and apply commands with purpose rather than just memorizing them. In this course I learned to navigate mistakes with strong efficiency.<\/p>\n\n\n\n<p>Overall, this Linux System for Cybersecurity course has assisted me in developing a robust technical foundation and provided me with clearer understanding of how Linux is actually applied in real cybersecurity environments. CYSE 270 bolstered my interest in cybersecurity while also preparing me for the more advanced classes to come, and the practical security work along with it. I found this course to be both challenging and rewarding, and I am walking away with a far stronger grasp of Linux as a security focused system.<br><\/p>\n\n\n\n<div style=\"height:207px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p>Lab 1 &#8211; Create a Virtual Machine<\/p>\n\n\n\n<p>This lab served as my first true hands-on experience in CYSE 270. During this lab I created a Kali Linux VM in Oracle VirtualBox. I found it exciting to have an existing OS deeper into my Windows OS. This assignment laid the foundation for the rest of the course. Using the terminal for the first time in a fully functional virtual Linux system, running inside my Windows PC was both exciting and slightly intimidating.<\/p>\n\n\n\n<p>I learned how to install a Linux OS on a virtual machine, practiced basic Linux commands, and learned the purpose of these commands and how they interacted with the system. This lab was a smooth transition into the Linux system on VM, emphasizing proper setup and configuration.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p>Lab 2 &#8211; Working with Command Line<\/p>\n\n\n\n<p>This lab dove into working and manipulating the Linux OS command line, teaching me how to navigate file systems. It taught me how to list directories, inspect files and their content, create and delete, rename, and copy files and directories, and practice safe command execution. This also taught me about permission related errors in the Linux OS system. We faced challenges handling these errors but learned the importance of being proficient in the command line in Linux.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 3 &#8211; Working with VI Editor<\/p>\n\n\n\n<p>This was the first in depth experience I had working with VI editor in Linux. It taught us how to navigate files using VI. Introducing us to command and insert mode, searching and replacing text in files, copying, deleting, and pasting lines, and saving, quitting, and renaming files in the terminal. Though I faced some initially challenges with smooth switches and raw commands in VI editor, I got the hang of things quite quickly. This allowed me to gain experience and confidence using VI editor, a powerful tool for editing files in Linux. Learning to master small commands and teaching me to feel capable in navigating and editing files in VI, this lab served as a great learning lesson. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 4 &#8211; User and Group Accounts<\/p>\n\n\n\n<p>The user and group accounts lab provided experience managing user and group accounts in Linux. By viewing and interpreting user account and password directories, creating users while assigning home directories and default shells, adding users and managing groups, understanding file permissions and ownerships at group level, and creating and deleting files while keeping proper permissions, this lab reinforced the importance of user and group management in Linux for both security and system functionality. This lab imposed challenges, pushing me to ensure that changes did not overwrite existing group memberships. The skills learned in this lab are foundational to maintaining and overseeing secure environments and preparing myself for more intensive cybersecurity work.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p>Lab 5 &#8211; Password Cracking<\/p>\n\n\n\n<p>This lab was one of the more enlightening and enjoyable labs in the course as it showed how password strength directly affects the security of a system. I created users with password complexities that were variously structured, learned understanding of password hashing and how Linux stores them, exporting hashes into separate files for analysis, how to use John The Ripper, observed how complexity of passwords affects cracking time and crackability. This lab showed some challenges with importing the correct cracking lists to John The Ripper, however, it underscored the critical importance of strong password policies and complexity.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 6 &#8211; File Permissions<\/p>\n\n\n\n<p>The File Permissions lab provided hands-on experience with file permissions in Linux, managing groups, and controlling access. By working through Linux groups, setting up shared directories, adjusting permissions, and experimenting on what those permissions changes user access to I learned the importance of proper permissions in controlling security and the structure of a Linux system.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 7 &#8211; Manage Local Storage<\/p>\n\n\n\n<p>This lab had me working with Linux storage devices, partitions, and file systems. I listed devices and partitions, attached and employed new virtual hard disks in VirtualBox, created primary partitions using &#8216;fdisk&#8217; command, formatted partitions with an &#8216;ext4&#8217; filesystem, mounted and unmounted storage devices, used &#8216;df&#8217; to check mounted filesystems, and gained understanding in what data is accessible before and after mounting partitions. This lab posed challenges while navigating the &#8216;fdisk&#8217;, however, it helped me learn how Linux handles local storage at a deeper level.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 8 &#8211; Shell Scripting<\/p>\n\n\n\n<p>This lab developed my rudimentary skills in writing basic shell scripts. I wrote and edited BASH scripts in VI, applied conditional logic using &#8216;if&#8217; statements, read user input with the &#8216;read&#8217; command, checked whether given names by user corresponded to existing files or directories, created new files through the script when they did not correspond, and managed script permissions as well as executed the scripts. I faced some challenges getting used to this new language syntax originally, but overall, it was a rewarding experience that strengthened my understanding of Linux automation and how BASH scripting is an important skill for cybersecurity professionals.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 9 &#8211; Task Automation<\/p>\n\n\n\n<p>This lab expanded upon the basic skill I built in BASH scripting by giving experience using BASH scripts and crontab to automate system tasks. I automated backups for a user directory which felt like a real task for a system administrator. Seeing my script that I wrote run automated in the background made the task automation concept feel much applied and powerful. Though I faced initial challenges learning how to make crontab run automatically with my script, I overcame them and developed understanding of how necessary automation is keeping a secure and organized system.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 10 &#8211; Networking Basics<\/p>\n\n\n\n<p>This lab was centered on subnetting, a basic foundation of networking and cybersecurity. Working through calculations between network addresses, broadcast addresses, first and last usable IP addresses, and maximum hosts gave me understanding on the structuring and division that networks have. Though subnetting was initially intimidating, is gave me understanding into why subnetting is essential in cybersecurity and networking.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>________________________________________________________________________________________________________________<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Lab 11 &#8211; Basic Network Configuration<\/p>\n\n\n\n<p>This lab showed me how to navigate and modify basic network settings in Linux and VMs. Working in both NAT and Bridged modes highlighted the differences between how a VM will interact with the network based on the different configurations. To understand these differences, I compared the results using commands like &#8216;ifconfig&#8217;, &#8216;route&#8217;, &#8216;netstat&#8217;, and &#8216;ping&#8217;. There were some challenges trying to understand the routing table and what each of the entries portrayed, however, this lab helped me stabilize my understanding of how Linux systems interact and connect with networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taking CYSE 270: Linux System for Cybersecurity was a foundational experience in both my growth and learning process as a Cybersecurity student. I had a basic, but underdeveloped understanding of Linux while entering this course, but through this semester, CYSE 270 pushed me to work hands-on with the operating system, enhancing both my technical skills&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nconsidine\/law-ethics\/\">Read More<\/a><\/div>\n","protected":false},"author":30970,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/pages\/93"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/users\/30970"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/pages\/93\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nconsidine\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}