Lab 1 – Install Linux VM
This lab introduces me to setting up a Linux virtual machine. I learn how to install a Linux distribution and configure the environment so it runs correctly on my system. The process requires attention to detail, especially when following each step of the installation.
One challenge I face is making sure the virtual machine settings are correct, such as memory and storage allocation. I run into a few installation issues at first, but after going back through the steps and trying again, I am able to fix them.
This lab gives me a strong foundation for the rest of the course. It shows me how virtual machines are used in cybersecurity to safely practice and test different systems.
Lab 2 – Working with Command Line
This lab focuses on using the Linux command line. I learn basic commands for navigating directories, listing files, creating folders, and deleting files. It feels very different from using a graphical interface, so it takes some time to adjust.
At first, I struggle with remembering commands and their exact syntax. Even small mistakes cause errors, which slows me down. As I continue practicing, I start to feel more comfortable and confident using the command line.
This lab helps me understand how important the command line is in cybersecurity. It allows me to interact directly with the system and builds a skill that I will continue to use.
Lab 3 – Working with vi Editor
This lab introduces me to the vi editor in Linux. I learn how to open files, edit text, and switch between insert mode and command mode. The editor is confusing at first because it does not function like standard text editors.
One challenge I face is remembering how to save and exit files using commands. I spend time practicing commands like :w, :q, and :wq until they become easier to remember.
This lab helps me understand how system administrators edit files directly in the terminal. It is an important skill that connects to real world cybersecurity work.
Lab 4 – Group and User Management
This lab teaches me how to create and manage users and groups in Linux. I learn commands for adding users, modifying groups, and assigning access. It shows how systems control who can access certain resources.
I find it challenging to keep track of the different commands and understand how users and groups relate to each other. I make a few mistakes along the way, but correcting them helps me learn the process better.
This lab helps me understand access control and how it applies to cybersecurity. It connects to ideas like limiting access and managing users securely.
Lab 5 – Password Cracking
This lab introduces password security and password cracking techniques. I learn how weak passwords can be exploited using different tools and methods. It gives me a better understanding of how attackers approach systems.
The main challenge is understanding how the tools work and making sense of the results. It takes patience to follow each step and see how the process works.
This lab shows me the importance of strong passwords and security policies. It makes it clear why protecting login information is critical in cybersecurity.
Lab 6 – File Permissions
This lab focuses on file permissions in Linux. I learn how to view and change permissions using commands and how those permissions control access to files and directories.
One challenge is understanding the difference between numeric and symbolic formats. It takes practice to apply them correctly without making mistakes.
This lab helps me understand how systems protect information from unauthorized access. It is an important part of maintaining security on a system.
Lab 7 – Storage Management
This lab teaches me how to manage storage in Linux. I learn how to check disk space, create partitions, and work with file systems. It shows how data is organized and stored on a system.
I find it challenging to understand how all the storage components connect and work together. The commands require careful use, which makes me slow down and pay attention.
This lab shows me how important storage management is for system performance and organization. It is a useful skill for both system administration and cybersecurity.
Lab 8 – Shell Script
This lab introduces me to shell scripting. I learn how to write simple scripts that automate tasks in Linux. It feels like combining programming with system commands.
The challenge is understanding the syntax and fixing errors when the script does not run correctly. Debugging takes time, but it helps me understand how scripts work.
This lab shows me how automation can make tasks more efficient. It is a valuable skill that can be used in many areas of cybersecurity.
Lab 9 – Task Automation
This lab builds on scripting by focusing on automating tasks. I learn how to schedule jobs and run scripts automatically using tools like cron.
One challenge is making sure tasks are scheduled correctly and actually run when they are supposed to. Small mistakes can stop the automation from working.
This lab helps me see how automation is used to manage systems more efficiently. It reinforces how important it is to reduce manual work in cybersecurity.
Lab 10 – Networking Basics
This lab introduces basic networking concepts in Linux. I learn how to check network settings, test connectivity, and understand IP addresses.
The challenge is learning new terms and understanding how different parts of a network connect. It takes time to fully understand the concepts.
This lab gives me a foundation in networking, which is essential for cybersecurity. It helps me understand how systems communicate with each other.
Lab 11 – Basic Network Configuration
This lab focuses on configuring network settings in Linux. I learn how to assign IP addresses and adjust network configurations.
I find it challenging to make sure everything is set up correctly because small errors can cause connectivity problems. Troubleshooting becomes an important part of the process.
This lab teaches me how to manage network connections and keep systems running properly. It is an important skill for working in cybersecurity environments.