{"id":141,"date":"2025-09-15T18:24:04","date_gmt":"2025-09-15T18:24:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-04-30T20:06:09","modified_gmt":"2026-04-30T20:06:09","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/orionpeacock\/cyse-300\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<p><strong>Lab 1 \u2013 Install Linux VM<\/strong><br>This lab introduces me to setting up a Linux virtual machine. I learn how to install a Linux distribution and configure the environment so it runs correctly on my system. The process requires attention to detail, especially when following each step of the installation.<br>One challenge I face is making sure the virtual machine settings are correct, such as memory and storage allocation. I run into a few installation issues at first, but after going back through the steps and trying again, I am able to fix them.<br>This lab gives me a strong foundation for the rest of the course. It shows me how virtual machines are used in cybersecurity to safely practice and test different systems.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 2 \u2013 Working with Command Line<\/strong><br>This lab focuses on using the Linux command line. I learn basic commands for navigating directories, listing files, creating folders, and deleting files. It feels very different from using a graphical interface, so it takes some time to adjust.<br>At first, I struggle with remembering commands and their exact syntax. Even small mistakes cause errors, which slows me down. As I continue practicing, I start to feel more comfortable and confident using the command line.<br>This lab helps me understand how important the command line is in cybersecurity. It allows me to interact directly with the system and builds a skill that I will continue to use.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 3 \u2013 Working with vi Editor<\/strong><br>This lab introduces me to the vi editor in Linux. I learn how to open files, edit text, and switch between insert mode and command mode. The editor is confusing at first because it does not function like standard text editors.<br>One challenge I face is remembering how to save and exit files using commands. I spend time practicing commands like :w, :q, and :wq until they become easier to remember.<br>This lab helps me understand how system administrators edit files directly in the terminal. It is an important skill that connects to real world cybersecurity work.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 4 \u2013 Group and User Management<\/strong><br>This lab teaches me how to create and manage users and groups in Linux. I learn commands for adding users, modifying groups, and assigning access. It shows how systems control who can access certain resources.<br>I find it challenging to keep track of the different commands and understand how users and groups relate to each other. I make a few mistakes along the way, but correcting them helps me learn the process better.<br>This lab helps me understand access control and how it applies to cybersecurity. It connects to ideas like limiting access and managing users securely.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 5 \u2013 Password Cracking<\/strong><br>This lab introduces password security and password cracking techniques. I learn how weak passwords can be exploited using different tools and methods. It gives me a better understanding of how attackers approach systems.<br>The main challenge is understanding how the tools work and making sense of the results. It takes patience to follow each step and see how the process works.<br>This lab shows me the importance of strong passwords and security policies. It makes it clear why protecting login information is critical in cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 6 \u2013 File Permissions<\/strong><br>This lab focuses on file permissions in Linux. I learn how to view and change permissions using commands and how those permissions control access to files and directories.<br>One challenge is understanding the difference between numeric and symbolic formats. It takes practice to apply them correctly without making mistakes.<br>This lab helps me understand how systems protect information from unauthorized access. It is an important part of maintaining security on a system.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 7 \u2013 Storage Management<\/strong><br>This lab teaches me how to manage storage in Linux. I learn how to check disk space, create partitions, and work with file systems. It shows how data is organized and stored on a system.<br>I find it challenging to understand how all the storage components connect and work together. The commands require careful use, which makes me slow down and pay attention.<br>This lab shows me how important storage management is for system performance and organization. It is a useful skill for both system administration and cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 8 \u2013 Shell Script<\/strong><br>This lab introduces me to shell scripting. I learn how to write simple scripts that automate tasks in Linux. It feels like combining programming with system commands.<br>The challenge is understanding the syntax and fixing errors when the script does not run correctly. Debugging takes time, but it helps me understand how scripts work.<br>This lab shows me how automation can make tasks more efficient. It is a valuable skill that can be used in many areas of cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 9 \u2013 Task Automation<\/strong><br>This lab builds on scripting by focusing on automating tasks. I learn how to schedule jobs and run scripts automatically using tools like cron.<br>One challenge is making sure tasks are scheduled correctly and actually run when they are supposed to. Small mistakes can stop the automation from working.<br>This lab helps me see how automation is used to manage systems more efficiently. It reinforces how important it is to reduce manual work in cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 10 \u2013 Networking Basics<\/strong><br>This lab introduces basic networking concepts in Linux. I learn how to check network settings, test connectivity, and understand IP addresses.<br>The challenge is learning new terms and understanding how different parts of a network connect. It takes time to fully understand the concepts.<br>This lab gives me a foundation in networking, which is essential for cybersecurity. It helps me understand how systems communicate with each other.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Lab 11 \u2013 Basic Network Configuration<\/strong><br>This lab focuses on configuring network settings in Linux. I learn how to assign IP addresses and adjust network configurations.<br>I find it challenging to make sure everything is set up correctly because small errors can cause connectivity problems. Troubleshooting becomes an important part of the process.<br>This lab teaches me how to manage network connections and keep systems running properly. It is an important skill for working in cybersecurity environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lab 1 \u2013 Install Linux VMThis lab introduces me to setting up a Linux virtual machine. I learn how to install a Linux distribution and configure the environment so it runs correctly on my system. The process requires attention to detail, especially when following each step of the installation.One challenge I face is making sure&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/orionpeacock\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":31443,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/users\/31443"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/pages\/141\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}