Course Objectives
- Introduce the basic concept and knowledge about different Linux distros, including the most popular distribution for cybersecurity, Kali Linux.
- Install and operate different Linux distros locally and remotely (on AWS cloud).
- Understand the ownership and permissions of the files and directories.
- Understand the shell scripts.
- Perform essential system administration functions, such as network configuration, process and
log administration, and software management. - Perform security tasks, such as footprinting, firewalls, and tools in relation to Intrusion
Detection.
Reflection: At the end of this course, I can confidently say that I have gained a sufficient understanding of the Linux operating system. While I did not work with Kali Linux specifically, I did get very comfortable with Ubuntu Linux and utilizing a virtual machine for the work for my assignments. From this course, I learned ownership and permission features for files and directories, worked with shell scripts in both the vi text editor and crontab, utilized Linux’s user and group management features, and even emulated what a brute-force attack could look like through a Linux application. In short, this course was a fun, enlightening experience of Linux and the many features and applications it offers.
Work I’ve done: