{"id":409,"date":"2026-02-20T16:35:33","date_gmt":"2026-02-20T16:35:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/seconomos\/?page_id=409"},"modified":"2026-02-20T16:36:11","modified_gmt":"2026-02-20T16:36:11","slug":"cyse-270-linux-systems-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/seconomos\/cyse-270-linux-systems-for-cybersecurity\/","title":{"rendered":"CYSE 270 \u2013 Linux Systems for Cybersecurity"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote\">\n<h2 class=\"wp-block-heading\">Context<\/h2>\n\n\n\n<p>In CYSE 270, I built hands-on Linux skills that are directly used in cybersecurity environments. The labs focused on understanding storage at the command line (devices, partitions, filesystems, mounts) and using Bash scripting to automate checks and reduce human error. This mattered because it moved me from \u201cusing Linux\u201d to understanding how systems behave underneath the interface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact (Media)<\/h2>\n\n\n\n<p><strong><strong>Linux Storage Management Lab (PDF)<\/strong><\/strong> \u2013<strong> <\/strong>shows disk identification, partitioning, filesystem creation, and mounting\/verification. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/annotated-Assignment-7-Storage20Management.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-7-Storage20Management.\"><\/object><a id=\"wp-block-file--media-0159ee2a-28e6-4348-88a3-526ff2692df5\" href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/annotated-Assignment-7-Storage20Management.pdf\">annotated-Assignment-7-Storage20Management<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/annotated-Assignment-7-Storage20Management.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0159ee2a-28e6-4348-88a3-526ff2692df5\">Download<\/a><\/div>\n<\/blockquote>\n\n\n\n<p><strong>Bash Scripting Lab (PDF)<\/strong> \u2013 shows scripting logic (conditions\/checks) used to automate system tasks.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/annotated-Assignment-7-Storage20Management-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-7-Storage20Management-1.\"><\/object><a id=\"wp-block-file--media-6504ba12-1e56-4503-8c84-486747552501\" href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/annotated-Assignment-7-Storage20Management-1.pdf\">annotated-Assignment-7-Storage20Management-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/annotated-Assignment-7-Storage20Management-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6504ba12-1e56-4503-8c84-486747552501\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Reflection<\/h2>\n\n\n\n<p><strong>What role did I play and what actions did I take?<\/strong><br>I completed the labs independently and used command-line tools to configure and verify storage correctly. I also wrote scripts that checked files\/directories and returned reliable outputs using conditional logic.<\/p>\n\n\n\n<p><strong>What challenges did you face and how did you respond?<\/strong><br>The hardest part was catching small mistakes early (wrong device, wrong mount point, wrong permissions). I slowed down, validated each step, and built a habit of verifying outputs before moving forward.<\/p>\n\n\n\n<p><strong>What did you learn about yourself or your goals?<\/strong><br>I learned I work best when I follow repeatable procedures and confirm results instead of assuming they worked. This strengthened my interest in roles that involve system-level investigation and technical verification.<\/p>\n\n\n\n<p><strong>How does this connect to your professional development?<\/strong><br>Linux skills support real cybersecurity work like log review, incident response, server hardening, and analyzing compromised systems. This experience improved my confidence working in environments where precision matters and mistakes can create security risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Skills Connection (NACE)<\/h2>\n\n\n\n<ul>\n<li><strong>Technology \/ Technical Skills:<\/strong> Linux administration + scripting<\/li>\n\n\n\n<li><strong>Critical Thinking:<\/strong> troubleshooting, validation, and error prevention<\/li>\n\n\n\n<li><strong>Communication:<\/strong> documenting steps so the work is repeatable<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Bash Scripting Lab (PDF) \u2013 shows scripting logic (conditions\/checks) used to automate system tasks. Reflection What role did I play and what actions did I take?I completed the labs independently and used command-line tools to configure and verify storage correctly. I also wrote scripts that checked files\/directories and returned reliable outputs using conditional logic. What&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/cyse-270-linux-systems-for-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":29797,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages\/409"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/users\/29797"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages\/409\/revisions"}],"predecessor-version":[{"id":412,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages\/409\/revisions\/412"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/media?parent=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}