LINUX SYSTEM FOR CYBERSECURITY

This course introduced foundational Linux concepts and tools essential for cybersecurity and digital forensics professionals. Through a combination of hands-on labs, quizzes, and scripting activities, I gained practical experience with Linux command-line environments, user account management, file systems, and process control.

Course Modules and Key Topics:

🔹 Module 1: Introduction to Linux and Command Line (Week 1)

  • Gained a foundational understanding of Linux operating systems and their role in cybersecurity.
  • Installed and configured Linux in a virtualized environment.
  • Explored the Linux terminal interface and basic shell commands to navigate the file system and manage processes.

🔹 Week 2–3: User and Group Accounts, Security Policies

  • Learned to manage user and group accounts to enforce system access control.
  • Explored Linux security policies, password hashing techniques, and account hardening strategies.

🔹 Module 3: File and Data Storage (Week 4)

  • Studied Linux file permissions and access controls.
  • Developed skills in reading, modifying, and securing file systems—an essential competency for digital investigations.

🔹 Module 4: Automation and Scripting (Weeks 5–6)

  • Created and executed shell scripts using the vi editor to automate repetitive tasks.
  • Used crontab to schedule jobs, demonstrating the automation of system monitoring and maintenance.

🔹 Module 7: Software & Process Management

  • Managed Linux software using dpkg and apt-get package managers.
  • Monitored and controlled active processes using utility commands, an important skill for both forensic triage and system defense.

🔹 Final Review & Assessment

  • Reviewed core Linux commands and concepts in preparation for a comprehensive final exam.

Skills Developed:

  • Proficiency in using the Linux command line for system navigation and administration.
  • Understanding of user and permission management for security enforcement.
  • Basic shell scripting and job automation for cybersecurity tasks.
  • Process and package management using standard Linux utilities.
  • Application of Linux in digital forensics and system hardening scenarios.

A few of my samples of these labs are below: