{"id":442,"date":"2025-04-07T21:42:12","date_gmt":"2025-04-07T21:42:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/stevenday\/?page_id=442"},"modified":"2025-04-07T21:46:11","modified_gmt":"2025-04-07T21:46:11","slug":"linux-system-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/stevenday\/cybersecurity-fundamentals\/linux-system-for-cybersecurity\/","title":{"rendered":"LINUX SYSTEM FOR CYBERSECURITY"},"content":{"rendered":"\n<p>This course introduced foundational Linux concepts and tools essential for cybersecurity and digital forensics professionals. Through a combination of hands-on labs, quizzes, and scripting activities, I gained practical experience with Linux command-line environments, user account management, file systems, and process control.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Course Modules and Key Topics:<\/strong><\/h4>\n\n\n\n<p><strong>\ud83d\udd39 Module 1: Introduction to Linux and Command Line (Week 1)<\/strong><\/p>\n\n\n\n<ul>\n<li>Gained a foundational understanding of Linux operating systems and their role in cybersecurity.<\/li>\n\n\n\n<li>Installed and configured Linux in a virtualized environment.<\/li>\n\n\n\n<li>Explored the Linux terminal interface and basic shell commands to navigate the file system and manage processes.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83d\udd39 Week 2\u20133: User and Group Accounts, Security Policies<\/strong><\/p>\n\n\n\n<ul>\n<li>Learned to manage user and group accounts to enforce system access control.<\/li>\n\n\n\n<li>Explored Linux security policies, password hashing techniques, and account hardening strategies.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83d\udd39 Module 3: File and Data Storage (Week 4)<\/strong><\/p>\n\n\n\n<ul>\n<li>Studied Linux file permissions and access controls.<\/li>\n\n\n\n<li>Developed skills in reading, modifying, and securing file systems\u2014an essential competency for digital investigations.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83d\udd39 Module 4: Automation and Scripting (Weeks 5\u20136)<\/strong><\/p>\n\n\n\n<ul>\n<li>Created and executed shell scripts using the <code>vi<\/code> editor to automate repetitive tasks.<\/li>\n\n\n\n<li>Used <code>crontab<\/code> to schedule jobs, demonstrating the automation of system monitoring and maintenance.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83d\udd39 Module 7: Software &amp; Process Management<\/strong><\/p>\n\n\n\n<ul>\n<li>Managed Linux software using <code>dpkg<\/code> and <code>apt-get<\/code> package managers.<\/li>\n\n\n\n<li>Monitored and controlled active processes using utility commands, an important skill for both forensic triage and system defense.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83d\udd39 Final Review &amp; Assessment<\/strong><\/p>\n\n\n\n<ul>\n<li>Reviewed core Linux commands and concepts in preparation for a comprehensive final exam.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Skills Developed:<\/strong><\/h4>\n\n\n\n<ul>\n<li>Proficiency in using the Linux command line for system navigation and administration.<\/li>\n\n\n\n<li>Understanding of user and permission management for security enforcement.<\/li>\n\n\n\n<li>Basic shell scripting and job automation for cybersecurity tasks.<\/li>\n\n\n\n<li>Process and package management using standard Linux utilities.<\/li>\n\n\n\n<li>Application of Linux in digital forensics and system hardening scenarios.<\/li>\n<\/ul>\n\n\n\n<p>A few of my samples of these labs are below:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/PasswordCracking.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of PasswordCracking.\"><\/object><a id=\"wp-block-file--media-8b4d25c4-b814-4fad-b9a2-c0c011ed50be\" href=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/PasswordCracking.pdf\">PasswordCracking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/PasswordCracking.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8b4d25c4-b814-4fad-b9a2-c0c011ed50be\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/FilePermissions.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of FilePermissions.\"><\/object><a id=\"wp-block-file--media-3d9629fa-9534-4d5b-9c40-a0a8066840bb\" href=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/FilePermissions.pdf\">FilePermissions<\/a><a href=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/FilePermissions.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3d9629fa-9534-4d5b-9c40-a0a8066840bb\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/Shell-Scripting-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Shell-Scripting-.\"><\/object><a id=\"wp-block-file--media-0d0e9dbd-9ea4-4ab2-b14d-a4747b13e4c4\" href=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/Shell-Scripting-.pdf\">Shell-Scripting-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/stevenday\/wp-content\/uploads\/sites\/27734\/2025\/04\/Shell-Scripting-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0d0e9dbd-9ea4-4ab2-b14d-a4747b13e4c4\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course introduced foundational Linux concepts and tools essential for cybersecurity and digital forensics professionals. Through a combination of hands-on labs, quizzes, and scripting activities, I gained practical experience with Linux command-line environments, user account management, file systems, and process control. Course Modules and Key Topics: \ud83d\udd39 Module 1: Introduction to Linux and Command Line&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/stevenday\/cybersecurity-fundamentals\/linux-system-for-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":23014,"featured_media":0,"parent":95,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/442"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/users\/23014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/comments?post=442"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/442\/revisions"}],"predecessor-version":[{"id":447,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/442\/revisions\/447"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/95"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/media?parent=442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}