{"id":347,"date":"2023-11-13T22:34:40","date_gmt":"2023-11-13T22:34:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tk001\/?page_id=347"},"modified":"2025-04-24T03:33:33","modified_gmt":"2025-04-24T03:33:33","slug":"cyse-270","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tk001\/it-cyse-200t\/cyse-270\/","title":{"rendered":"CYSE 270"},"content":{"rendered":"\n<p class=\"has-text-align-center has-large-font-size\">Linux Systems for Cybersecurity<\/p>\n\n\n\n<p><strong>Course Description:<\/strong><\/p>\n\n\n\n<p>This course introduces the basic operations in major Linux distros for cybersecurity using both graphical and command-line interfaces. I learned about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems.<\/p>\n\n\n\n<p>The course achieved its goal of introducing basic linux operations through using virtual machines such as Ubuntu and Kali-Linux. Throughout the semester, I was able to learn and practice key linux components through the modules that focused on:<\/p>\n\n\n\n<p>Module 1. Introducing Linux<br>\u2022 Distributions and Key components \u2022 Command line<br>\u2022 Accessing resources on AWS cloud<br>Module 2. User and Group Accounts<br>\u2022 Managing Group Accounts<br>\u2022 Managing User Accounts<br>\u2022 Develop an Account Security Policy<br>Module 3. File and Data Storage<br>\u2022 File Permissions<br>\u2022 Manage Local Storage: Essentials<br>Module 4. Automation<br>\u2022 Shell scripting<br>\u2022 Common Automation Tasks<br>Module 5. System Administration<br>\u2022 Process and Log Administration<br>\u2022 Networking<br>Module 6. Security Tasks<br>\u2022 Foot printing<br>\u2022 Firewalls<br>\u2022 Intrusion Detection<\/p>\n\n\n\n<p>Overall, the course introduces foundational linux elements that can be translated and used in modern day advanced technology such as Amazon Web Services or Google Cloud Platform. The course deliberately applies each lesson with relevant exercises to that frequently calls back to previous modules to complete the assignments. CYSE 270 is a necessary course for cyber security students searching for foundational elements within the cyber world. <\/p>\n\n\n\n<p><strong>Example Assignments:<\/strong><\/p>\n\n\n\n<p>     <strong>Assignment 1: beginning of course<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"511\" src=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image.png\" alt=\"Screenshot image of assignment 1 using an Ubuntu virtual machine with the echo command, date command, ls command, and pwd command.\" class=\"wp-image-360\" srcset=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image.png 975w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-300x157.png 300w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-768x403.png 768w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-572x300.png 572w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>     <strong>Assignment 8: Middle of course<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"459\" src=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-1.png\" alt=\"first screenshot image assignment 8 using a linux terminal virtual machine using a lucky number script.\" class=\"wp-image-361\" srcset=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-1.png 975w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-1-300x141.png 300w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-1-768x362.png 768w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-1-600x282.png 600w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n<\/figure>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"468\" data-id=\"363\" src=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-3.png\" alt=\"2nd screenshot image of assignment 8 using an Linux virtual machine to write a bash script.\" class=\"wp-image-363\" srcset=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-3.png 975w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-3-300x144.png 300w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-3-768x369.png 768w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-3-600x288.png 600w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"463\" data-id=\"364\" src=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-4.png\" alt=\"3rd screenshot image of assignment 8 using a linux virtual machine using the update bash script and receiving a thank you message followed by the student ID after imputing the student midas ID.\" class=\"wp-image-364\" srcset=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-4.png 975w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-4-300x142.png 300w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-4-768x365.png 768w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-4-600x285.png 600w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>   <\/p>\n\n\n\n<p>      <strong> Week 15: End of Course<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"670\" src=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-5.png\" alt=\"first screenshot image of assignment 15 using an ubuntu virtual machine using the ps, ps -f, and ps -e commands and their outputs.\" class=\"wp-image-365\" srcset=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-5.png 975w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-5-300x206.png 300w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-5-768x528.png 768w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-5-437x300.png 437w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"671\" data-id=\"370\" src=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-8.png\" alt=\"second screenshot of assignment 15 using ubuntu virtual machine with the command sudo cd sources.list sources.list.bk command highlighted and its output, The sudo cp sources.list.bk \/etc\/apt\/sources\/list command highlighted and its output, and the sudo apt install sl command highlighted and its output.\" class=\"wp-image-370\" srcset=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-8.png 975w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-8-300x206.png 300w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-8-768x529.png 768w, https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2023\/12\/image-8-436x300.png 436w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux Systems for Cybersecurity Course Description: This course introduces the basic operations in major Linux distros for cybersecurity using both graphical and command-line interfaces. I learned about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems. The course achieved its goal of introducing basic linux operations through using&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tk001\/it-cyse-200t\/cyse-270\/\">Read More<\/a><\/div>\n","protected":false},"author":24905,"featured_media":0,"parent":91,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/347"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/users\/24905"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/347\/revisions"}],"predecessor-version":[{"id":561,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/347\/revisions\/561"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/media?parent=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}