CYSE 270

CYSE 270: Linux Fundamental

Course Description

CYSE 270 is an in-depth course designed to introduce students to the Linux operating system, with a focus on its use in cybersecurity and system administration. This course provides a hands-on approach to learning Linux commands, security configurations, networking, and scripting. Through practical labs, students gain experience working with Kali Linux and Ubuntu, two widely used distributions in the cybersecurity field.

Key Topics Covered

Linux Basics & Command Line Interface (CLI) – Navigating the Linux terminal, executing essential commands, and managing processes.
File System & Permissions – Understanding Linux file structures, directory permissions, and symbolic links.
User & Group Administration – Managing users, groups, and implementing access control.
Networking & Security – Configuring network interfaces, troubleshooting connectivity, and using Linux security tools.
System Hardening & Firewalls – Implementing security best practices, configuring UFW & IPTables, and securing SSH.
Bash Scripting & Automation – Writing and executing scripts for system management and security monitoring.
Process & Service Management – Monitoring system performance, managing services, and analyzing logs.

Skills Acquired

🔹 Proficiency in using Kali Linux and Ubuntu for security and system administration tasks.
🔹 Hands-on experience with Linux file systems, user management, and permissions.
🔹 Strong understanding of networking principles and security best practices in Linux environments.
🔹 Ability to write Bash scripts for automation and system monitoring.
🔹 Experience with firewall configuration, secure remote access (SSH), and log analysis.

Tools & Technologies Used

  • Linux Distributions: Kali Linux, Ubuntu
  • Bash Shell – Scripting and automation
  • VI/Vim & Nano – Text editors
  • SSH (Secure Shell) – Remote system management
  • UFW & IPTables – Firewall configuration
  • Cron Jobs – Task automation
  • Syslog & Journalctl – Log management

Projects & Labs Completed

📌 Linux User & Permissions Management (Ubuntu/Kali) – Created and managed user accounts, assigned file permissions, and enforced security policies.
📌 Network Configuration & Troubleshooting – Configured IP addresses, diagnosed network issues using tools like ping, netstat, traceroute, and analyzed traffic logs.
📌 Bash Scripting Challenge – Developed a script for automated backups and system log monitoring.
📌 System Hardening Project (Kali Linux & Ubuntu) – Implemented security measures such as SSH hardening, disabling unnecessary services, and setting up firewall rules.

Personal Reflection

This course provided valuable hands-on experience with Linux, enhancing my skills in cybersecurity, networking, and automation. Working with Kali Linux and Ubuntu gave me practical exposure to real-world security environments, reinforcing my ability to manage Linux systems securely and efficiently. These skills directly align with my career goals in cybersecurity, threat detection, and IT security operations.