Independent Study
This course provides a comprehensive introduction to Linux operating systems with a focus on its application in cybersecurity. Students will delve into the fundamental concepts of Linux, gaining practical skills and knowledge essential for securing Linux-based systems. Through hands-on labs, and interactive exercises, participants will learn how to navigate the Linux environment, manage users and permissions, configure networking settings, and implement security measures to protect against common cyber threats. ITSM 1423 is recommended; and familiarity with command-line interfaces and basic system administration tasks is recommended before enrollment.
An understanding of computer systems and networking concepts - - Must be completed prior to taking this course.
Faculty Contact Information
Please email rcooper@kcc.edu for support
Course Information
At the end of this course, students will be able to:
- Demonstrate proficiency in fundamental Linux concepts.
- Work effectively in the command line environment.
- Implement and configure Linux network services.
- Manage local and network storage.
- Manage group and user accounts.
- Implement security principles specific to Linux systems such as securing user accounts, configuring access controls, managing services securely.
- Configure firewalls to protect against common threats and vulnerabilities.
- Implement effective scripting and automation.
- Use various Linux security tools and utilities for tasks such as network scanning, intrusion detection, log analysis, forensics, and encryption.
- Perform network footprinting.
- Start, view and control system processes.
- Be better prepared to take industry certification exams.
- Distributions and key components
- Working at the command line
- Editing files
- Troubleshooting and getting help
- Managing group and user accounts
- Creating account security policies
- Securing files using Linux permissions
- Managing local and network storage
- Developing storage security policies
- Using crontab and at
- Writing scripts
- Using common automation tools
- Developing an automation security policy
- Networking basics and configuration
- Network services configuration
- Connecting to remote systems
- Developing a network security policy
- Starting, viewing, and controlling processes
- System logging
- Red Hat and Debian software management
- System booting
- Developing a software management security policy
- Footprinting
- Firewalls
- Intrusion detection
Linux Essential for Cybersecurity (etext) - Ucertify
The corresponding grading scale will be:
90-100% = A
80-89% = B
70-79% = C
60-69% = D
59% or lower = F
Business, Technology & Human Services
Dean, Paul Carlson; 815-802-8858; V105; pcarlson@kcc.edu; Division Office – W102; 815-802-8650
Week | Topics | Chapters | Assignments | Labs & In-Class Quizzes & Exams |
1 | Introducing Linux
Working on the Command Line
| Chapters 1 and 2 |
Read pages
Answer Chapter 1 review questions on page 12
Answer Chapter 2 review questions on page 41
| Quiz #1 covering Chapters 1 and 2
Do labs: 1.1 Installing CentOS 1.2 Installing Ubuntu 1.3 Installing Kali 2.1 Manage files 2.2 Using shell features 2.3 Compressing files
NOTE: If you are using the uCertify course and labs product, be sure to review the associated online labs for EACH chapter. Students can do these labs as homework or during class time for hands on practice to reinforce core learning objectives.
|
2 | Getting Help
Editing Files
When Things Go Wrong
| Chapters 3, 4, and 5 |
Read pages
Answer Chapter 3 review questions on page 51
Answer Chapter 4 review questions on page 66
Answer Chapter 5 review questions on page 79
| Quiz #2 covering Chapters 3, 4, and 5
Do labs: 3.1 Getting help with man 3.2 Getting help with info 4.1 Edit files with the vim editor 5.1 Troubleshooting Linux issues 5.2 Configuring user notifications |
3 | Managing Group Accounts
Managing User Accounts
| Chapters 6 and 7 |
Read pages
Answer Chapter 6 review questions on page 94
Answer Chapter 7 review questions on page 117
| Quiz #3 covering Chapters 6 and 7
Do labs: 6.1 Manage group accounts 6.2 Manage group administrators 7.1 Manage user accounts 7.2 Secure user accounts 7.3 Configure sudo |
4 | Develop an Account Security Policy
File Permissions
| Chapters 8 and 9 |
Read pages
Answer Chapter 8 review questions on pages 126-127
Answer Chapter 9 review questions on page 150
| Exam #1 covering Chapters 1 through 8
Do Labs: 8.1 Test the security of accounts 8.2 Develop an account security policy 9.1 Manage file permissions 9.2 Manage special permissions 9.3 Enable Access Control Lists 9.4 Manage file attributes 9.5 Monitor security issues with SELinux |
5 | Managing Local Storage: Essentials
| Chapter 10 | Read pages 152-182
Answer Chapter 10 review questions on pages 181-182
| Quiz #4 covering Chapter 10
Do labs: 11.1 Manage encrypted filesystems 11.2 Configure Logical Volumes 11.3 Administer disk quotas 11.4 Manage hard and soft links |
6 | Manage Local Storage: Advanced Features
| Chapter 11 |
Read pages
Answer Chapter 11 review questions on pages 212-213
| Quiz #5 covering Chapter 11
Do labs: 11.1 Manage encrypted filesystems 11.2 Configure Logical Volumes 11.3 Administer disk quotas 11.4 Manage hard and soft links |
7 | Manage Network Storage
Develop a Storage Security Policy
| Chapters 12 and 13 |
Read pages 214-251
Answer Chapter 12 review questions on pages 236-238
Answer Chapter 13 review questions on page 251
| Quiz #6 covering Chapters 12 and 13
Do Labs: 12.1 Configure Samba 12.2 Administer NFS 12.3 Manage iSCSI 13.1 Backup a filesystem 13.2 Develop a backup security policy |
8 | crontab and at
Scripting
Common Automation Tasks
Develop an Automation Security Policy
| Chapters 14 through 17 |
Read pages 254-285
Answer Chapter 14 review questions on page 263
Answer Chapter 15 review questions on page 275
Answer Chapter 16 review questions on page 281
Answer Chapter 17 review questions on page 285
| Exam #2 covering Chapters 9 through 13 Do labs: 14.1 Manage crontab 14.2 Configure at commands 15.1 Script project #1 15.2 Script project #2 15.3 Script project #3 15.4 Script project #4 17.1 Secure crontab and at 17.2 Create an automation security policy |
9 | Networking Basics
Network Configuration
| Chapters 18 and 19 |
Read pages 288-317 Answer Chapter 18 review questions on page 297
Answer Chapter 19 review questions on page 317
| Quiz #7 covering Chapters 18 and 19
Do labs: 18.1 Explore networking components 19.1 Configure networking on CentOS 19.2 Configure networking on Ubuntu |
10 | Network Service Configuration: Essential Services
| Chapter 20 |
Read pages 318-362 Answer Chapter 20 review questions on page 363
| Quiz #8 covering Chapter 20
Do labs: 20.1 Configure a BIND server 20.2 Configure a Postfix server 20.3 Administer procmail and Dovecot |
11 | Network Service Configuration: Web Services
| Chapter 21 | Read pages 364-393
Answer Chapter 21 review questions on pages 391-393
| Quiz #9 covering Chapter 21
Do labs: 21.1 Configure and administer an Apache server 21.2. Configure a proxy server |
12 | Connecting to Remote Systems
Develop a Network Security Policy
| Chapters 22 and 23 |
Read pages 394-437 Answer Chapter 22 review questions on pages 423-424
Answer Chapter 23 review questions on pages 436-437
| Exam #3 covering Chapters 14 through 21
Do labs: 22.1 Create an LDAP server 22.2 Configure a FTP server 22.3 Administer a SSH server 23.1 Administer kernel security parameters 23.2 Secure the system with TCP Wrappers 23.3 Configure Network Time Protocol 23.4 Create a networking security policy |
13 | Process Control
System Logging
| Chapters 24 and 25 |
Read pages 440-461 Answer Chapter 24 review questions on page 451
Answer Chapter 25 review questions on page 461
| Quiz #10 covering Chapters 24 and 25
Do labs: 24.1 Manage system processes 24.2 Display system information 25.1 Manage log files 25.1 Configure log rotation |
14 | Red Hat-Based Software Management
Debian-Based Software Management
| Chapters 26 and 27 |
Read pages 464-500 Answer Chapter 26 review questions on page 485
Answer Chapter 27 review questions on page 500
| Quiz #11 covering Chapters 26 and 27
Do labs: 26.1 Manage software packages with rpm 26.2 Manage software packages with yum 27.1 Manage software packages with dpkg 27.2 Manage software packages with apt |
15 | System Booting
Develop a Software Management Policy
Footprinting
| Chapters 28, 29, and 30 |
Read pages 502-559 Answer Chapter 28 review questions on page 532
Answer Chapter 29 review questions on page 541
Answer Chapter 30 review questions on page 559
| Quiz #12 covering Chapters 28, 29, and 30
Do labs: 28.1 Configure GRUB 28.2 Manage the startup process 29.1 Explore Common Vulnerabilities and Exposure reports 29.2 Manage and secure legacy services 30.1 Use probing tools 30.2 Scan the network |
16 | Firewalls
Intrusion Detection
Additional Security Tasks
| Chapters 31, 33, and 33 |
Read pages 560-592 Answer Chapter 31 review questions on page 571
Answer Chapter 32 review questions on page 579
Answer Chapter 33 review questions on page 592
| Exam #4 covering Chapters 22 through 33
Do labs: 31.1 Create a firewall to protect a system 31.2 Implement NAT 32.1 Scan the system to determine if it has been compromised 32.2 Use IDS Tools 33.1 Configure fail2ban 33.2 Implement a VPN 33.3 Encrypt files with gpg |
College Policies, Resources and Supports
For information related to the Student Code of Conduct Policy, Withdrawal Policy, Email Policy, and Non- Attendance/Non-Participation Policy, please review the college’s Code of Campus Affairs and Regulations webpage, which can be found at catalog.kcc.edu under the Academic Regulations & Conduct Guide.
KCC offers various academic and personal resources for all students. Many services are offered virtually, as well as in person. Please visit Student Resources - Kankakee Community College to access student resources services such as:
- Clubs and organizations
- Counseling and referral services
- Office of disability services
- Student complaint policy
- Transfer services
- Tutoring services, etc.
The materials on this course are only for the use of students enrolled in this course for purposes associated with this course. Further information regarding KCC's copyright policy is available at https://kcc.libguides.com/copyright.
|Course syllabus/calendar is subject to change.