ITSM 2433 Cyber Security With Linux Syllabus W01 Spring 2026

Credit Hours 3.00 Lecture Hours 2 Clinical/Lab Hours 2
Type of Credit
CIP Code
11.1006
Course Meeting Time

Independent Study

Course Description

This course provides a comprehensive introduction to Linux operating systems with a focus on its application in cybersecurity. Students will delve into the fundamental concepts of Linux, gaining practical skills and knowledge essential for securing Linux-based systems. Through hands-on labs, and interactive exercises, participants will learn how to navigate the Linux environment, manage users and permissions, configure networking settings, and implement security measures to protect against common cyber threats. ITSM 1423 is recommended; and familiarity with command-line interfaces and basic system administration tasks is recommended before enrollment.

Prerequisites

An understanding of computer systems and networking concepts - - Must be completed prior to taking this course.

Faculty Contact Information

Faculty Name
Ron Cooper
Faculty Email
Faculty Student Support Hours

Please email rcooper@kcc.edu for support

Course Information

Course Outcomes

At the end of this course, students will be able to:

  1. Demonstrate proficiency in fundamental Linux concepts.
  2. Work effectively in the command line environment.
  3. Implement and configure Linux network services.
  4. Manage local and network storage.
  5. Manage group and user accounts.
  6. Implement security principles specific to Linux systems such as securing user accounts, configuring access controls, managing services securely.
  7. Configure firewalls to protect against common threats and vulnerabilities.
  8. Implement effective scripting and automation.
  9. Use various Linux security tools and utilities for tasks such as network scanning, intrusion detection, log analysis, forensics, and encryption.
  10. Perform network footprinting.
  11. Start, view and control system processes.
  12. Be better prepared to take industry certification exams.
Topical Outline
  • Distributions and key components
  • Working at the command line
  • Editing files
  • Troubleshooting and getting help
  • Managing group and user accounts
  • Creating account security policies
  • Securing files using Linux permissions
  • Managing local and network storage
  • Developing storage security policies
  • Using crontab and at
  • Writing scripts
  • Using common automation tools
  • Developing an automation security policy
  • Networking basics and configuration
  • Network services configuration
  • Connecting to remote systems
  • Developing a network security policy
  • Starting, viewing, and controlling processes
  • System logging
  • Red Hat and Debian software management
  • System booting
  • Developing a software management security policy
  • Footprinting
  • Firewalls
  • Intrusion detection
Textbook/s and Course Materials

Linux Essential for Cybersecurity (etext) - Ucertify

Methods of Evaluation

The corresponding grading scale will be:
90-100% = A
80-89% = B
70-79% = C
60-69% = D
59% or lower = F

Academic Division

Business, Technology & Human Services

Dean, Paul Carlson; 815-802-8858; V105; pcarlson@kcc.edu; Division Office – W102; 815-802-8650

Course Calendar

Week

Topics

Chapters

Assignments

Labs & In-Class Quizzes & Exams

1

Introducing Linux

  • Parts of Linux
  • Major components
  • Distributions
  • Steps for installation

 

Working on the Command Line

  • Manage files and directories
  • Use shell features
  • Re-execute previous commands
  • Identify and use regular expressions
  • Manage file compression utilities

Chapters 1 and 2

 

Read pages 
4-41

 

Answer Chapter 1 review questions on page 12

 

Answer Chapter 2 review questions on page 41

 

Quiz #1 covering Chapters 1 and 2

 

Do labs:

1.1 Installing CentOS

1.2 Installing Ubuntu

1.3 Installing Kali

2.1 Manage files

2.2 Using shell features

2.3 Compressing files

 

NOTE: If you are using the uCertify course and labs product, be sure to review the associated online labs for EACH chapter. Students can do these labs as homework or during class time for hands on practice to reinforce core learning objectives.

 

2

Getting Help

  • Use command-line options
  • Get help with man or info pages
  • Use additional documentation to solve problems

 

Editing Files

  • Edit text using the vi editor
  • Learn about additional text editors

 

When Things Go Wrong

  • Diagnose system problems
  • Notify users of system issues

 

Chapters 3, 4, and 5

 

Read pages 
43-79

 

Answer Chapter 3 review questions on page 51

 

Answer Chapter 4 review questions on page 66

 

Answer Chapter 5 review questions on page 79

 

Quiz #2 covering Chapters 3, 4, and 5

 

Do labs:

3.1 Getting help with man

3.2 Getting help with info

4.1 Edit files with the vim editor

5.1 Troubleshooting Linux issues

5.2 Configuring user notifications

3

Managing Group Accounts

  • Understanding Linux groups
  • Manage groups
  • Understand User Private Groups
  • Create group administrators

 

Managing User Accounts

  • Understand user accounts
  • Manage users accounts
  • Understand network-based user accounts
  • Use su and sudo
  • Restrict user accounts using PAM

 

 

Chapters 6 and 7

 

Read pages
82-117

 

Answer Chapter 6 review questions on page 94

 

Answer Chapter 7 review questions on page 117

 

Quiz #3 covering Chapters 6 and 7

 

Do labs:

6.1 Manage group accounts

6.2 Manage group administrators

7.1 Manage user accounts

7.2 Secure user accounts

7.3 Configure sudo

4

Develop an Account Security Policy

  • Use Kali Linux to perform security probes
  • Create a security policy for user accounts

 

File Permissions

  • Standard Linux permissions
  • Special permissions for advanced security
  • Create an unmask value
  • Use access control lists
  • Use file attributes
  • Perform SELinux operations

Chapters 8 and 9

 

Read pages
118-150

 

Answer Chapter 8 review questions on pages 126-127

 

Answer Chapter 9 review questions on page 150

 

 

Exam #1 covering Chapters 1 through 8

 

Do Labs:

8.1 Test the security of accounts

8.2 Develop an account security policy

9.1 Manage file permissions

9.2 Manage special permissions

9.3 Enable Access Control Lists

9.4 Manage file attributes

9.5 Monitor security issues with SELinux

5

Managing Local Storage: Essentials

  • Create partitions and filesystems
  • Perform advanced filesystem manipulation
  • Mount partitions
  • Create and activate swap devices

 

Chapter 10

Read pages 152-182

 

Answer Chapter 10 review questions on pages 181-182

 

Quiz #4 covering Chapter 10

 

Do labs:

11.1 Manage encrypted filesystems

11.2 Configure Logical Volumes

11.3 Administer disk quotas

11.4 Manage hard and soft links

6

Manage Local Storage: Advanced Features

  • Create and mount encrypted filesystems
  • Manage autofs
  • Manage logical volumes
  • Set up disk quotas
  • Manage hard and soft links

Chapter 11

 

Read pages
184-213

 

 

Answer Chapter 11 review questions on pages 212-213

 

Quiz #5 covering Chapter 11

 

Do labs:

11.1 Manage encrypted filesystems

11.2 Configure Logical Volumes

11.3 Administer disk quotas

11.4 Manage hard and soft links

7

Manage Network Storage

  • Samba shares
  • NFS shares
  • Share storage locations via iSCSI
  • Use an iSCSI resource on a client system

 

Develop a Storage Security Policy

  • Develop a security plan for storage devices
  • Create a backup strategy
  • Use backup utilities

 

Chapters 12 and 13

 

Read pages 214-251

 

 

Answer Chapter 12 review questions on pages 236-238

 

Answer Chapter 13 review questions on page 251

 

Quiz #6 covering Chapters 12 and 13



 

Do Labs:

12.1 Configure Samba

12.2 Administer NFS

12.3 Manage iSCSI

13.1 Backup a filesystem

13.2 Develop a backup security policy

8

crontab and at

  • Set up and administer user crontab tables
  • Configure the at command
  • Secure crontab and at commands

 

Scripting

  • Describe features of different scripting languages
  • Read and create BASH scripts

 

Common Automation Tasks

  • Plan common automation tasks

 

Develop an Automation Security Policy

  • Create a security policy for the use of crontab and at
  • Create a security policy for BASH scripts

 

Chapters 14 through 17

 

Read pages 254-285

 

 

Answer Chapter 14 review questions on page 263

 

Answer Chapter 15 review questions on page 275

 

Answer Chapter 16 review questions on page 281

 

Answer Chapter 17 review questions on page 285

 

Exam #2 covering Chapters 9 through 13

Do labs:

14.1 Manage crontab

14.2 Configure at commands

15.1 Script project #1

15.2 Script project #2

15.3 Script project #3

15.4 Script project #4

17.1 Secure crontab and at

17.2 Create an automation security policy

9

Networking Basics

  • Networking terminology
  • Network addresses
  • Subnetting
  • Common network ports
  • IPv4 vs. IPv6
  • Common network protocols

 

Network Configuration

  • Configure network devices
  • Define network routes
  • Troubleshoot networks
  • Configure wireless network devices

 

Chapters 18 and 19

 

Read pages 288-317

 

Answer Chapter 18 review questions on page 297

 

Answer Chapter 19 review questions on page 317

 

Quiz #7 covering Chapters 18 and 19

 

Do labs:

18.1 Explore networking components

19.1 Configure networking on CentOS

19.2 Configure networking on Ubuntu

10

Network Service Configuration: Essential Services

  • Configure and secure a BIND DNS server
  • Set up a DHCP server
  • Key email features
  • Configure a Postfix server
  • Configure email delivery software

 

 

Chapter 20

 

Read pages 318-362

 

Answer Chapter 20 review questions on page 363

 

 

Quiz #8 covering Chapter 20

 

Do labs:

20.1 Configure a BIND server

20.2 Configure a Postfix server

20.3 Administer procmail and Dovecot

11

Network Service Configuration: Web Services

  • Configure an Apache Web Server
  • Enable security features on Apache Web Servers
  • Configure a proxy server

 

Chapter 21

Read pages 364-393

 

Answer Chapter 21 review questions on pages 391-393

 

Quiz #9 covering Chapter 21

 

Do labs:

21.1 Configure and administer an Apache server

21.2. Configure a proxy server

12

Connecting to Remote Systems

  • Configure an LDAP server
  • Define values in an LDAP server
  • Connect a client to an LDAP server
  • Configure and connect to an FTP server
  • Establish secure connections via SSH

 

Develop a Network Security Policy

  • Modify kernel parameters
  • Implement TCP wrappers
  • Configure the system time manually
  • Configure the system to use an NTP server

 

Chapters 22 and 23

 

Read pages 394-437

 

Answer Chapter 22 review questions on pages 423-424

 

Answer Chapter 23 review questions on pages 436-437

 

Exam #3 covering Chapters 14 through 21

 

 

Do labs:

22.1 Create an LDAP server

22.2 Configure a FTP server

22.3 Administer a SSH server

23.1 Administer kernel security parameters

23.2 Secure the system with TCP Wrappers

23.3 Configure Network Time Protocol

23.4 Create a networking security policy

13

Process Control

  • Start and stop processes and jobs
  • List running processes and jobs
  • Change process priority
  • Display CPU and RAM information

 

System Logging

  • View system logs
  • Configure syslog to create custom log entries
  • Rotate older log files
  • View journald logs
  • Customize journald

Chapters 24 and 25

 

Read pages 440-461

 

Answer Chapter 24 review questions on page 451

 

Answer Chapter 25 review questions on page 461

 

Quiz #10 covering Chapters 24 and 25



 

Do labs:

24.1 Manage system processes

24.2 Display system information

25.1 Manage log files

25.1 Configure log rotation

14

Red Hat-Based Software Management

  • View package information with rpm and yum
  • Install software packages
  • Delete software packages
  • Perform advanced package management

 

Debian-Based Software Management

  • View, install, and remove packages using dpkg
  • Create software sources for APT commands
  • View, install, and remove packages using APT commands

 

  •  

Chapters 26 and 27

 

Read pages 464-500

 

Answer Chapter 26 review questions on page 485

 

Answer Chapter 27 review questions on page 500

 

Quiz #11 covering Chapters 26 and 27

 

Do labs:

26.1 Manage software packages with rpm

26.2 Manage software packages with yum

27.1 Manage software packages with dpkg

27.2 Manage software packages with apt

15

System Booting

  • The boot process
  • Configure Legacy GRUB and GRUB 2
  • Modify key kernel components
  • Load and unload kernel modules
  • Modify services that are enabled at boot

 

Develop a Software Management Policy

  • Read CVE to discover vulnerabilities
  • Use distribution resources
  • Configure and secure legacy services

 

Footprinting

  • Use probing tools such as nmap
  • Scan the local network

 

 

Chapters 28, 29, and 30

 

Read pages 502-559

 

Answer Chapter 28 review questions on page 532

 

Answer Chapter 29 review questions on page 541

 

Answer Chapter 30 review questions on page 559

 

Quiz #12 covering Chapters 28, 29, and 30

 

Do labs:

28.1 Configure GRUB

28.2 Manage the startup process

29.1 Explore Common Vulnerabilities and Exposure reports

29.2 Manage and secure legacy services

30.1 Use probing tools

30.2 Scan the network

16

Firewalls

  • Firewall components
  • Create a firewall
  • Block access to external systems
  • Configure NAT

 

Intrusion Detection

  • Determine if a network has been compromised
  • Determine if key system files have been compromised
  • Additional IDS tools and techniques

 

Additional Security Tasks

  • Configure fail2ban
  • Set up a VPN
  • Encrypt files using gpg
  • Use security sites to get information

Chapters 31, 33, and 33

 

Read pages 560-592

 

Answer Chapter 31 review questions on page 571

 

Answer Chapter 32 review questions on page 579

 

Answer Chapter 33 review questions on page 592

 

Exam #4 covering Chapters 22 through 33

 

Do labs:

31.1 Create a firewall to protect a system

31.2 Implement NAT

32.1 Scan the system to determine if it has been compromised

32.2 Use IDS Tools

33.1 Configure fail2ban

33.2 Implement a VPN

33.3 Encrypt files with gpg

College Policies, Resources and Supports

College Policies

For information related to the Student Code of Conduct Policy, Withdrawal Policy, Email Policy, and Non- Attendance/Non-Participation Policy, please review the college’s Code of Campus Affairs and Regulations webpage, which can be found at catalog.kcc.edu under the Academic Regulations & Conduct Guide. 

Resources

KCC offers various academic and personal resources for all students. Many services are offered virtually, as well as in person. Please visit Student Resources - Kankakee Community College to access student resources services such as:

  • Clubs and organizations
  • Counseling and referral services
  • Office of disability services
  • Student complaint policy
  • Transfer services
  • Tutoring services, etc.