Course Objectives
• Introduce the basic concept and knowledge about different Linux distros, including the most popular distribution for cybersecurity, Kali Linux,
• Install and operate different Linux distros locally and remotely (on AWS cloud),
• Understand the ownership and permissions of the files and directories,
• Understand the shell scripts,
• Perform essential system administration functions, such as network configuration, process and log administration, and software management, and
• Perform security tasks, such as foot printing, firewalls, and tools about Intrusion
Detection.
Threat Detection Systems Paper

This essay presented most of my knowledge on threat detection systems, which are a key function in how cybersecurity professionals handle security and privacy of our everyday technologies. More specifically, ways to stop hackers from finding vulnerabilities within little breach holes in our technologies. This type of essay aids my career in cybersecurity by allowing me to critically think and organize research information in a coherent and effective manner.