Lab 1 – Introduction to Linux Environment
This lab introduced me to the Linux environment and basic command-line navigation. I learned how to use commands such as ls, cd, and pwd to move through the file system and understand directory structures. Initially, adjusting to a command-line interface was challenging since I was more familiar with graphical interfaces. One difficulty I faced was remembering the commands and their functions, but with practice, I became more comfortable. Overall, this lab provided a strong foundation in Linux, which is essential for cybersecurity work.
Lab 2 – File and Directory Management
In this lab, I worked on creating, copying, moving, and deleting files and directories using commands like cp, mv, rm, and mkdir. This helped reinforce my understanding of file system organization. A challenge I encountered was being cautious with deletion commands, as mistakes can easily remove important files. This lab improved my ability to manage files efficiently, which is an important skill in maintaining secure systems.
Lab 3 – VI Editor
This lab focused on using the VI editor to create and modify files directly in the terminal. I learned how to switch between insert mode and command mode, as well as how to save and exit files. Initially, the editor was difficult to use because it operates differently from standard text editors. Remembering commands required practice. Overall, this lab helped me understand how system administrators edit configuration files, which is an important cybersecurity skill.
Lab 4 – User and Group Accounts
In this lab, I learned how to create and manage user and group accounts using commands such as useradd, passwd, and groupadd. The most challenging part was understanding how permissions are applied across users and groups. This lab emphasized the importance of access control and user management in securing systems.
Lab 5 – File Permissions and Ownership
This lab focused on setting file permissions and ownership using chmod and chown. I learned how to control access to files by assigning read, write, and execute permissions. The numeric permission system was initially difficult to understand, but repeated practice helped me become more confident. This lab highlighted how critical permissions are in protecting sensitive data and maintaining system security.
Lab 6 – Process Management
In this lab, I explored how to monitor and manage system processes using commands such as ps, top, and kill. One challenge was understanding how background processes work and how to properly terminate them using process IDs. This lab improved my understanding of how operating systems handle tasks and how to manage processes effectively.
Lab 7 – Package Management
This lab introduced package management and software installation using tools like apt. I learned how to install, update, and remove software packages. The main challenge was understanding dependencies and ensuring installations completed correctly. This lab reinforced the importance of keeping systems updated to reduce security vulnerabilities.
Lab 8 – Networking Basics
In this lab, I learned basic networking commands such as ping, netstat, and ifconfig. These tools helped me understand how devices communicate over a network. Interpreting the output of these commands was initially challenging. This lab provided a foundational understanding of networking, which is essential for cybersecurity.
Lab 9 – Network Configuration
This lab focused on analyzing and configuring network settings. I used commands to view IP addresses, routing tables, and active connections. The most difficult part was understanding how routing works and how different components interact. This lab strengthened my ability to troubleshoot network issues and understand system connectivity.
Lab 10 – Subnetting
This lab focused on understanding and applying subnetting concepts, including calculating network address, broadcast address, first and last usable IPs, and the number of available hosts. I also worked with converting IP addresses and subnet masks into binary to better understand how subnetting works. The most challenging part was correctly identifying subnet ranges and block sizes, especially with different subnet masks like /28 and /26. It required careful step-by-step calculations to avoid errors. Overall, this lab improved my understanding of IP addressing and subnetting, which are important skills for networking and cybersecurity.
Lab 11 – Basic Network Configurations
This lab involved configuring a virtual machine in NAT mode and analyzing network configurations using commands such as ifconfig, route, netstat, and ping. One challenge was ensuring the virtual machine was properly connected and interpreting the results of each command. This lab reinforced my understanding of networking concepts and how to verify connectivity and troubleshoot issues.
Resume
https://docs.google.com/document/d/1XNYl5pdJBNzbOo1vnN2iFeZrPr80nNs5c4uIdkYGlAw/edit?tab=t.0
Professional Goals
After graduation, I plan to pursue a career in cybersecurity, with a focus on areas such as network security or security analysis. I am interested in working in an environment where I can apply my technical skills to protect systems and data. I also plan to continue building my experience through internships and certifications. My long-term goal is to secure a stable position in the cybersecurity field with strong growth opportunities.
Certifications and Activities
I am currently working towards security+ and networking+. I have completed coursework in Linux systems and networking, and I have gained hands-on experience through lab-based assignments. I also have a planned cybersecurity internship, which will help me gain real-world experience in the field.
Overall Reflection
Throughout this course, I developed a strong foundation in Linux systems and networking. At the beginning of the semester, I was not very comfortable using the command line, but over time I became more confident and efficient. I improved my skills in file management, user administration, process control, and network configuration. These are all essential skills in cybersecurity, and I now better understand how they apply in real-world situations. This course has helped prepare me for my future career by giving me practical experience and strengthening my technical abilities. It also reinforced my interest in cybersecurity and motivated me to continue developing my skills.