Reflective Essay

Destiny Reflective Essay

Destiny A Jackson

Old Dominion University 

Introduction 

Throughout my cybersecurity degree program, I studied a wide variety of technical and communication-based abilities through IDS. This program of study incorporated coursework from cybersecurity, information systems, policy studies, technological communication, and interdisciplinary theory. These courses introduced me to the social, ethical, and strategic aspects that influence cybersecurity in addition to its technological upbringing. I learned a variety of techniques and viewpoints from courses like Introduction to Cybersecurity, Cybersecurity Fundamentals, Cyber Programming and Network, Intro to Information Systems, Cybersecurity–Technology & Society, Cyber Strategy and Policy, Interdisciplinary Theory & Concepts, and IDS 300W.

As my senior year comes to an end and I get ready to enter the workforce, three key skills that I feel I will use most are technical writing, policy analysis, and Linux system administration. My selected artifacts—Linux class assignments, technical writing papers, and policy analysis papers—show the growth of these skills learned in several courses. When looking over them all together, they show how multidisciplinary learning equipped me to handle complicated challenges, communicate effectively, and think critically about technology in today’s society. These skills clearly correspond with what employers look for in cybersecurity professions; I look forward to these skills carrying me within the tech world.

Linux Class Assignments

My Linux class assignments provide a great indication of my technical growth and hands-on problem-solving skills. I was able to get practical coding skills, like hashing, by working with Linux. All of the following assignments required numerous attempts and a significant amount of time. Every task is built on the one before it, progressively demanding more and more knowledge within Linux, critical thinking, and comprehension of the inner workings of operating systems. To finish those assignments, several tricks and notes were needed till I mastered the underlying principle.

My program’s interdisciplinary approach helped me succeed with Linux. Prior courses like Cyber Programming and Network and Introduction to Cybersecurity helped me comprehend core networking principles and system structures, and I later utilized what I learned and applied it during Linux. Intro to Information Systems gave me a framework for understanding how different system components interact, making it easy to reason through Linux-based troubleshooting issues.

I practiced patience and problem-solving skills from finishing the Linux tasks. Many activities needed trial and error—especially when working simply in the command-line environment. By separating stages, testing commands, and learning from mistakes, I was able to approach difficulties. This method replicates real-world cybersecurity operations.

Being that nearly all cybersecurity job postings emphasize the value of Linux mastery, command-line knowledge, and system administration experience, these Linux artifacts directly help my career. Linux is an essential skill to have because it is used in many different jobs within the cybersecurity field. My projects show my technical proficiency as well as my flexibility and aptitude for picking up new skills—qualities that employers in cybersecurity appreciate.

Technical Skills 

Technical writing is a great skill in cybersecurity, and my writing assignments reflect my ability to explain complicated information in a simple yet professional way.  In the past years, I completed tasks that required me to write step-by-step instructions, describe technical concepts, and generate structured reports.

My writing improved significantly in IDS 300W, where I learned to write with clarity, purpose, and awareness of the reader. I practiced drafting, revising, citing sources, and organizing information in a way that conforms with professional norms. These writing techniques were stressed in other courses, such as Interdisciplinary Theory & Concepts, where I learned how to bring together disparate concepts, frameworks, and procedures in written form. Even classes like Cybersecurity–Technology & Society, which required essays analyzing the ethical and social effects of technology, improved my writing skills.

My technical writing artifacts also demonstrate the close relationship between writing and the technical and analytical aspects of cybersecurity. For instance, knowing the technical stages involved in a procedure is necessary for its documentation. Summarizing a concept requires being able to break it down into basic components.  In certain positions in cybersecurity, such as security analyst, consultant, or policy adviser, the ability to communicate findings to both technical and non-technical readers is crucial.

Policy Analysis

My policy analysis article reflects my ability to examine cybersecurity concerns from strategic, legal, ethical, and organizational viewpoints. This ability was greatly influenced by classes like Cyber Strategy and Policy. I learned about the connections between cybersecurity, international relations, and national security in this course. To complete my policy analysis papers, I relied on skills that I had previously learned. While Interdisciplinary Theory & Concepts gave frameworks for looking at problems from several angles, Cybersecurity–Technology & Society taught me how to assess how technology affects people and organizations. I was able to evaluate policy options more skillfully thanks to these interdisciplinary methods of thinking.

Completing the writing policy papers is also a way my writing improved, along with my research ability. I had to gather credible evidence, analyze regulations, compare policy options, and justify my recommendations using data or scholarly sources. The method helped me to break down complex issues—such as cyber risks—into understandable components. I learned to think critically, recognize potential challenges, and consider the long-term effects of policy decisions. Careers in cybersecurity often require knowledge of legal requirements, compliance standards, and strategic decision-making. Due to all my previous classes, I can think beyond the technical level and comprehend cybersecurity as a broader system of laws, ethics, and organizational behaviors, as my policy analysis artifacts show. 

Conclusion

In conclusion, as I sit and reflect on the past four years, I can clearly see how interdisciplinary learning molded my understanding of cybersecurity and prepared me for my future. Every course added great information, whether it be social or technological. All my classes contributed to teaching me core writing and organizational abilities that I will use in my future aspirations. Certain classes helped me combine ideas from many fields, helping me to better understand complicated challenges. My technical proficiency was enhanced by Introduction to Cybersecurity, Cybersecurity Fundamentals, and Cyber Programming and Networking. 

Additional skills I have gained are how to communicate effectively, approach problems from several perspectives, and integrate technical expertise with critical thinking. My selected artifacts—Linux assignments, technical writing projects, and policy analysis papers—demonstrate the growth of these abilities and their relevance to real-world employment requirements.

Being able to use the skill of critical thinking correctly in the field of cybersecurity is something that is very important. That is because the industry does not rely on technology alone. It involves engaging with people, being familiar with organizations, having good communication, and knowing policy. Luckily enough, throughout all of the different classes I have studied, I have obtained those skills in many different forms.