Cyse270s

  • My Experience With the Lab
  • Working on the Task A subnetting activity helped me practice converting between decimal and binary and identifying key network values such as the network address, broadcast address, and usable host range. Seeing the IP table on page 1 of the assignment made it easier to visualize each step. As10 – Networking Basics and Su…
  • Key Concepts or Skills Learned
  • From this lab, I strengthened my understanding of how to determine the subnet size by using the /28 netmask. I learned to calculate the block size, determine the correct subnet range, and identify the first and last usable IP addresses. Converting values into binary format also reinforced how subnet masks define which part of the address represents the network versus the hosts.
  • Challenges Faced
  • One challenge I faced was making sure I selected the correct subnet range, especially since /28 creates many small subnets. Converting back and forth between decimal and binary also required extra attention to avoid simple mistakes. Once I matched the pattern shown in the assignment table on page 1, the process became clearer.

My Experience With the Lab

Working on Task A was my first time automating a full backup process using shell scripting and crontab. Following the steps listed in the assignment such as creating a new user, generating a tar archive, and scheduling the task helped me better understand how Linux handles automation. Seeing the structure laid out on page 1 made it clearer how each step built on the previous one. Lab 9 Task Automation

Key Concepts or Skills Learned

I learned how to write a script that takes inputs, assigns values to variables, and uses the tar command to archive directories. I also practiced moving files into system folders like /var/backups, learned about different compression algorithms (gzip, bz2, xz), and created a crontab schedule to run the backup every 3 minutes. This lab strengthened my understanding of Linux automation, user management, and directory permissions.

Challenges Faced

The biggest challenge I faced was making sure the script created the filename correctly based on the MIDAS ID and date formatting, as shown in the instructions. I also had to be careful with permissions because writing to /var/backupsrequired using sudo, which the assignment also warned about. Finally, setting the crontab correctly and confirming that it ran every 3 minutes required some trial and error. Lab 9 – Task Automation


Professional goals upon graduation

Upon graduation, my primary goal is to begin a career in cybersecurity, specializing in roles that allow me to protect systems, networks, and data from modern cyber threats. I plan to pursue entry-level positions such as Cybersecurity AnalystSOC AnalystInformation Security Technician, or Incident Response Assistant, where I can apply the technical skills I developed throughout my coursework, including Linux system administration, networking fundamentals, scripting, automation, and threat identification.

As I gain experience, I aspire to earn industry-recognized certifications such as CompTIA Security+Network+Linux+, and eventually advanced credentials like CEHCISSP, or CySA+. These certifications will help me strengthen my credibility and transition into more specialized roles, such as digital forensics, cloud security, or security operations. Long-term, I hope to contribute to cybersecurity efforts that protect communities and organizations, while also promoting security awareness to reduce vulnerabilities across society.

Overall reflection on your experiences during the course and/or program

My experience throughout this cybersecurity program has been both challenging and rewarding, offering a strong foundation in the essential concepts and skills required in the field. The hands-on labs strengthened my understanding of Linux systems, command-line operations, user and permission management, task automation, networking basics, and security practices. These practical exercises helped me develop the confidence to troubleshoot issues, analyze system behavior, and think critically like a cybersecurity professional.

One of the biggest takeaways from the program is how important cybersecurity is in protecting modern organizations. Working through real scenarios—such as automating backups, writing shell scripts, configuring system permissions, and performing subnetting—showed me how each small task contributes to the bigger picture of system security. I also learned that cybersecurity goes beyond just technology; it requires awareness of human behavior, vulnerability patterns, and the social factors that influence security risks.