CST 499 - Week 1
Hey everyone,
This week, I completed three modules: Tools of the Trade: Linux and SQL, Assets, Threats, and Vulnerabilities, and Sound the Alarm: Detection and Response. Each module built on the last and helped me better understand both the technical and analytical sides of cybersecurity.
In Tools of the Trade: Linux and SQL, I strengthened my understanding of how operating systems and databases are used in security work. I learned how Linux is widely used in cybersecurity for system administration, log analysis, and security operations. Practicing basic Linux commands helped me see how security analysts navigate file systems, manage permissions, and investigate system activity. I also learned how SQL is used to query databases, filter information, and analyze large sets of data. Understanding how to retrieve specific information from logs and datasets showed me how powerful SQL can be in identifying suspicious patterns or investigating incidents.
In Assets, Threats, and Vulnerabilities, I gained a clearer understanding of what organizations are actually protecting. I learned that assets include anything valuable to a business—such as data, hardware, software, and even reputation. From there, I explored how threats exploit vulnerabilities, and how risk is evaluated based on the likelihood and impact of those threats. This module helped me think more critically about how security is not just technical but strategic. Identifying weaknesses before they are exploited is a key part of reducing risk.
Finally, in Sound the Alarm: Detection and Response, I learned about the processes used to detect, analyze, and respond to security incidents. I explored the importance of monitoring systems, analyzing alerts, and following structured incident response plans. I also learned how documentation and communication play a major role during incidents. This module helped me understand that cybersecurity is not just about prevention—it’s also about being prepared to act quickly and effectively when something goes wrong.
Overall, this week deepened my understanding of both the technical tools (Linux and SQL) and the broader security concepts (risk, threats, and response). I feel more confident in my ability to analyze systems, understand potential risks, and appreciate the structured approach organizations use to protect their assets.
Next week, I plan to continue progressing through the next course modules while reviewing key concepts from Linux, SQL, and incident response. I want to spend additional time practicing Linux commands in a lab environment to become more comfortable navigating directories, managing permissions, and analyzing logs. I also plan to strengthen my SQL skills by practicing more complex queries, especially those involving filtering, sorting, and combining data. Additionally, I aim to review the incident response lifecycle to better understand each phase and how they connect in real-world scenarios.
One challenge I am currently facing is fully understanding more advanced SQL queries, particularly when working with multiple conditions or organizing large datasets. I also sometimes need more practice interpreting security logs efficiently. At this time, I do not urgently need instructor assistance, but I may reach out for clarification or additional resources if I encounter difficulties with more complex query structures or real-world case scenarios.
Comments
Post a Comment