Reflection

My Reflection on Coursework Integration, Skill Acquisition, and Development in Cybersecurity

Brandon A. Huitz

Department of Science, Old Dominion University

Prof. David Prihoda

4/28/2025

Introduction

Throughout my academic journey in the Bachelor of Science in Cybersecurity program at Old Dominion University, I have gained significant technical development and professional growth. From configuring firewalls and conducting vulnerability assessments to understanding the societal impacts of technology, each course and project has helped me grow into a more competent and reflective cybersecurity professional. This reflection explores how specific coursework, and experiences have deepened my understanding of cybersecurity concepts, challenged my thinking, and shaped my approach to both current learning and future professional practice. I will reflect on artifacts that align with my skills in analytical thinking, problem-solving, communication, and flexibility—highlighting what I’ve learned, how I’ve applied it, and what I aspire to further enhance.

Linux System for Cybersecurity

In CYSE 270 – Linux System for Cybersecurity, I learned about how Linux operating systems can be utilized to enhance security protocols and identify vulnerabilities. I remember having a hard time configuring Linux environments for the first time using Red Hat and Ubuntu. Working with Bash scripting to automate tasks such as user management and file permission audits was both challenging and rewarding.
This course also introduced me to vulnerability scanning using tools like Nmap and Wireshark. Through hands-on labs, I developed a better understanding of system hardening, an essential component of incident prevention. This learning experience emphasized the importance of attention to detail, especially when configuring system services or setting up firewall rules. As a result, I feel more confident operating in Linux environments—a skill that is of the utmost importance to any cybersecurity analyst (Chapple et al., 2022).

Cybersecurity, Technology, and Society

In CYSE 200T – Cybersecurity, Technology, and Society, I explored the ethical and social implications of cybersecurity. This course really stood out to me because it moved beyond technical knowledge and asked me to consider the broader context in which cybersecurity functions. We analyzed topics such as surveillance, data privacy, and the digital divide—topics that made me reconsider my own ethical boundaries as a future practitioner.
One assignment required us to write about a controversial cybersecurity topic—mine was facial recognition and its implications for civil liberties. The readings from authors such as Shoshana Zuboff (2019) on surveillance capitalism helped me realize that cybersecurity isn’t just about protecting data—it’s about protecting people and their rights. This shifted my mindset to see cybersecurity through a human-centric lens, something I now carry into all technical work I do.

Cybersecurity and the Social Sciences

CYSE 301 – Cybersecurity and the Social Sciences pushed me to connect human behavior with cybersecurity risks. I learned how psychology, sociology, and behavior patterns contribute to security vulnerabilities, especially in areas like phishing, social engineering, and insider threats. It was during this class that I realized the importance of user awareness in building a secure digital environment.

An eye-opening moment came during a group presentation on social engineering. I researched how attackers manipulate human emotions like fear and urgency so they can bypass technical safeguards. This led me to explore Kevin Mitnick’s writings on human hacking (Mitnick & Simon, 2011), which aligned with our class discussions on the psychology of deception. I also drew on my analytical thinking skills developed in previous classes to evaluate case studies. This helped me grasp the interdisciplinary nature of cybersecurity—an understanding I now bring into my daily studies and internships.

Basic Cybersecurity Programming and Networking

In CYSE 250 – Basic Cybersecurity Programming and Networking, I strengthened my foundation in programming and network defense. This course included lab assignments that required configuring firewalls, encrypting messages using Python scripts, and simulating cyberattacks to understand vulnerabilities. I initially struggled with configuring DHCP and VPN settings, but through repeated practice and instructor feedback, I improved my skills significantly.

What made this course meaningful was how it integrated theoretical and practical learning. I used concepts like the CIA Triad and applied them in real-world scenarios. For example, when analyzing a simulated network breach, I had to determine how confidentiality, integrity, and availability were affected. These exercises improved my ability to think critically under pressure—a skill essential for incident response roles (Kim & Solomon, 2016).

Cyber Law and Cybersecurity Strategy

My understanding of the legal and regulatory landscape of cybersecurity was shaped by CRJS 406 – Cyber Law and CYSE 425 – Cybersecurity Strategy and Policy. These classes helped me develop an appreciation for the complex legal issues surrounding intellectual property, data privacy, and compliance.

In Cyber Law, I learned about GDPR, HIPAA, and the Computer Fraud and Abuse Act (CFAA). The class taught me how to assess whether security practices align with legal standards. In one paper, I analyzed a real-world case of corporate data breach litigation and outlined how regulatory failure contributed to reputational damage. This experience honed my attention to detail and helped me develop a compliance-focused mindset.

Meanwhile, in the Cybersecurity Strategy course, we studied frameworks like NIST SP 800-53 and ISO 27001. I worked in a team to create a mock risk management plan for a mid-sized company. This required not only technical understanding but also collaboration and communication to justify policy decisions. These experiences made me realize how essential it is to communicate cybersecurity strategy to non-technical stakeholders—a skill that separates technically proficient professionals from effective leaders (Whitman & Mattord, 2021).

Cybersecurity Techniques and Operations

One of the most challenging yet rewarding courses was CYSE 301 – Cybersecurity Techniques and Operations. Here, we focused on intrusion detection, malware analysis, and hands-on incident response. I spent hours using Kali Linux and Metasploit to simulate attacks and identify how systems are compromised. These labs were intense and required a lot of trial and error, but they also reinforced my ability to learn under pressure.
One of my artifacts from this course is a full incident response report. This assignment forced me to combine technical skill with clear communication. I had to identify a breach, document each step taken to mitigate it, and offer strategic recommendations to prevent recurrence. This process not only improved my problem-solving ability but also taught me how important documentation is in real-world cybersecurity operations.

Professional Growth

In nearly every course I took, collaboration was essential. Whether it was working with classmates on a policy paper or conducting a joint risk assessment, I had to learn to communicate technical details to people from various backgrounds. I’ve become more confident in explaining cybersecurity concepts, a skill that was particularly emphasized in CYSE 200T and CYSE 406.
Adaptability has also been crucial. Cyber threats evolve rapidly, and I’ve had to continuously learn new tools and techniques. From mastering Wireshark packet analysis to learning the ins and outs of encryption protocols, each course required me to adapt quickly. This mindset will serve me well in the ever-changing field of cybersecurity.

Conclusion

Reflecting on my academic journey so far, I realize that I have grown from a curious student into a capable cybersecurity professional in training. For instance, building my ePortfolio (Fordes, n.d.) taught me the importance of showcasing interdisciplinary skills and ongoing professional development. It was not just about listing technical accomplishments but demonstrating reflective learning and a commitment to ethical practice. Through assembling my portfolio, I synthesized knowledge from various courses and recognized how each skill interconnects within the larger cybersecurity ecosystem.


My next steps involve pursuing internships that will further refine these skills and prepare me for industry certifications like CompTIA Security+ and CISSP. I also plan to stay engaged with research, particularly on the social impacts of cybersecurity, an area I feel passionate about. I am grateful for the opportunities I’ve had so far and excited about the future that lies ahead in this dynamic and important field.

References

Chapple, M., Stewart, J. M., & Gibson, D. (2022). CISSP (ISC)² Certified Information Systems Security Professional Official Study Guide (9th ed.). Wiley.

Fordes. (n.d.). What are ePortfolios? Old Dominion University. https://sites.wp.odu.edu/eportfolios/what-are-eportfolios/

Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett Learning.

Mitnick, K. D., & Simon, W. L. (2011). The Art of Deception: Controlling the Human Element of Security. Wiley.

Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (7th ed.). Cengage Learning.

Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.