M57 - Capstone: The Expert Challenge
Capstone: The Expert Challenge
Use the command line to build, secure, verify, and document a small operating-system administration environment from a clean starting point.
- Use the command line to build, secure, verify, and document a small operating-system administration environment from a clean starting point.
The Capstone Is About Judgment, Not Theater
This course ends with an end-to-end challenge because real operating-system work is rarely isolated to one skill.
You are expected to connect:
- users and permissions
- storage and mounts
- packages and services
- firewalls and remote access
- automation and logs
- backup and recovery thinking
The capstone should feel demanding, but it should also feel realistic.
The Environment
Start with a clean lab VM or disposable test machine.
Choose one path:
- Linux server
- Windows server or Windows admin-focused environment
Use the command line as your main interface. Help tools such as man, --help, or Get-Help are allowed and encouraged.
Core Objectives
Complete the following goals in a way you can verify:
1. User and access setup
- create a standard operator-style user
- grant only the access that user actually needs
- verify the resulting permissions or group membership
2. Secondary storage
- identify a secondary disk or volume in the lab
- prepare it
- mount or assign it consistently
- verify that it remains available in the expected location
3. Package or feature installation
- install a small toolset or service from the CLI
- verify the installed components are actually available
4. Network and firewall basics
- confirm the active network settings
- allow only the access your small environment needs
- verify that allowed access works and unwanted exposure is reduced
5. Monitoring or recovery automation
- create one small script or scheduled task that checks a service, records a health snapshot, or writes a recovery note
- verify the output lands where you expect
6. Backup or sync workflow
- build one repeatable backup or sync step for a practice directory or configuration set
- verify both the destination and the evidence log
Required Verification
For each objective, collect proof such as:
- a command output snippet
- a log entry
- a status check
- a directory listing
- a service state
This is what makes the capstone real. A setup is not complete when you typed the commands. It is complete when you can show that the result works.
Use a Checklist, Not Memory Alone
In real system work, a short checklist improves reliability. The capstone is a good place to practice writing one: task, command, expected result, actual result, follow-up.
Suggested Scoring Rubric
Consider the capstone strong if the learner can:
- explain why each major step was needed
- complete the steps from the CLI without relying on blind copy-paste
- verify the result of each step
- recover cleanly from at least one mistake or missed detail
That is closer to real professional practice than a pure speed test.
Graduation Standard
You have completed the capstone when you can look at a clean system and confidently say:
- I can prepare it
- I can secure it
- I can observe it
- I can automate a small part of it
- I can back up a meaningful part of it
- and I can prove what I changed
That is the real endpoint of OS mastery: not just command recall, but reliable systems thinking.