Learn Understand first, then practice while the concept is still fresh.

M57 - Capstone: The Expert Challenge

Use the command line to build, secure, verify, and document a small operating-system administration environment from a clean starting point.

CLI Intensive & Capstone

Capstone: The Expert Challenge

Use the command line to build, secure, verify, and document a small operating-system administration environment from a clean starting point.

120 min EXPERT BOTH Curriculum-reviewed
What you should be able to do after this
  • Use the command line to build, secure, verify, and document a small operating-system administration environment from a clean starting point.

The Capstone Is About Judgment, Not Theater

This course ends with an end-to-end challenge because real operating-system work is rarely isolated to one skill.

You are expected to connect:

  • users and permissions
  • storage and mounts
  • packages and services
  • firewalls and remote access
  • automation and logs
  • backup and recovery thinking

The capstone should feel demanding, but it should also feel realistic.


The Environment

Start with a clean lab VM or disposable test machine.

Choose one path:

  • Linux server
  • Windows server or Windows admin-focused environment

Use the command line as your main interface. Help tools such as man, --help, or Get-Help are allowed and encouraged.


Core Objectives

Complete the following goals in a way you can verify:

1. User and access setup

  • create a standard operator-style user
  • grant only the access that user actually needs
  • verify the resulting permissions or group membership

2. Secondary storage

  • identify a secondary disk or volume in the lab
  • prepare it
  • mount or assign it consistently
  • verify that it remains available in the expected location

3. Package or feature installation

  • install a small toolset or service from the CLI
  • verify the installed components are actually available

4. Network and firewall basics

  • confirm the active network settings
  • allow only the access your small environment needs
  • verify that allowed access works and unwanted exposure is reduced

5. Monitoring or recovery automation

  • create one small script or scheduled task that checks a service, records a health snapshot, or writes a recovery note
  • verify the output lands where you expect

6. Backup or sync workflow

  • build one repeatable backup or sync step for a practice directory or configuration set
  • verify both the destination and the evidence log

Required Verification

For each objective, collect proof such as:

  • a command output snippet
  • a log entry
  • a status check
  • a directory listing
  • a service state

This is what makes the capstone real. A setup is not complete when you typed the commands. It is complete when you can show that the result works.

Use a Checklist, Not Memory Alone

In real system work, a short checklist improves reliability. The capstone is a good place to practice writing one: task, command, expected result, actual result, follow-up.


Suggested Scoring Rubric

Consider the capstone strong if the learner can:

  1. explain why each major step was needed
  2. complete the steps from the CLI without relying on blind copy-paste
  3. verify the result of each step
  4. recover cleanly from at least one mistake or missed detail

That is closer to real professional practice than a pure speed test.


Graduation Standard

You have completed the capstone when you can look at a clean system and confidently say:

  • I can prepare it
  • I can secure it
  • I can observe it
  • I can automate a small part of it
  • I can back up a meaningful part of it
  • and I can prove what I changed

That is the real endpoint of OS mastery: not just command recall, but reliable systems thinking.