Access over 20 million homework & study documents

Portfolio

Content type
User Generated
Subject
English
School
Indiana Tech
Type
Homework
Rating
Showing Page:
1/6
December 5, 2020
Hiring Manager
Hiring Company
[Street Address]
[City, ST Zip Code]
Dear Sir: Portfolio
The purpose of this portfolio project is to explain my professional
coverage as a Cybersecurity student at Indiana Technical University. I
am proficient in Cyber Security skills, and I majored in social security
while at Indiana Technical University. I am capable of developing
cybersecurity mechanisms. I have proficient communication and,
devoted to scholarly and professional excellence.
I have knowledge and skills in the development and analysis of
cybersecurity systems. I have vast knowledge and experience of
cybersecurity structures and processes that involve mitigating risks
targeting, information, and systems through detection, response,
prevention, and recovery of stolen contents.
I am also skilled in protecting servers, network systems of the
company, mobile devices, computers, electronics, and data from
unknown digital attacks. I also have some vast skills in preventing
cyber-attacks targeting accessing, altering, or damaging sensitive
data, interfering with regular businesses, or extracting money from
users online. I have successfully built my Ethos, Logos, and Pathos
through Twitter for first-year students at Indiana Technical
University.
I am passionate about working in the cybersecurity field after
graduation because it aligns with my professional and skills. I am
experienced in this field, so I would wish to get engaged with this
field after graduation.
Unit one: Apple Company
The purpose of this project was to set up a robust cyber security
framework in the Apple Company create an assurance that the
network and website system attains that required level of protection.
In this project, I focused on the development of strategic network
security systems that are required to uphold the effective design and
manufacturing processes.
PHOTO
Feras Alzahrani
Cyber Security Senior
Student, Indiana Tech
University
[Address 1]
[Address 2]
[City, ST ZIP Code]
[Telephone]
[Email]
[Website]

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
Page 2
I incorporated the three aspects of appeal to demonstrate the required
elements that an excellent cybersecurity analyst must have in their
design procedure. For instance, I illustrated the importance of
considering ethos, logos, and pathos. By definition, ethos is credible
elements of appeal that foster a cyber-security system's strength and
reliance. Examples of ethos are features on the cybersecurity system's
portfolio that enhance its beauty and compelling appearance. I choose
twitter during my design because it has a strong psychological appeal
since many individuals use it.
In my project three, I mentioned that the credibility of a presenter
defines the practical outlook of the account; thus, there must be
contentious effectiveness by the writer, which means that he or she
must incorporate a photograph at the top of the document to uphold
the credibility of the work. In my project, I ensured that I included my
picture to sustain my project's qualitative appeal.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
December 5, 2020 PHOTO Feras Alzahrani Cyber Security Senior Student, Indiana Tech University Hiring Manager Hiring Company [Street Address] [City, ST Zip Code] Dear Sir: Portfolio The purpose of this portfolio project is to explain my professional coverage as a Cybersecurity student at Indiana Technical University. I am proficient in Cyber Security skills, and I majored in social security while at Indiana Technical University. I am capable of developing cybersecurity mechanisms. I have proficient communication and, devoted to scholarly and professional excellence. I have knowledge and skills in the development and analysis of cybersecurity systems. I have vast knowledge and experience of cybersecurity structures and processes that involve mitigating risks targeting, information, and systems through detection, response, prevention, and recovery of stolen contents. I am also skilled in protecting servers, network systems of the company, mobile devices, computers, electronics, and data from unknown digital attacks. I also have some vast skills in preventing cyber-attacks targeting accessing, altering, or damaging sensitive data, interfering with regular businesses, or extracting money from users online. I have successfully built my Ethos, Logos, and Pathos through Twitter for first-year students at Indiana Technical University. I am passionate about working in the cybersecurity field after graduation because it aligns with my professional and skills. I am experienced in thi ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents