Access over 20 million homework & study documents

Report 3

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/2
REPORT # 3
Name: Course number:
Student ID:
1. Courses I Am Taking This Term Describe the 16 -week hybrid course (course #,
course title, & course description).
The course that I am taking this term is “Cyber Security.” This is a course that involves the study of the
protection of networks and computer systems from damage or theft of their software, hardware or
electronic data and also from the misdirecton or disruption of the services provided. This is my course
of choice as I have always been passionate and enthusiatic about computer knowledge and skills. With
my love for computers, the study of cyber security is crucial because I will be able to adequately secure
computer systems and ensure high data integrity on my personal and professional levels.
2. List Outcomes from Your 16 -Week Course List the outcomes (objectives) as written
in the course syllabus from the 16 - week hybrid course.
Among the outcomes include being able to ensure the availability of information to
authorized persons when necessary
Being able to preserve data integrity
Protecting the confidentiality of data and information
3. Apply Your Work Experiences to The Course Correlate your job responsibilities with
the 16 -week hybrid course outcomes listed above.
Working as a junior I.T specialist in my company, I am in charge of ensuring the day to day
operations and data structures through overseeing the operational performance. I am in charge of
developing unique and effective security strategies for hardware, software, data centers and
networks so that no vulnerable points can be found on our system. Additionally, I am in charge
of building firewalls that help in protecting the network infrastructures of the company. This
helps is sealing any loopholes that attackers may use to access the company’s I.T systems and
infrastructures.
Testing and analysis of security vulnerability and risks is also my task at work. In my analysis, I
often identify cyber attackers whom I report to the upper management and with the help of the
law enforcement authorities, the perpetrators are brought to book.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/2

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
REPORT # 3 Name: Course number: Student ID: 1. Courses I Am Taking This Term – Describe the 16 -week hybrid course (course #, course title, & course description). The course that I am taking this term is “Cyber Security.” This is a course that involves the study of the protection of networks and computer systems from damage or theft of their software, hardware or electronic data and also from the misdirecton or disruption of the services provided. This is my course of choice as I have always been passionate and enthusiatic about computer knowledge and skills. With my love for computer ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4