Student Introduction Assignment

Welcome to CIS 1010, Foundations of Cybersecurity
Students in the same course often have a wide variety of knowledge, experiences, and technical backgrounds. So, in order for me to adapt the learning materials for this course, I am interested in knowing what you know and have been exposed to regarding technical tools and knowledge of cybersecurity and its related topics.

Please use APA 6th edition guidelines to format your papers for all assignments completed throughout the term. If you have not used APA standards in the past, make sure to familiarize yourself, there are many helpful resources available online. For those of you who are able to come to the main campus on McNichols, we have an excellent Student Writing Center, located on the main floor in the Briggs building, that provides excellent tutoring. Make sure to carefully proof your work before submitting.

Please submit electronic files using the MS Word format (do not submit. PDF files) and use the following file naming convention:
Fall2020_StudentIntro_YourName
When completed, please upload your MS Word file to the assignment area link on Blackboard.

Part 1:

Please complete the following:
• Full Name
• Biography
• Program of study
• Expected graduation date
• Courses successfully completed
• Courses remaining
• Work experience related to the discipline of cybersecurity
• Technical job experience (if any)
• Research experience

Part 2:
On a scale of 1-5, 5 being the highest, what level would you characterize your familiarity with
the following? Next to each item, provide a brief summary of your experience (brands you’ve
worked with, i.e., Cisco, Palo Alto, etc.;, tools;, systems; technical experience, etc.):
• Computer networking (routers, switches, IP addressing, protocols, OSI layers, firewalls,
application servers, webservers, terminating cabling, etc.)
• Database modeling & administration
• System Administration
• Software development, languages such as Python
• Linus operating system

CIS 1010, Foundations of Cybersecurity
Student Introduction Assignment

• MS Windows
• Apple Mac OS
• Oracle VirtualBox
• Cryptography, public key infrastructure
• Intrusion Detection systems
• Risk Management (threat modeling, penetration testing)
• Security Controls, countermeasures
• Incident analysis and handling
• Digital forensics
• Disaster recovery & business continuity
• Hacker tools
• Continuous monitoring, log files
• Packet sniffer tools such as Wireshark

We help you get better grades, improve your productivity and get more fun out of college!!

Do my Assignment for me

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

How it works – it’s easy

Y

Place your Order

Submit your requirements through our small easy order form. Be sure to include and attach any relevant materials.

Make a payment

The total price of your order is based on number of pages, academic level and deadline.

i

Writing process

We assign the assignment to the most qualified tutor. When the tutor completes the assignment, it is transferred to one of our professional editors to make sure that the assignment meets all of your requirements.

Once complete, we’ll send your assignment via the email provided on the order form.

 

 

Achieve academic success with the best online tutors.