4063CEM The Security Professional Assignment

Assignment Help Other Subject
Reference no: EM133106847 , Length: word count:2000

4063CEM The Security Professional - Coventry University

Learning Outcome 1: Show evidence of understanding how management and leadership affects teams and organisations broadly and specifically with regards to cyber security

Learning Outcome 2: Describe the concepts of threat, vulnerability and risk

Learning Outcome 3: Create a CV targeted at a chosen cyber security career

Part 1: Reflection and Risk

For this Part 1 of the work, you are expected to write 2 short reports up to 600 words each. Though some of the work may be based on work your group has done this submission should be done entirely individually and all the work you submit must be your own that you personally have created.

Part 1a
You have been "working" for Little Red Dog (LRD) for a while now, and you have gone through several security challenges, your next challenge is to reflect on yourself as a "Security Professional".

This reflection should be personal and unique to you. It should either encompass your experience working (or not) on the various activities suggested by the module, or your experience at the university this year and should include any strengths/weaknesses it may have highlighted in you and your plans.

As an example, you could reflect on how you approached the lab tasks for this module talk about your:
• Strengths and Weaknesses.
• What did you (or your group) struggle most with, and how did you attempt to overcome it?
• Did the roles/strengths etc. you suggested at the start align well with what happened over the semester?
• If you worked in a group, what skills do you think your group members had that you feel you are currently lacking in?
• If you worked solo, where you do you think your current biggest flaws are, and what are you plans to address them?
• Did any of your "managers" at Little Red Dog make any personal recommendations on how to improve your work to you or your group, and if so, how did you act on it?

You might also include some more personal reflection (particularly if you didnot manage to complete any of the lab tasks) on your plans and possible employment, such as:
• Did you have a specific career in mind when coming to university?
o Has that plan possibly changed over the last year?
• Conduct a S.W.O.T analysis on yourself and discuss how you will address youweaknesses and threats and take advantage of your strengths and opportunities.
• What is your plan over the next few years to get to whatever your post-university goals are?
• Are there any additional qualifications you seek to gain along with your degree?
• What are the steps you can start taking now towards achieving those goals?

Part 1b
In one of the tasks given to you by Little Red Dog Ltd you were asked to address what you thought were the biggest security challenges facing them. Below are the sixLRD being most concerned about; you are to choose three of them:
• Social Engineering/PhishingAttacks
• Crypto Jacking/Ransomware
• Legal Compliance Problem
• Intellectual Property Theft
• Underfunding
• Client Data Theft

We would like you to discuss the effect those challenges might pose from the point of view of Little Red Dog. Your discussion should rank the challenges in some way and contain some element of discussion concerning threat, vulnerability, and likelihood/risk for each.

This report will be your final report to the board of Little Red Dog and will be provided to your successors to help them decide what they should focus on when you move on to a new year role at the university elsewhere.
Please include any assumptions you or your group have made about Little Red Dog in previous weeks, and you can make further assumptions about the way Little Red Dog operates to better allow your answer to demonstrate your knowledge.

Part 2: Curriculum Vitae and Cover Letter

Your time at Little Red Dog is now coming towards and end; and as such you are looking at pastures new. For this part of the coursework, you are required to prepare a curriculum vitae (CV) and a cover letter for a job role that you have identified and is being advertised. The job should be related to the cyber security industry.

You are allowed to use templates readily available online for the overall layout and structure of the document. However, the content and words you write must be of your own. If you are using a template, ensure that you reference it accordingly.

Task 2a: Curriculum Vitae
When it comes to writing your curriculum vitae, it must contain the following points of information:
• Professional/Personal Statement
• Identification and highlighting of key skills you possess for the job role
• Appropriate work experience for the role
- You may choose to include the experience at Little Red Dog
• Educational Background/Qualifications
- Assume you have reached the end of your degree
You may use generic information when it comes to personal information such as: address, e-mail and telephone numbers. However, we will expect to see your appropriate skill set and therefore you must ensure this information is realistic and correct for you.
The curriculum vitae must be no more than two pages in length and should not surpass the 600-word limit.

Task 2b: Cover Letter
The cover letter must contain the following points of information:
• Reasoning behind why you are an ideal candidate for the role
• Examples for each of the key skills (i.e. your strongest) and how they can be of benefit for the role
You will want to include the address of the role you are applying for, alongside with a salutation to the person you are writing to.

Attachment:- The Security Professional.rar

Reference no: EM133106847

Questions Cloud

How much did all these purchases cost her : Ciara purchased the following items at her local supermarket: 2 blocks of cheese at $5.28 per block, How much did all these purchases cost her
Calculate earnings per share : The company is considering the issuance of 1,700,000 additional shares, which can only be issued at $24 per share. Calculate earnings per share
What is the amount of revenue realized from the sale : Kate Corp. purchased 1,000 shares of its P5 par ordinary share at P10 and subsequently sold 500 of the shares at P20. What is the amount of revenue realized
Determine the total amount of paid-in capital : A company issued 60 shares of P100 par value stock for P8000 cash. Determine the total amount of paid-in capital
4063CEM The Security Professional Assignment : 4063CEM The Security Professional Assignment Help and Solution, Coventry University - Assessment Writing Service - Describe the concepts of threat
Determine the initial measurement of the bonds : On January 1, 2021, Luke Company issued its 9%, P5,000,000 face value bonds at a premium. Determine the initial measurement of the bonds
How much is the monthly payment : A loan of P30,000 is to be repaid monthly for 5 years that start at the end of 4 years. If interest rate is 12% converted monthly, how much is monthly payment
What is the appropriate cost for retained earnings : The return on the S&P 500 index is 12%. What is the appropriate cost for retained earnings in determining the firm's cost of capital
What is the display filter expression : Identify well-known security issues and Demonstrate how well-known security vulnerabilities can be both exploited - explain how message integrity is provided

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss nixon secret plan for ending the vietnam war

How did the Cold War affect Asian, and African countries? What were the major challenges facing the newly emerging nations in the postwar period? Discuss Nixon's secret plan for ending the Vietnam War

  Comparative paper-similar or dissimilar writers-themes-ideas

Set out the context of the topic of your paper in thinking comparatively about two similar or dissimilar writers, themes, ideas, perspectives

  Fundamentals of crime reduction strategies

Explain the fundamentals of the following crime reduction strategies. How is crime analysis utilized in each of these strategies?

  Creating or developing a program evaluation

Analysis that identifies the stakeholders, their role in the agency and any concerns that they might have about the proposed program evaluation

  Explain the Kant deontology or utilitarianism theories

Topic In this paper, you will apply one of the theories (Kant's deontology or utilitarianism) that we learned to your applied ethics topic (euthanasia)

  Examine tort law and the criminal aspects of health care

Examine tort law and the criminal aspects of health care and Determine the factors that affect healthcare quality in healthcare organizations.

  Identify the goals that you have for the remaining week

Discuss the 3 successes you have had in your clinical practice. Identify 3 challenges that you have had. Identify the goals that you have for the remaining.

  Statistical reasoning in psychology

Statistical Reasoning in Psychology

  How you would implement a new software system

Select a project to work on. Some options are listed below, select a project that you feel comfortable with, and understand (or feel you can easily learn about)

  Calories in average fast food burger

Any guess how many calories are in your average fast food burger (Whopper, Quarter Pounder, Six Dollar Burger), fries and a soda? How many calories exactly?

  Construct an analysis of public administration

Construct an analysis of public administration at the present moment as it relates to the duties of the Executive, Legislative, and Judicial branches

  What information you would need in order to perform

Discussing what information you would need in order to perform this evaluation including psychological assessments, personal records, and third party testimony.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd