Reference no: EM133106847 , Length: word count:2000
4063CEM The Security Professional - Coventry University
Learning Outcome 1: Show evidence of understanding how management and leadership affects teams and organisations broadly and specifically with regards to cyber security
Learning Outcome 2: Describe the concepts of threat, vulnerability and risk
Learning Outcome 3: Create a CV targeted at a chosen cyber security career
Part 1: Reflection and Risk
For this Part 1 of the work, you are expected to write 2 short reports up to 600 words each. Though some of the work may be based on work your group has done this submission should be done entirely individually and all the work you submit must be your own that you personally have created.
Part 1a
You have been "working" for Little Red Dog (LRD) for a while now, and you have gone through several security challenges, your next challenge is to reflect on yourself as a "Security Professional".
This reflection should be personal and unique to you. It should either encompass your experience working (or not) on the various activities suggested by the module, or your experience at the university this year and should include any strengths/weaknesses it may have highlighted in you and your plans.
As an example, you could reflect on how you approached the lab tasks for this module talk about your:
• Strengths and Weaknesses.
• What did you (or your group) struggle most with, and how did you attempt to overcome it?
• Did the roles/strengths etc. you suggested at the start align well with what happened over the semester?
• If you worked in a group, what skills do you think your group members had that you feel you are currently lacking in?
• If you worked solo, where you do you think your current biggest flaws are, and what are you plans to address them?
• Did any of your "managers" at Little Red Dog make any personal recommendations on how to improve your work to you or your group, and if so, how did you act on it?
You might also include some more personal reflection (particularly if you didnot manage to complete any of the lab tasks) on your plans and possible employment, such as:
• Did you have a specific career in mind when coming to university?
o Has that plan possibly changed over the last year?
• Conduct a S.W.O.T analysis on yourself and discuss how you will address youweaknesses and threats and take advantage of your strengths and opportunities.
• What is your plan over the next few years to get to whatever your post-university goals are?
• Are there any additional qualifications you seek to gain along with your degree?
• What are the steps you can start taking now towards achieving those goals?
Part 1b
In one of the tasks given to you by Little Red Dog Ltd you were asked to address what you thought were the biggest security challenges facing them. Below are the sixLRD being most concerned about; you are to choose three of them:
• Social Engineering/PhishingAttacks
• Crypto Jacking/Ransomware
• Legal Compliance Problem
• Intellectual Property Theft
• Underfunding
• Client Data Theft
We would like you to discuss the effect those challenges might pose from the point of view of Little Red Dog. Your discussion should rank the challenges in some way and contain some element of discussion concerning threat, vulnerability, and likelihood/risk for each.
This report will be your final report to the board of Little Red Dog and will be provided to your successors to help them decide what they should focus on when you move on to a new year role at the university elsewhere.
Please include any assumptions you or your group have made about Little Red Dog in previous weeks, and you can make further assumptions about the way Little Red Dog operates to better allow your answer to demonstrate your knowledge.
Part 2: Curriculum Vitae and Cover Letter
Your time at Little Red Dog is now coming towards and end; and as such you are looking at pastures new. For this part of the coursework, you are required to prepare a curriculum vitae (CV) and a cover letter for a job role that you have identified and is being advertised. The job should be related to the cyber security industry.
You are allowed to use templates readily available online for the overall layout and structure of the document. However, the content and words you write must be of your own. If you are using a template, ensure that you reference it accordingly.
Task 2a: Curriculum Vitae
When it comes to writing your curriculum vitae, it must contain the following points of information:
• Professional/Personal Statement
• Identification and highlighting of key skills you possess for the job role
• Appropriate work experience for the role
- You may choose to include the experience at Little Red Dog
• Educational Background/Qualifications
- Assume you have reached the end of your degree
You may use generic information when it comes to personal information such as: address, e-mail and telephone numbers. However, we will expect to see your appropriate skill set and therefore you must ensure this information is realistic and correct for you.
The curriculum vitae must be no more than two pages in length and should not surpass the 600-word limit.
Task 2b: Cover Letter
The cover letter must contain the following points of information:
• Reasoning behind why you are an ideal candidate for the role
• Examples for each of the key skills (i.e. your strongest) and how they can be of benefit for the role
You will want to include the address of the role you are applying for, alongside with a salutation to the person you are writing to.
Attachment:- The Security Professional.rar