This article discusses the technical skills developed and mapping outcome of a networking project. It covers cybersecurity, cloud computing, networking, and application development. The article also talks about the future usage of knowledge or skills and the graduate outcome table.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORKING PROJECT Networking Project Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 NETWORKING PROJECT Table of Contents 2. Technical skills developed...........................................................................................................3 Future Usage of Knowledge or Skills..........................................................................................4 Mapping of unit...............................................................................................................................4 3. Mapping outcome........................................................................................................................5 Graduate Outcome Table.................................................................................................................7 Future plan.......................................................................................................................................8 References......................................................................................................................................10
3 NETWORKING PROJECT 2. Technical skills developed This professional exposure has helped in gathering new knowledge and skills about the four events organized. I have developed my professional and technical skills by attends these four events. The first event, DDLS seminar has been focused on the cybersecurity. Cyber security has been an important topic for all the organizations in the market [1]. The seminar has focusedonthedifferentmitigationtechniqueofcybersecurityincludingtheencryption technique. The standard encryption (TLS) method has been discussed in the seminar.I have gained technical skills in the encryption technique from the cyber security seminar. The second seminar has focused on the National Broadband Network and its application. This helped me to earn precious knowledge on the different topics of networking [2]. In addition, the practical sessions helped me to gather crucial experience on the subject, those that will help me to take prompt decisions in real life scenarios while dealing with networking tasks and challenges in a professional environment. The use of the network in various fields has been discussed in the seminar. I have gained knowledge about the networking and different cabling set ups. The impact of networking in the organization has been discussed in the seminar. I have learned about different networking skills including hardware and software. The third seminar has focused on the solving real world problems with IBM Cloud [3]. I have learned about the cloud computing and its benefits in the company.The use of the cloud computing in the company has been discussed in the report.I have learned about various problems in the cloud computing including IBM Cloud. The characteristics and problems in the cloud computing and its services has been learned by me. The fourth seminar has focused on Melbourne server less meet up [4]. The use of the server less meet
4 NETWORKING PROJECT up application have been discussed in the seminar. In have learned about the networking department of the companies in the market. Future Usage of Knowledge or Skills I have learnt a lot about advance technologies used in the companies in the market.I have learnt about the encryption technique used for the cyber security and cloud computing. The demerits and problems in the cloud computing has been learnt by me. I have learnt technical skills in the networking system of the company [5]. I can use my learnings in the future for developing myself as a networking graduate.The use of these professional skills learnt during the practical exposure of the seminar. I might help my company in making use of my skills and knowledge. I have learnt how to encrypt a data packet to protect it from hackers and other intruders. The encryption method have helped in securing data and information in securing data and information of the company. The use of encryption technique has helped in maintaining the cyber security of the companies in the market. Mapping of unit Events NameUnits Outcome DevSecOpsMN502 (Overview of Network Security) a. Analyze and discuss the main security issues and emerging trends of information security; Blockchain SecurityMN503 (Overview of Internetworking) b.Explain human factors in achieving business and technical goals through planning and design. DDLS Cyber SecurityMN502 (Overview of Network Security) f. Demonstrate professional and ethical behavior
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 NETWORKING PROJECT with regard to network security. NBN NOC TourMN504(NetworkedApplication Management) d.Analyseperformanceanddeployment issues for networked applications; Google Cloud PlatformMN506 (System Management) a.Analyse and compare various server management systems; IPV (Indian Professionals in Victoria)MN503 a.Analyse and discuss the significance of internetworking for contemporary organisations. 3. Mapping outcome I have learnt about cybersecurity as this is my interest of topic. I have been maintaining a proper approach to the development of the company. I have gained technical skills in the encryption technique from the cyber security seminar.The second seminar has focused on the National Broadband Network and its application. The use of the network in various fields has been discussed in the seminar. The four events have been helping in providing a practical approach to therefore important topics discussed. I have learnt a lot about the cybersecurity, cloud computing, networking and application development. The characteristics and problems in the cloud computing and its services has been learned by me.This variety of knowledge might help me in getting a proper career as a networking graduate [6]. Therefore, the importance of these skills have been increased with the application of the skills in the market.The use of the
6 NETWORKING PROJECT cybersecurity has been maintaining the security of the data and information of the company. The use of the cybersecurity has been creating various opportunity for me in the future. The fourth seminar has focused on Melbourne server less meet up. The use of the server less meet up application have been discussed in the seminar. In have learned about the networking department of the companies in the market. The use of the cloud computing has been helping me in understanding the online storage of the data and information in the internet.The real problems of the cloud computing has been helping in maintaining brief idea about the solutions in the cloud computing. I have learned about various problems in the cloud computing including IBM Cloud. Professional Skills [7]. The practical exposure that I have acquired through attending the seminars shall prove to be extremely helpful in the fields of network computing. The skills that I have acquired can be largelygroupedunderthebannersofCloudcomputing,networksecurity,datamining, broadband connectivity and many more. This will help me to solve real world networking problems and develop networking environments with more knowledge and precision. I did not like was that in some cases they did not provide the hidden details behind the highlighted issues which is however understandable owing to the shortage of time in these seminars. For example, the practical knowledge that I had developed regarding cryptography has provided crucial information in the field of network security. Cryptography is the process of encrypting data that is stored on the servers of the cloud, thus protecting them from unauthorized access. Data security is the most important factor in networking, in the modern times [8]. I have learned to use the various tools and techniques that help in the process of encryption and decryption. These include Triple AES, Blowfish and Towfish techniques. These techniques are used widely by several U.S Government and other private organizations all over the world.
7 NETWORKING PROJECT Through these learnings I have managed to protect virtual servers from intended attacks by encrypting crucial data that was presented as part of practical test exercises. Graduate Outcome Table MIT Graduate AttributesJustify the coverage based on capstone project exposure and professional exposure Ability to Communicate The ability to communicate effectively and appropriately in a range of contexts to achieve high order speaking, listening, reading, writing, numeracy and information technology communication skills. This skill is developed during this seminar. Independent andLifelong Learning A capacity to be a self-directed learner and thinker and to study and work independently. Resulting in continuous learning, resilience, confidence, learning transferable and timemanagementskillsandanabilitytolearn independently. TheNBNeventwas oneofthetechnical event.However,the trainerhashelpedin creatingaproper learningtoan advanced level. Ethics Awareness, sensitivity, and commitment to ethics and ethicalstandardsinpersonal,social,businessand professional contexts. Iwouldliketo mentiontheIBM Cloud event here. The event has focused on the real knowledge of ethics helps to improve skillinthecapstone project. Analytical andProblem Solving The ability to collect, analyse and evaluate information and ideas and to solve problems by thinking clearly, critically and creatively to solve problems and issues using established methods of enquiry. TheNBNNOCtour hascoveredupthis area.But,Ineedto improve this skill set more. Cultural and Global Awareness Anacknowledgmentofandrespectfor:equalityof opportunity; individual and social responsibility; and a recognition and appreciation of other cultures and times recognizing the global context of business. Thecybersecurity event was one of those thatcoveredupthis knowledgeareaby takingexamplesof other countries such as India,Australiaand
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 NETWORKING PROJECT South Africa. Team work A capacity to relate to, collaborate with, and, where appropriate lead others, and to exchange views and ideas in order to achieve desired outcomes through teamwork, negotiation, conflict resolution, and leadership. TheMelbourne serverlessmeetup eventhasshedlight upon teamwork skills. Specialist knowledgeof afieldof study Comprehensive specialist knowledge of a field of study and defined professional skills ensuring work readiness. TheNBNevent’s trainerhasprovided speechonthe specialistknowledge of a field of study. Future plan Having been engrossed with the knowledge of networking, I would like to endorse myself in the professional realms of networking. However, the concept of cyber security entertained me the most. I hope to have ample beginners’ knowledge to pursue a career in Cyber Security. With the advent of the internet, cyber security has been the biggest challenge of information technology. These threats include hacking, phishing, man-in-the-middle attacks and many more. Hacking involves expert personnel to enter someone else’s account or system without their prior knowledge and hence make unauthorized modifications or get away with thefts. Through phishing, a third-party application can acquire login details of other users without their knowledge. DDOS attacks are however very common nowadays. Cybercriminals all over the world has now chosen this technique to destabilize the website servers of the big corporate names of the world thus hindering their official delicacies[9]. I had always been awed by the practicalities of network computing, even though I could not figure which field of networking attracted me the most. Over the time period due to the seminars, I got to learn more due to my interaction with many experts. These practical sessions
9 NETWORKING PROJECT helped me to magnify into the core aspects of networking and has certainly guided me to choose a career in this. As mentioned in the section above, I finally chose network security as a career path. The challenges in cyber security needs to be addressed with highest priority and I would like to be a part of the change. To interact with aspirants and experts from various universities have been the best aspect of the professional exposure. This helped me to earn precious knowledge on the different topics of networking. In addition, the practical sessions helped me to gather crucial experience on the subject, those that will help me to take prompt decisions in real life scenarios while dealing with networking tasks and challenges in a professional environment. One thing that I did not like was that in some cases they did not provide the hidden details behind the highlighted issues which is however understandable owing to the shortage of time in these seminars. Nevertheless, I would like to take forward these learnings and brush up the practical qualities with more practice and finally move forward in my career path.
10 NETWORKING PROJECT References [1]Mackey, Tim K., and Gaurvika Nayyar. "Digital danger: a review of the global public health,patientsafetyandcybersecuritythreatsposedbyillicitonline pharmacies."British medical bulletin118, no. 1 (2016): 110-126. [2]Mittal, Sudip, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin. "Cybertwitter:Usingtwittertogeneratealertsforcybersecuritythreatsand vulnerabilities." InAdvances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on, pp. 860-867. IEEE, 2016. [3]Peng,Shin-yi."CybersecuritythreatsandtheWTOnationalsecurity exceptions."Journal of International Economic Law18, no. 2 (2015): 449-478. [4]Montgomery, Chelsea. "New Security for a New Era: An Investigationinto Law Enforcement Cybersecurity Threats, Obstacles, and Community Applications." PhD diss., Utica College, 2017. [5]Rubio, Juan E., Javier Lopez, and Rodrigo Roman-Castro. "Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection." (2018). [6]Nobles,Calvin."Cyberthreatsincivilaviation."InCyberSecurityandThreats: Concepts, Methodologies, Tools, and Applications, pp. 1185-1207. IGI Global, 2018. [7]Webb, Timothy, and Sumer Dayal. "Building the wall: Addressing cybersecurity risks in medical devices in the USA and Australia."Computer Law & Security Review33, no. 4 (2017): 559-563. [8]Johnson,Tsutomu."SorryILostYourFiles:CybersecurityThreatsto Confidentiality."Utah BJ28 (2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 NETWORKING PROJECT [9]Goode,Jodi."TowardsAComparisonofTrainingMethodologiesonEmployee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs." (2016).