Networking Project - Technical Skills Developed, Mapping Outcome
VerifiedAdded on 2023/06/10
|11
|2493
|286
AI Summary
This article discusses the technical skills developed and mapping outcome of a networking project. It covers cybersecurity, cloud computing, networking, and application development. The article also talks about the future usage of knowledge or skills and the graduate outcome table.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORKING PROJECT
Networking Project
Name of the Student
Name of the University
Author’s Note
Networking Project
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
NETWORKING PROJECT
Table of Contents
2. Technical skills developed...........................................................................................................3
Future Usage of Knowledge or Skills..........................................................................................4
Mapping of unit...............................................................................................................................4
3. Mapping outcome........................................................................................................................5
Graduate Outcome Table.................................................................................................................7
Future plan.......................................................................................................................................8
References......................................................................................................................................10
NETWORKING PROJECT
Table of Contents
2. Technical skills developed...........................................................................................................3
Future Usage of Knowledge or Skills..........................................................................................4
Mapping of unit...............................................................................................................................4
3. Mapping outcome........................................................................................................................5
Graduate Outcome Table.................................................................................................................7
Future plan.......................................................................................................................................8
References......................................................................................................................................10
3
NETWORKING PROJECT
2. Technical skills developed
This professional exposure has helped in gathering new knowledge and skills about the
four events organized. I have developed my professional and technical skills by attends these
four events. The first event, DDLS seminar has been focused on the cybersecurity. Cyber
security has been an important topic for all the organizations in the market [1]. The seminar has
focused on the different mitigation technique of cyber security including the encryption
technique. The standard encryption (TLS) method has been discussed in the seminar. I have
gained technical skills in the encryption technique from the cyber security seminar. The second
seminar has focused on the National Broadband Network and its application. This helped me to
earn precious knowledge on the different topics of networking [2]. In addition, the practical
sessions helped me to gather crucial experience on the subject, those that will help me to take
prompt decisions in real life scenarios while dealing with networking tasks and challenges in a
professional environment.
The use of the network in various fields has been discussed in the seminar. I have gained
knowledge about the networking and different cabling set ups. The impact of networking in the
organization has been discussed in the seminar. I have learned about different networking skills
including hardware and software. The third seminar has focused on the solving real world
problems with IBM Cloud [3]. I have learned about the cloud computing and its benefits in the
company. The use of the cloud computing in the company has been discussed in the report. I
have learned about various problems in the cloud computing including IBM Cloud. The
characteristics and problems in the cloud computing and its services has been learned by me. The
fourth seminar has focused on Melbourne server less meet up [4]. The use of the server less meet
NETWORKING PROJECT
2. Technical skills developed
This professional exposure has helped in gathering new knowledge and skills about the
four events organized. I have developed my professional and technical skills by attends these
four events. The first event, DDLS seminar has been focused on the cybersecurity. Cyber
security has been an important topic for all the organizations in the market [1]. The seminar has
focused on the different mitigation technique of cyber security including the encryption
technique. The standard encryption (TLS) method has been discussed in the seminar. I have
gained technical skills in the encryption technique from the cyber security seminar. The second
seminar has focused on the National Broadband Network and its application. This helped me to
earn precious knowledge on the different topics of networking [2]. In addition, the practical
sessions helped me to gather crucial experience on the subject, those that will help me to take
prompt decisions in real life scenarios while dealing with networking tasks and challenges in a
professional environment.
The use of the network in various fields has been discussed in the seminar. I have gained
knowledge about the networking and different cabling set ups. The impact of networking in the
organization has been discussed in the seminar. I have learned about different networking skills
including hardware and software. The third seminar has focused on the solving real world
problems with IBM Cloud [3]. I have learned about the cloud computing and its benefits in the
company. The use of the cloud computing in the company has been discussed in the report. I
have learned about various problems in the cloud computing including IBM Cloud. The
characteristics and problems in the cloud computing and its services has been learned by me. The
fourth seminar has focused on Melbourne server less meet up [4]. The use of the server less meet
4
NETWORKING PROJECT
up application have been discussed in the seminar. In have learned about the networking
department of the companies in the market.
Future Usage of Knowledge or Skills
I have learnt a lot about advance technologies used in the companies in the market. I
have learnt about the encryption technique used for the cyber security and cloud computing. The
demerits and problems in the cloud computing has been learnt by me. I have learnt technical
skills in the networking system of the company [5]. I can use my learnings in the future for
developing myself as a networking graduate. The use of these professional skills learnt during
the practical exposure of the seminar. I might help my company in making use of my skills and
knowledge. I have learnt how to encrypt a data packet to protect it from hackers and other
intruders. The encryption method have helped in securing data and information in securing data
and information of the company. The use of encryption technique has helped in maintaining the
cyber security of the companies in the market.
Mapping of unit
Events Name Units Outcome
DevSecOps MN502 (Overview of Network Security)
a. Analyze and discuss the main security issues
and emerging trends of information security;
Blockchain Security MN503 (Overview of Internetworking)
b. Explain human factors in achieving business
and technical goals through planning and design.
DDLS Cyber Security MN502 (Overview of Network Security)
f. Demonstrate professional and ethical behavior
NETWORKING PROJECT
up application have been discussed in the seminar. In have learned about the networking
department of the companies in the market.
Future Usage of Knowledge or Skills
I have learnt a lot about advance technologies used in the companies in the market. I
have learnt about the encryption technique used for the cyber security and cloud computing. The
demerits and problems in the cloud computing has been learnt by me. I have learnt technical
skills in the networking system of the company [5]. I can use my learnings in the future for
developing myself as a networking graduate. The use of these professional skills learnt during
the practical exposure of the seminar. I might help my company in making use of my skills and
knowledge. I have learnt how to encrypt a data packet to protect it from hackers and other
intruders. The encryption method have helped in securing data and information in securing data
and information of the company. The use of encryption technique has helped in maintaining the
cyber security of the companies in the market.
Mapping of unit
Events Name Units Outcome
DevSecOps MN502 (Overview of Network Security)
a. Analyze and discuss the main security issues
and emerging trends of information security;
Blockchain Security MN503 (Overview of Internetworking)
b. Explain human factors in achieving business
and technical goals through planning and design.
DDLS Cyber Security MN502 (Overview of Network Security)
f. Demonstrate professional and ethical behavior
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
NETWORKING PROJECT
with regard to network security.
NBN NOC Tour MN504 (Networked Application
Management)
d. Analyse performance and deployment
issues for networked applications;
Google Cloud Platform MN506 (System Management)
a. Analyse and compare various server
management systems;
IPV (Indian Professionals in Victoria) MN503
a. Analyse and discuss the significance of
internetworking for contemporary
organisations.
3. Mapping outcome
I have learnt about cybersecurity as this is my interest of topic. I have been maintaining a
proper approach to the development of the company. I have gained technical skills in the
encryption technique from the cyber security seminar. The second seminar has focused on the
National Broadband Network and its application. The use of the network in various fields has
been discussed in the seminar. The four events have been helping in providing a practical
approach to therefore important topics discussed. I have learnt a lot about the cybersecurity,
cloud computing, networking and application development. The characteristics and problems in
the cloud computing and its services has been learned by me. This variety of knowledge might
help me in getting a proper career as a networking graduate [6]. Therefore, the importance of
these skills have been increased with the application of the skills in the market. The use of the
NETWORKING PROJECT
with regard to network security.
NBN NOC Tour MN504 (Networked Application
Management)
d. Analyse performance and deployment
issues for networked applications;
Google Cloud Platform MN506 (System Management)
a. Analyse and compare various server
management systems;
IPV (Indian Professionals in Victoria) MN503
a. Analyse and discuss the significance of
internetworking for contemporary
organisations.
3. Mapping outcome
I have learnt about cybersecurity as this is my interest of topic. I have been maintaining a
proper approach to the development of the company. I have gained technical skills in the
encryption technique from the cyber security seminar. The second seminar has focused on the
National Broadband Network and its application. The use of the network in various fields has
been discussed in the seminar. The four events have been helping in providing a practical
approach to therefore important topics discussed. I have learnt a lot about the cybersecurity,
cloud computing, networking and application development. The characteristics and problems in
the cloud computing and its services has been learned by me. This variety of knowledge might
help me in getting a proper career as a networking graduate [6]. Therefore, the importance of
these skills have been increased with the application of the skills in the market. The use of the
6
NETWORKING PROJECT
cybersecurity has been maintaining the security of the data and information of the company. The
use of the cybersecurity has been creating various opportunity for me in the future.
The fourth seminar has focused on Melbourne server less meet up. The use of the server
less meet up application have been discussed in the seminar. In have learned about the
networking department of the companies in the market. The use of the cloud computing has been
helping me in understanding the online storage of the data and information in the internet. The
real problems of the cloud computing has been helping in maintaining brief idea about the
solutions in the cloud computing. I have learned about various problems in the cloud computing
including IBM Cloud. Professional Skills [7].
The practical exposure that I have acquired through attending the seminars shall prove to
be extremely helpful in the fields of network computing. The skills that I have acquired can be
largely grouped under the banners of Cloud computing, network security, data mining,
broadband connectivity and many more. This will help me to solve real world networking
problems and develop networking environments with more knowledge and precision. I did not
like was that in some cases they did not provide the hidden details behind the highlighted issues
which is however understandable owing to the shortage of time in these seminars.
For example, the practical knowledge that I had developed regarding cryptography has
provided crucial information in the field of network security. Cryptography is the process of
encrypting data that is stored on the servers of the cloud, thus protecting them from unauthorized
access. Data security is the most important factor in networking, in the modern times [8]. I have
learned to use the various tools and techniques that help in the process of encryption and
decryption. These include Triple AES, Blowfish and Towfish techniques. These techniques are
used widely by several U.S Government and other private organizations all over the world.
NETWORKING PROJECT
cybersecurity has been maintaining the security of the data and information of the company. The
use of the cybersecurity has been creating various opportunity for me in the future.
The fourth seminar has focused on Melbourne server less meet up. The use of the server
less meet up application have been discussed in the seminar. In have learned about the
networking department of the companies in the market. The use of the cloud computing has been
helping me in understanding the online storage of the data and information in the internet. The
real problems of the cloud computing has been helping in maintaining brief idea about the
solutions in the cloud computing. I have learned about various problems in the cloud computing
including IBM Cloud. Professional Skills [7].
The practical exposure that I have acquired through attending the seminars shall prove to
be extremely helpful in the fields of network computing. The skills that I have acquired can be
largely grouped under the banners of Cloud computing, network security, data mining,
broadband connectivity and many more. This will help me to solve real world networking
problems and develop networking environments with more knowledge and precision. I did not
like was that in some cases they did not provide the hidden details behind the highlighted issues
which is however understandable owing to the shortage of time in these seminars.
For example, the practical knowledge that I had developed regarding cryptography has
provided crucial information in the field of network security. Cryptography is the process of
encrypting data that is stored on the servers of the cloud, thus protecting them from unauthorized
access. Data security is the most important factor in networking, in the modern times [8]. I have
learned to use the various tools and techniques that help in the process of encryption and
decryption. These include Triple AES, Blowfish and Towfish techniques. These techniques are
used widely by several U.S Government and other private organizations all over the world.
7
NETWORKING PROJECT
Through these learnings I have managed to protect virtual servers from intended attacks by
encrypting crucial data that was presented as part of practical test exercises.
Graduate Outcome Table
MIT Graduate Attributes Justify the coverage
based on capstone
project exposure and
professional
exposure
Ability to
Communicate
The ability to communicate effectively and appropriately
in a range of contexts to achieve high order speaking,
listening, reading, writing, numeracy and information
technology communication skills.
This skill is developed
during this seminar.
Independent
and Lifelong
Learning
A capacity to be a self-directed learner and thinker and to
study and work independently. Resulting in continuous
learning, resilience, confidence, learning transferable and
time management skills and an ability to learn
independently.
The NBN event was
one of the technical
event. However, the
trainer has helped in
creating a proper
learning to an
advanced level.
Ethics
Awareness, sensitivity, and commitment to ethics and
ethical standards in personal, social, business and
professional contexts.
I would like to
mention the IBM
Cloud event here. The
event has focused on
the real knowledge of
ethics helps to improve
skill in the capstone
project.
Analytical
and Problem
Solving
The ability to collect, analyse and evaluate information
and ideas and to solve problems by thinking clearly,
critically and creatively to solve problems and issues
using established methods of enquiry.
The NBN NOC tour
has covered up this
area. But, I need to
improve this skill set
more.
Cultural and
Global
Awareness
An acknowledgment of and respect for: equality of
opportunity; individual and social responsibility; and a
recognition and appreciation of other cultures and times
recognizing the global context of business.
The cybersecurity
event was one of those
that covered up this
knowledge area by
taking examples of
other countries such as
India, Australia and
NETWORKING PROJECT
Through these learnings I have managed to protect virtual servers from intended attacks by
encrypting crucial data that was presented as part of practical test exercises.
Graduate Outcome Table
MIT Graduate Attributes Justify the coverage
based on capstone
project exposure and
professional
exposure
Ability to
Communicate
The ability to communicate effectively and appropriately
in a range of contexts to achieve high order speaking,
listening, reading, writing, numeracy and information
technology communication skills.
This skill is developed
during this seminar.
Independent
and Lifelong
Learning
A capacity to be a self-directed learner and thinker and to
study and work independently. Resulting in continuous
learning, resilience, confidence, learning transferable and
time management skills and an ability to learn
independently.
The NBN event was
one of the technical
event. However, the
trainer has helped in
creating a proper
learning to an
advanced level.
Ethics
Awareness, sensitivity, and commitment to ethics and
ethical standards in personal, social, business and
professional contexts.
I would like to
mention the IBM
Cloud event here. The
event has focused on
the real knowledge of
ethics helps to improve
skill in the capstone
project.
Analytical
and Problem
Solving
The ability to collect, analyse and evaluate information
and ideas and to solve problems by thinking clearly,
critically and creatively to solve problems and issues
using established methods of enquiry.
The NBN NOC tour
has covered up this
area. But, I need to
improve this skill set
more.
Cultural and
Global
Awareness
An acknowledgment of and respect for: equality of
opportunity; individual and social responsibility; and a
recognition and appreciation of other cultures and times
recognizing the global context of business.
The cybersecurity
event was one of those
that covered up this
knowledge area by
taking examples of
other countries such as
India, Australia and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
NETWORKING PROJECT
South Africa.
Team work
A capacity to relate to, collaborate with, and, where
appropriate lead others, and to exchange views and ideas
in order to achieve desired outcomes through teamwork,
negotiation, conflict resolution, and leadership.
The Melbourne
serverless meetup
event has shed light
upon teamwork skills.
Specialist
knowledge of
a field of
study
Comprehensive specialist knowledge of a field of study
and defined professional skills ensuring work readiness.
The NBN event’s
trainer has provided
speech on the
specialist knowledge
of a field of study.
Future plan
Having been engrossed with the knowledge of networking, I would like to endorse
myself in the professional realms of networking. However, the concept of cyber security
entertained me the most. I hope to have ample beginners’ knowledge to pursue a career in Cyber
Security.
With the advent of the internet, cyber security has been the biggest challenge of
information technology. These threats include hacking, phishing, man-in-the-middle attacks and
many more. Hacking involves expert personnel to enter someone else’s account or system
without their prior knowledge and hence make unauthorized modifications or get away with
thefts. Through phishing, a third-party application can acquire login details of other users
without their knowledge. DDOS attacks are however very common nowadays. Cybercriminals
all over the world has now chosen this technique to destabilize the website servers of the big
corporate names of the world thus hindering their official delicacies[9].
I had always been awed by the practicalities of network computing, even though I could
not figure which field of networking attracted me the most. Over the time period due to the
seminars, I got to learn more due to my interaction with many experts. These practical sessions
NETWORKING PROJECT
South Africa.
Team work
A capacity to relate to, collaborate with, and, where
appropriate lead others, and to exchange views and ideas
in order to achieve desired outcomes through teamwork,
negotiation, conflict resolution, and leadership.
The Melbourne
serverless meetup
event has shed light
upon teamwork skills.
Specialist
knowledge of
a field of
study
Comprehensive specialist knowledge of a field of study
and defined professional skills ensuring work readiness.
The NBN event’s
trainer has provided
speech on the
specialist knowledge
of a field of study.
Future plan
Having been engrossed with the knowledge of networking, I would like to endorse
myself in the professional realms of networking. However, the concept of cyber security
entertained me the most. I hope to have ample beginners’ knowledge to pursue a career in Cyber
Security.
With the advent of the internet, cyber security has been the biggest challenge of
information technology. These threats include hacking, phishing, man-in-the-middle attacks and
many more. Hacking involves expert personnel to enter someone else’s account or system
without their prior knowledge and hence make unauthorized modifications or get away with
thefts. Through phishing, a third-party application can acquire login details of other users
without their knowledge. DDOS attacks are however very common nowadays. Cybercriminals
all over the world has now chosen this technique to destabilize the website servers of the big
corporate names of the world thus hindering their official delicacies[9].
I had always been awed by the practicalities of network computing, even though I could
not figure which field of networking attracted me the most. Over the time period due to the
seminars, I got to learn more due to my interaction with many experts. These practical sessions
9
NETWORKING PROJECT
helped me to magnify into the core aspects of networking and has certainly guided me to choose
a career in this. As mentioned in the section above, I finally chose network security as a career
path. The challenges in cyber security needs to be addressed with highest priority and I would
like to be a part of the change.
To interact with aspirants and experts from various universities have been the best aspect
of the professional exposure. This helped me to earn precious knowledge on the different topics
of networking. In addition, the practical sessions helped me to gather crucial experience on the
subject, those that will help me to take prompt decisions in real life scenarios while dealing with
networking tasks and challenges in a professional environment. One thing that I did not like was
that in some cases they did not provide the hidden details behind the highlighted issues which is
however understandable owing to the shortage of time in these seminars. Nevertheless, I would
like to take forward these learnings and brush up the practical qualities with more practice and
finally move forward in my career path.
NETWORKING PROJECT
helped me to magnify into the core aspects of networking and has certainly guided me to choose
a career in this. As mentioned in the section above, I finally chose network security as a career
path. The challenges in cyber security needs to be addressed with highest priority and I would
like to be a part of the change.
To interact with aspirants and experts from various universities have been the best aspect
of the professional exposure. This helped me to earn precious knowledge on the different topics
of networking. In addition, the practical sessions helped me to gather crucial experience on the
subject, those that will help me to take prompt decisions in real life scenarios while dealing with
networking tasks and challenges in a professional environment. One thing that I did not like was
that in some cases they did not provide the hidden details behind the highlighted issues which is
however understandable owing to the shortage of time in these seminars. Nevertheless, I would
like to take forward these learnings and brush up the practical qualities with more practice and
finally move forward in my career path.
10
NETWORKING PROJECT
References
[1] Mackey, Tim K., and Gaurvika Nayyar. "Digital danger: a review of the global public
health, patient safety and cybersecurity threats posed by illicit online
pharmacies." British medical bulletin 118, no. 1 (2016): 110-126.
[2] Mittal, Sudip, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin.
"Cybertwitter: Using twitter to generate alerts for cybersecurity threats and
vulnerabilities." In Advances in Social Networks Analysis and Mining (ASONAM), 2016
IEEE/ACM International Conference on, pp. 860-867. IEEE, 2016.
[3] Peng, Shin-yi. "Cybersecurity threats and the WTO national security
exceptions." Journal of International Economic Law18, no. 2 (2015): 449-478.
[4] Montgomery, Chelsea. "New Security for a New Era: An Investigation into Law
Enforcement Cybersecurity Threats, Obstacles, and Community Applications." PhD diss.,
Utica College, 2017.
[5] Rubio, Juan E., Javier Lopez, and Rodrigo Roman-Castro. "Analysis of cybersecurity
threats in Industry 4.0: the case of intrusion detection." (2018).
[6] Nobles, Calvin. "Cyber threats in civil aviation." In Cyber Security and Threats:
Concepts, Methodologies, Tools, and Applications, pp. 1185-1207. IGI Global, 2018.
[7] Webb, Timothy, and Sumer Dayal. "Building the wall: Addressing cybersecurity risks in
medical devices in the USA and Australia." Computer Law & Security Review 33, no. 4
(2017): 559-563.
[8] Johnson, Tsutomu. "Sorry I Lost Your Files: Cybersecurity Threats to
Confidentiality." Utah BJ 28 (2015).
NETWORKING PROJECT
References
[1] Mackey, Tim K., and Gaurvika Nayyar. "Digital danger: a review of the global public
health, patient safety and cybersecurity threats posed by illicit online
pharmacies." British medical bulletin 118, no. 1 (2016): 110-126.
[2] Mittal, Sudip, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin.
"Cybertwitter: Using twitter to generate alerts for cybersecurity threats and
vulnerabilities." In Advances in Social Networks Analysis and Mining (ASONAM), 2016
IEEE/ACM International Conference on, pp. 860-867. IEEE, 2016.
[3] Peng, Shin-yi. "Cybersecurity threats and the WTO national security
exceptions." Journal of International Economic Law18, no. 2 (2015): 449-478.
[4] Montgomery, Chelsea. "New Security for a New Era: An Investigation into Law
Enforcement Cybersecurity Threats, Obstacles, and Community Applications." PhD diss.,
Utica College, 2017.
[5] Rubio, Juan E., Javier Lopez, and Rodrigo Roman-Castro. "Analysis of cybersecurity
threats in Industry 4.0: the case of intrusion detection." (2018).
[6] Nobles, Calvin. "Cyber threats in civil aviation." In Cyber Security and Threats:
Concepts, Methodologies, Tools, and Applications, pp. 1185-1207. IGI Global, 2018.
[7] Webb, Timothy, and Sumer Dayal. "Building the wall: Addressing cybersecurity risks in
medical devices in the USA and Australia." Computer Law & Security Review 33, no. 4
(2017): 559-563.
[8] Johnson, Tsutomu. "Sorry I Lost Your Files: Cybersecurity Threats to
Confidentiality." Utah BJ 28 (2015).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
NETWORKING PROJECT
[9] Goode, Jodi. "Towards A Comparison of Training Methodologies on Employee’s
Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical
Programs." (2016).
NETWORKING PROJECT
[9] Goode, Jodi. "Towards A Comparison of Training Methodologies on Employee’s
Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical
Programs." (2016).
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.