Peer Evaluation and Reflective Journal on Professional Experience
Verified
Added on Ā 2023/06/11
|9
|1615
|69
AI Summary
This report provides a reflective analysis of attending CCNA Security, Cyber Security Incident Response Fundamentals and #DisruptorsInTech in Data Analytics. It describes the technical and professional skills developed, weaknesses improved and recommendations for degree programs.
Contribute Materials
Your contribution can guide someoneās learning journey. Share your
documents today.
Peer Evaluationand Reflective Journal on Professional Experience
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Content 1.0 Introduction2 2.0 Technical Skill Development2 3.0 Professional Skill Development4 4.0 Conclusion6 References7 1
1.0 Introduction The report will provide a reflective analysis of three events attended on CCNA Security (i), Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii) as a networking graduate- to- be. How each event helped in extending knowledge, how prior knowledge was implemented and the course of professional skill developed will be reflected upon. 2.0 Technical Skill Development The fundamental technical skills developed by attending each of the events are described below: 2.1 Summary of Overall Industry Experience I was fortunate to undergo the industry experience which acted as a source of knowledge for me that would last throughout my career. The first day, I felt a mixture of excitement, nervousness and enthusiasm. As someone highly interested in networking, the exposure I received in all the three events of the industry experience helped me tremendously by increasing my observing skills and extending my team working abilities. The exposure gained via CCNA Security is certainly going to help me in applying the knowledge to practical purposes such as being able to test ACLs in test environments, development of secure network management plane and in the implementation of practices such as AAA, Role Based Access Control, NTP, Syslog and others. Through the event on Cyber Security Incident Response Fundamentals the knowledge gained will act as a means to find exposure in applying the core principles such as in the principles of advanced persistent threat attack groups, in discovery of review alerts, log files, common 2
character encodings and carrier files recognition and in the usage of hex editors and indicators effectively. 2.3 Knowledge Acquired during Industrial Exposure i) CCNA Security:Prior to attending the Cisco Certified Network Associate (CCNA) in Security, I had a prior knowledge of basic network and information security principles. Through the lectures provided through the course, I developed an understanding of AAA and its design considerations. Such unities grasped over the course period helped me greatly while attending the event on CCNA Security. Firstly, the demonstration of prior knowledge of common security threats within a network helped greatly in understanding how to secure the control, management and data planes of Cisco devices such as the routers. The most fundamentally important new skills developed included applications of the knowledge on basics of AAA, thereby learning about Command Line Interface, Cisco Configuration Professional and how authenticity differs between TACAS and RADIUS. Furthermore, an understanding on Access Control Lists (ACLs) within threat mitigation environments in network was discussed. Other new skill is developed that Iād like to further explore include the implementation of site- to- site VPN and configured SSL VPN via graphical device manager, in setting up VPN tunnels, and implementation of Cisco Firewall Technologies. ii) Cyber Security Incident Response Fundamentals:Inherently a fundamental topic in networking, attendingthe event on the fundamentalsof cyber security incident response provided me with a plethora of knowledge. Primarily, I acquired the fundamental understanding on how to better understand factors of where to begin, how to evaluate a situation, how to gather information and evidence in the desired order and in knowing when to request outside assistance. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The three step procedure of react, respond and recover during cyber security incident was better to comprehend due to my prior knowledge gained from the lectures held on basic term definitions of incident, anomaly, forensics and computer forensics, in having a prior knowledge on types of attackers, target of attacks, various purposes of attack and the response requirements. Therefore, through such prior knowledge I was able to gain knowledge on the three steps. How to react, that is review policy and procedure, evaluate situation, avoid panic, collect information andtakeappropriateactions,respond(ii)throughrequestinginformation,evaluationof secutation, ot stop the attack and securing the crime scene, in preserving evidence and organizing forensic examination, in finding notes and determining the key causes, and last of all on how to recover (iii) by raising security expectations, evaluation of current security positions, in the creationofimplementationplan,theorderofactionstobetaken,inthevalidationof implementation and determination of unexpected expectations. iii) #Disruptors Tech in Data Analytics:The key knowledge I gained were topics of Artificial Intelligence (AI) as a significant technology disruptor, and how cloud computing and machine- learning applications play a key role. Furthermore, in- depthunderstanding of IoT (Internet of Things), blockchain, big data for governance, how to avoid data lakes and significance of machine learning in impacting micro- services were gained. 2.4 Where can you use the experince in future? I can work in IT companies as a system adminsitrato, network engineer or technical associate where I can implmente the knwoldge I gained in the respective events of the industrali experince. 4
3.0 Professional Skill Development Through the three events attended, on CCNA Security (i), Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii) the skills developed helped me focus on attainingself- regulating characteristics in order to reflect the professional standards established by the ACS Professional Standards Scheme and in the Professional Standards legislation (ACS, 2015). Each individual events provided me with the opportunity to learn skills inthecoreknowledgeareasofproblemsolving,abstractionanddesign,ethicsand professionalism,inconceptsofteamworkandissuesandlastly,inthedevelopmentof interpersonal communication skills. Example: Demonstration on how I was able to develop my interpersonal skills, which were my key weak area can be understood through how I was able to improve my skills of negotiation, verbal and nonverbal communication, problem- solving, decision- making and assertiveness through the team work we had to do in all the three courses. This happened on the second day of the intership, when we recieved a query in call with regards to a client who could not open the copmany outlook. Hence, this was solved as a team where we retieved the IP address remotely , cleared licensing issues and worked on client feedback. Furthermore, other people skills learned included development of an understanding on the importance of ICT application which involve the development of a mindset recognized by the users, align with their work practices and organizational contexts. 3.1 Graduate Outcomes Table (Appendix A) Table: 5
MIT Graduate AttributeJustification Ability to Communicateā Independent and Lifelong LearningIwasabletoapplyknowledgegained independently. EthicsUnderstanding ethics helped me realize how to handle sensitive infromation better. Amaytical and Problem SolvingUnites provided at MIT helped me gaint he prior knwoeldge to revole the IT issues during process flow. Cultural and Global AwarenessI acknowledge the sociala dn cultural diversity present in our country greatly. Team WorkWorking on previous team projects like in MN629, I was able to work well in team tasks here. Specialist knowledge of a field of studyI have developed skills required for network engineer, hence I am ready. 3.2Based on your industry experience what would you like to change in the way and manner you approach your study? 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Asa networking graduateI would like to focuson my interpersonalskill development furthermore. This indicates that there will be a change in the manner of my study and focus, where in the future Iād like to engage new people by being a better listener as IT support help will be asked of by less tech- savvy peers, in multitasking so I am able to manage multiple problems and projects and last but not the least, would like to increase my exposure to areas of networking and strengthen my specialization. 3.3What would you recommend to those who structure your degree program to change to ensure you become a successful network in future? Recommendation: i)More units for development of interpersonal skills. ii)Certification classes and units. iii)More applications of real- world problems. 4.0 Conclusion This report provided a reflective analysis, both technical and professional reflection in ICT as three events on networking were attending on the subjects ofCCNA Security (i), Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii). The report individually described the key reflection of each events as well as the overall experience, in how the weaknesses of professional skills were improved and how the skills will be further honed in the future. 7
References ACS (2015). ACS CORE BODY OF KNOWLEDGE FOR ICT PROFESSIONALS (CBOK), Avilableat:https://www.acs.org.au/content/dam/acs/acs-skills/The-ACS-Core-Body-of- Knowledge-for-ICT-Professionals-CBOK.pdfAccessed: July 10, 2018 8