Peer Evaluation and Reflective Journal on Professional Experience
VerifiedAdded on 2023/06/11
|9
|1615
|69
AI Summary
This report provides a reflective analysis of attending CCNA Security, Cyber Security Incident Response Fundamentals and #DisruptorsInTech in Data Analytics. It describes the technical and professional skills developed, weaknesses improved and recommendations for degree programs.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Peer Evaluation and Reflective Journal on Professional Experience
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Content
1.0 Introduction 2
2.0 Technical Skill Development 2
3.0 Professional Skill Development 4
4.0 Conclusion 6
References 7
1
1.0 Introduction 2
2.0 Technical Skill Development 2
3.0 Professional Skill Development 4
4.0 Conclusion 6
References 7
1
1.0 Introduction
The report will provide a reflective analysis of three events attended on CCNA Security (i),
Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics
(iii) as a networking graduate- to- be. How each event helped in extending knowledge, how prior
knowledge was implemented and the course of professional skill developed will be reflected
upon.
2.0 Technical Skill Development
The fundamental technical skills developed by attending each of the events are described below:
2.1 Summary of Overall Industry Experience
I was fortunate to undergo the industry experience which acted as a source of knowledge for me
that would last throughout my career. The first day, I felt a mixture of excitement, nervousness
and enthusiasm. As someone highly interested in networking, the exposure I received in all the
three events of the industry experience helped me tremendously by increasing my observing
skills and extending my team working abilities. The exposure gained via CCNA Security is
certainly going to help me in applying the knowledge to practical purposes such as being able to
test ACLs in test environments, development of secure network management plane and in the
implementation of practices such as AAA, Role Based Access Control, NTP, Syslog and others.
Through the event on Cyber Security Incident Response Fundamentals the knowledge gained
will act as a means to find exposure in applying the core principles such as in the principles of
advanced persistent threat attack groups, in discovery of review alerts, log files, common
2
The report will provide a reflective analysis of three events attended on CCNA Security (i),
Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics
(iii) as a networking graduate- to- be. How each event helped in extending knowledge, how prior
knowledge was implemented and the course of professional skill developed will be reflected
upon.
2.0 Technical Skill Development
The fundamental technical skills developed by attending each of the events are described below:
2.1 Summary of Overall Industry Experience
I was fortunate to undergo the industry experience which acted as a source of knowledge for me
that would last throughout my career. The first day, I felt a mixture of excitement, nervousness
and enthusiasm. As someone highly interested in networking, the exposure I received in all the
three events of the industry experience helped me tremendously by increasing my observing
skills and extending my team working abilities. The exposure gained via CCNA Security is
certainly going to help me in applying the knowledge to practical purposes such as being able to
test ACLs in test environments, development of secure network management plane and in the
implementation of practices such as AAA, Role Based Access Control, NTP, Syslog and others.
Through the event on Cyber Security Incident Response Fundamentals the knowledge gained
will act as a means to find exposure in applying the core principles such as in the principles of
advanced persistent threat attack groups, in discovery of review alerts, log files, common
2
character encodings and carrier files recognition and in the usage of hex editors and indicators
effectively.
2.3 Knowledge Acquired during Industrial Exposure
i) CCNA Security: Prior to attending the Cisco Certified Network Associate (CCNA) in
Security, I had a prior knowledge of basic network and information security principles. Through
the lectures provided through the course, I developed an understanding of AAA and its design
considerations. Such unities grasped over the course period helped me greatly while attending
the event on CCNA Security. Firstly, the demonstration of prior knowledge of common security
threats within a network helped greatly in understanding how to secure the control, management
and data planes of Cisco devices such as the routers.
The most fundamentally important new skills developed included applications of the knowledge
on basics of AAA, thereby learning about Command Line Interface, Cisco Configuration
Professional and how authenticity differs between TACAS and RADIUS. Furthermore, an
understanding on Access Control Lists (ACLs) within threat mitigation environments in network
was discussed. Other new skill is developed that I’d like to further explore include the
implementation of site- to- site VPN and configured SSL VPN via graphical device manager, in
setting up VPN tunnels, and implementation of Cisco Firewall Technologies.
ii) Cyber Security Incident Response Fundamentals: Inherently a fundamental topic in
networking, attending the event on the fundamentals of cyber security incident response
provided me with a plethora of knowledge. Primarily, I acquired the fundamental understanding
on how to better understand factors of where to begin, how to evaluate a situation, how to gather
information and evidence in the desired order and in knowing when to request outside assistance.
3
effectively.
2.3 Knowledge Acquired during Industrial Exposure
i) CCNA Security: Prior to attending the Cisco Certified Network Associate (CCNA) in
Security, I had a prior knowledge of basic network and information security principles. Through
the lectures provided through the course, I developed an understanding of AAA and its design
considerations. Such unities grasped over the course period helped me greatly while attending
the event on CCNA Security. Firstly, the demonstration of prior knowledge of common security
threats within a network helped greatly in understanding how to secure the control, management
and data planes of Cisco devices such as the routers.
The most fundamentally important new skills developed included applications of the knowledge
on basics of AAA, thereby learning about Command Line Interface, Cisco Configuration
Professional and how authenticity differs between TACAS and RADIUS. Furthermore, an
understanding on Access Control Lists (ACLs) within threat mitigation environments in network
was discussed. Other new skill is developed that I’d like to further explore include the
implementation of site- to- site VPN and configured SSL VPN via graphical device manager, in
setting up VPN tunnels, and implementation of Cisco Firewall Technologies.
ii) Cyber Security Incident Response Fundamentals: Inherently a fundamental topic in
networking, attending the event on the fundamentals of cyber security incident response
provided me with a plethora of knowledge. Primarily, I acquired the fundamental understanding
on how to better understand factors of where to begin, how to evaluate a situation, how to gather
information and evidence in the desired order and in knowing when to request outside assistance.
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The three step procedure of react, respond and recover during cyber security incident was better
to comprehend due to my prior knowledge gained from the lectures held on basic term
definitions of incident, anomaly, forensics and computer forensics, in having a prior knowledge
on types of attackers, target of attacks, various purposes of attack and the response requirements.
Therefore, through such prior knowledge I was able to gain knowledge on the three steps. How
to react, that is review policy and procedure, evaluate situation, avoid panic, collect information
and take appropriate actions, respond (ii) through requesting information, evaluation of
secutation, ot stop the attack and securing the crime scene, in preserving evidence and organizing
forensic examination, in finding notes and determining the key causes, and last of all on how to
recover (iii) by raising security expectations, evaluation of current security positions, in the
creation of implementation plan, the order of actions to be taken, in the validation of
implementation and determination of unexpected expectations.
iii) #Disruptors Tech in Data Analytics: The key knowledge I gained were topics of Artificial
Intelligence (AI) as a significant technology disruptor, and how cloud computing and machine-
learning applications play a key role. Furthermore, in- depth understanding of IoT (Internet of
Things), blockchain, big data for governance, how to avoid data lakes and significance of
machine learning in impacting micro- services were gained.
2.4 Where can you use the experince in future?
I can work in IT companies as a system adminsitrato, network engineer or technical associate
where I can implmente the knwoldge I gained in the respective events of the industrali experince.
4
to comprehend due to my prior knowledge gained from the lectures held on basic term
definitions of incident, anomaly, forensics and computer forensics, in having a prior knowledge
on types of attackers, target of attacks, various purposes of attack and the response requirements.
Therefore, through such prior knowledge I was able to gain knowledge on the three steps. How
to react, that is review policy and procedure, evaluate situation, avoid panic, collect information
and take appropriate actions, respond (ii) through requesting information, evaluation of
secutation, ot stop the attack and securing the crime scene, in preserving evidence and organizing
forensic examination, in finding notes and determining the key causes, and last of all on how to
recover (iii) by raising security expectations, evaluation of current security positions, in the
creation of implementation plan, the order of actions to be taken, in the validation of
implementation and determination of unexpected expectations.
iii) #Disruptors Tech in Data Analytics: The key knowledge I gained were topics of Artificial
Intelligence (AI) as a significant technology disruptor, and how cloud computing and machine-
learning applications play a key role. Furthermore, in- depth understanding of IoT (Internet of
Things), blockchain, big data for governance, how to avoid data lakes and significance of
machine learning in impacting micro- services were gained.
2.4 Where can you use the experince in future?
I can work in IT companies as a system adminsitrato, network engineer or technical associate
where I can implmente the knwoldge I gained in the respective events of the industrali experince.
4
3.0 Professional Skill Development
Through the three events attended, on CCNA Security (i), Cyber Security Incident Response
Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii) the skills developed helped me
focus on attaining self- regulating characteristics in order to reflect the professional standards
established by the ACS Professional Standards Scheme and in the Professional Standards
legislation (ACS, 2015). Each individual events provided me with the opportunity to learn skills
in the core knowledge areas of problem solving, abstraction and design, ethics and
professionalism, in concepts of teamwork and issues and lastly, in the development of
interpersonal communication skills.
Example: Demonstration on how I was able to develop my interpersonal skills, which were my
key weak area can be understood through how I was able to improve my skills of negotiation,
verbal and nonverbal communication, problem- solving, decision- making and assertiveness
through the team work we had to do in all the three courses. This happened on the second day of
the intership, when we recieved a query in call with regards to a client who could not open the
copmany outlook. Hence, this was solved as a team where we retieved the IP address remotely ,
cleared licensing issues and worked on client feedback. Furthermore, other people skills learned
included development of an understanding on the importance of ICT application which involve
the development of a mindset recognized by the users, align with their work practices and
organizational contexts.
3.1 Graduate Outcomes Table (Appendix A)
Table:
5
Through the three events attended, on CCNA Security (i), Cyber Security Incident Response
Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii) the skills developed helped me
focus on attaining self- regulating characteristics in order to reflect the professional standards
established by the ACS Professional Standards Scheme and in the Professional Standards
legislation (ACS, 2015). Each individual events provided me with the opportunity to learn skills
in the core knowledge areas of problem solving, abstraction and design, ethics and
professionalism, in concepts of teamwork and issues and lastly, in the development of
interpersonal communication skills.
Example: Demonstration on how I was able to develop my interpersonal skills, which were my
key weak area can be understood through how I was able to improve my skills of negotiation,
verbal and nonverbal communication, problem- solving, decision- making and assertiveness
through the team work we had to do in all the three courses. This happened on the second day of
the intership, when we recieved a query in call with regards to a client who could not open the
copmany outlook. Hence, this was solved as a team where we retieved the IP address remotely ,
cleared licensing issues and worked on client feedback. Furthermore, other people skills learned
included development of an understanding on the importance of ICT application which involve
the development of a mindset recognized by the users, align with their work practices and
organizational contexts.
3.1 Graduate Outcomes Table (Appendix A)
Table:
5
MIT Graduate Attribute Justification
Ability to Communicate ✓
Independent and Lifelong Learning I was able to apply knowledge gained
independently.
Ethics Understanding ethics helped me realize how
to handle sensitive infromation better.
Amaytical and Problem Solving Unites provided at MIT helped me gaint he
prior knwoeldge to revole the IT issues during
process flow.
Cultural and Global Awareness I acknowledge the sociala dn cultural diversity
present in our country greatly.
Team Work Working on previous team projects like in
MN629, I was able to work well in team tasks
here.
Specialist knowledge of a field of study I have developed skills required for network
engineer, hence I am ready.
3.2 Based on your industry experience what would you like to change in the way and
manner you approach your study?
6
Ability to Communicate ✓
Independent and Lifelong Learning I was able to apply knowledge gained
independently.
Ethics Understanding ethics helped me realize how
to handle sensitive infromation better.
Amaytical and Problem Solving Unites provided at MIT helped me gaint he
prior knwoeldge to revole the IT issues during
process flow.
Cultural and Global Awareness I acknowledge the sociala dn cultural diversity
present in our country greatly.
Team Work Working on previous team projects like in
MN629, I was able to work well in team tasks
here.
Specialist knowledge of a field of study I have developed skills required for network
engineer, hence I am ready.
3.2 Based on your industry experience what would you like to change in the way and
manner you approach your study?
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
As a networking graduate I would like to focus on my interpersonal skill development
furthermore. This indicates that there will be a change in the manner of my study and focus,
where in the future I’d like to engage new people by being a better listener as IT support help
will be asked of by less tech- savvy peers, in multitasking so I am able to manage multiple
problems and projects and last but not the least, would like to increase my exposure to areas of
networking and strengthen my specialization.
3.3 What would you recommend to those who structure your degree program to change to ensure
you become a successful network in future?
Recommendation:
i) More units for development of interpersonal skills.
ii) Certification classes and units.
iii) More applications of real- world problems.
4.0 Conclusion
This report provided a reflective analysis, both technical and professional reflection in ICT as
three events on networking were attending on the subjects of CCNA Security (i), Cyber Security
Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii). The report
individually described the key reflection of each events as well as the overall experience, in how
the weaknesses of professional skills were improved and how the skills will be further honed in
the future.
7
furthermore. This indicates that there will be a change in the manner of my study and focus,
where in the future I’d like to engage new people by being a better listener as IT support help
will be asked of by less tech- savvy peers, in multitasking so I am able to manage multiple
problems and projects and last but not the least, would like to increase my exposure to areas of
networking and strengthen my specialization.
3.3 What would you recommend to those who structure your degree program to change to ensure
you become a successful network in future?
Recommendation:
i) More units for development of interpersonal skills.
ii) Certification classes and units.
iii) More applications of real- world problems.
4.0 Conclusion
This report provided a reflective analysis, both technical and professional reflection in ICT as
three events on networking were attending on the subjects of CCNA Security (i), Cyber Security
Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii). The report
individually described the key reflection of each events as well as the overall experience, in how
the weaknesses of professional skills were improved and how the skills will be further honed in
the future.
7
References
ACS (2015). ACS CORE BODY OF KNOWLEDGE FOR ICT PROFESSIONALS (CBOK),
Avilable at: https://www.acs.org.au/content/dam/acs/acs-skills/The-ACS-Core-Body-of-
Knowledge-for-ICT-Professionals-CBOK.pdf Accessed: July 10, 2018
8
ACS (2015). ACS CORE BODY OF KNOWLEDGE FOR ICT PROFESSIONALS (CBOK),
Avilable at: https://www.acs.org.au/content/dam/acs/acs-skills/The-ACS-Core-Body-of-
Knowledge-for-ICT-Professionals-CBOK.pdf Accessed: July 10, 2018
8
1 out of 9
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.