Reflective Report: Networking Fundamentals
VerifiedAdded on 2023/06/11
|8
|1263
|60
AI Summary
The report provides a reflective analysis of three events attended on CCNA Security, Cyber Security Incident Response Fundamentals and #DisruptorsInTech in Data Analytics as a networking graduate-to-be. It describes the technical skills developed and the professional skill development through each event. The report also includes a table of MIT Graduate Attributes and a conclusion.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Reflective Report: Networking Fundamentals
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Content
1.0 Introduction 2
2.0 Technical Skill Development 2
3.0 Professional Skill Development 4
4.0 Conclusion 6
References 7
1
1.0 Introduction 2
2.0 Technical Skill Development 2
3.0 Professional Skill Development 4
4.0 Conclusion 6
References 7
1
1.0 Introduction
The report will provide a reflective analysis of three events attended on CCNA Security (i),
Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics
(iii) as a networking graduate- to- be. How each event helped in extending knowledge, how prior
knowledge was implemented and the course of professional skill developed will be reflected
upon.
2.0 Technical Skill Development
The fundamental technical skills developed by attending each of the events are described below:
i) CCNA Security: Prior to attending the Cisco Certified Network Associate (CCNA) in
Security, I had a prior knowledge of basic network and information security principles. Through
the lectures provided through the course, I developed an understanding of AAA and its design
considerations. Such unities grasped over the course period helped me greatly while attending
the event on CCNA Security. Firstly, the demonstration of prior knowledge of common security
threats within a network helped greatly in understanding how to secure the control, management
and data planes of Cisco devices such as the routers.
The most fundamentally important new skills developed included applications of the knowledge
on basics of AAA, thereby learning about Command Line Interface, Cisco Configuration
Professional and how authenticity differs between TACAS and RADIUS. Furthermore, an
understanding on Access Control Lists (ACLs) within threat mitigation environments in network
were discussed. Other new skill is developed that I’d like to further explore include the
2
The report will provide a reflective analysis of three events attended on CCNA Security (i),
Cyber Security Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics
(iii) as a networking graduate- to- be. How each event helped in extending knowledge, how prior
knowledge was implemented and the course of professional skill developed will be reflected
upon.
2.0 Technical Skill Development
The fundamental technical skills developed by attending each of the events are described below:
i) CCNA Security: Prior to attending the Cisco Certified Network Associate (CCNA) in
Security, I had a prior knowledge of basic network and information security principles. Through
the lectures provided through the course, I developed an understanding of AAA and its design
considerations. Such unities grasped over the course period helped me greatly while attending
the event on CCNA Security. Firstly, the demonstration of prior knowledge of common security
threats within a network helped greatly in understanding how to secure the control, management
and data planes of Cisco devices such as the routers.
The most fundamentally important new skills developed included applications of the knowledge
on basics of AAA, thereby learning about Command Line Interface, Cisco Configuration
Professional and how authenticity differs between TACAS and RADIUS. Furthermore, an
understanding on Access Control Lists (ACLs) within threat mitigation environments in network
were discussed. Other new skill is developed that I’d like to further explore include the
2
implementation of site- to- site VPN and configured SSL VPN via graphical device manager, in
setting up VPN tunnels, and implementation of Cisco Firewall Technologies.
ii) Cyber Security Incident Response Fundamentals: Inherently a fundamental topic in
networking, attending the event on the fundamentals of cyber security incident response
provided me with a plethora of knowledge. Primarily, I acquired the fundamental understanding
on how to better understand factors of where to begin, how to evaluate a situation, how to gather
information and evidence in the desired order and in knowing when to request outside assistance.
The three step procedure of react, respond and recover during cyber security incident was better
to comprehend due to my prior knowledge gained from the lectures held on basic term
definitions of incident, anomaly, forensics and computer forensics, in having a prior knowledge
on types of attackers, target of attacks, various purposes of attack and the response requirements.
Therefore, through such prior knowledge I was able to gain knowledge on the three steps. How
to react, that is review policy and procedure, evaluate situation, avoid panic, collect information
and take appropriate actions, respond (ii) through requesting information, evaluation of
secutation, ot stop the attack and securing the crime scene, in preserving evidence and organizing
forensic examination, in finding notes and determining the key causes, and last of all on how to
recover (iii) by raising security expectations, evaluation of current security positions, in the
creation of implementation plan, the order of actions to be taken, in the validation of
implementation and determination of unexpected expectations.
iii) #Disruptors Tech in Data Analytics: The key knowledge I gained were topics of Artificial
Intelligence (AI) as a significant technology disruptor, and how cloud computing and machine-
3
setting up VPN tunnels, and implementation of Cisco Firewall Technologies.
ii) Cyber Security Incident Response Fundamentals: Inherently a fundamental topic in
networking, attending the event on the fundamentals of cyber security incident response
provided me with a plethora of knowledge. Primarily, I acquired the fundamental understanding
on how to better understand factors of where to begin, how to evaluate a situation, how to gather
information and evidence in the desired order and in knowing when to request outside assistance.
The three step procedure of react, respond and recover during cyber security incident was better
to comprehend due to my prior knowledge gained from the lectures held on basic term
definitions of incident, anomaly, forensics and computer forensics, in having a prior knowledge
on types of attackers, target of attacks, various purposes of attack and the response requirements.
Therefore, through such prior knowledge I was able to gain knowledge on the three steps. How
to react, that is review policy and procedure, evaluate situation, avoid panic, collect information
and take appropriate actions, respond (ii) through requesting information, evaluation of
secutation, ot stop the attack and securing the crime scene, in preserving evidence and organizing
forensic examination, in finding notes and determining the key causes, and last of all on how to
recover (iii) by raising security expectations, evaluation of current security positions, in the
creation of implementation plan, the order of actions to be taken, in the validation of
implementation and determination of unexpected expectations.
iii) #Disruptors Tech in Data Analytics: The key knowledge I gained were topics of Artificial
Intelligence (AI) as a significant technology disruptor, and how cloud computing and machine-
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
learning applications play a key role. Furthermore, in- depth understanding of IoT (Internet of
Things), blockchain, big data for governance, how to avoid data lakes and significance of
machine learning in impacting micro- services were gained.
The exposure gained via CCNA Security is certainly going to help me in applying the knowledge
to practical purposes such as being able to test ACLs in test environments, development of
secure network management plane and in the implementation of practices such as AAA, Role
Based Access Control, NTP, Syslog and others. Through the event on Cyber Security Incident
Response Fundamentals the knowledge gained will act as a means to find exposure in applying
the core principles such as in the principles of advanced persistent threat attack groups, in
discovery of review alerts, log files, common character encodings and carrier files recognition
and in the usage of hex editors and indicators effectively.
3.0 Professional Skill Development
Through the three events attended, on CCNA Security (i), Cyber Security Incident Response
Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii) the skills developed helped me
focus on attaining self- regulating characteristics in order to reflect the professional standards
established by the ACS Professional Standards Scheme and in the Professional Standards
legislation (ACS, 2015). Each individual events provided me with the opportunity to learn skills
in the core knowledge areas of problem solving, abstraction and design, ethics and
professionalism, in concepts of teamwork and issues and lastly, in the development of
interpersonal communication skills.
4
Things), blockchain, big data for governance, how to avoid data lakes and significance of
machine learning in impacting micro- services were gained.
The exposure gained via CCNA Security is certainly going to help me in applying the knowledge
to practical purposes such as being able to test ACLs in test environments, development of
secure network management plane and in the implementation of practices such as AAA, Role
Based Access Control, NTP, Syslog and others. Through the event on Cyber Security Incident
Response Fundamentals the knowledge gained will act as a means to find exposure in applying
the core principles such as in the principles of advanced persistent threat attack groups, in
discovery of review alerts, log files, common character encodings and carrier files recognition
and in the usage of hex editors and indicators effectively.
3.0 Professional Skill Development
Through the three events attended, on CCNA Security (i), Cyber Security Incident Response
Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii) the skills developed helped me
focus on attaining self- regulating characteristics in order to reflect the professional standards
established by the ACS Professional Standards Scheme and in the Professional Standards
legislation (ACS, 2015). Each individual events provided me with the opportunity to learn skills
in the core knowledge areas of problem solving, abstraction and design, ethics and
professionalism, in concepts of teamwork and issues and lastly, in the development of
interpersonal communication skills.
4
Demonstration on how I was able to develop my interpersonal skills, which were my key weak
area can be understood through how I was able to improve my skills of negotiation, verbal and
nonverbal communication, problem- solving, decision- making and assertiveness through the
team work we had to do in all the three courses. Furthermore, other people skills learned
included development of an understanding on the importance of ICT application which involve
the development of a mindset recognized by the users, align with their work practices and
organizational contexts.
Table:
MIT Graduate Attribute Justification
Ability to Communicate ✓
Independent and Lifelong Learning ✓
Ethics ✓
Amaytical and Problem Solving ✓
Cultural and Global Awareness ✓
Team Work ✓
Specialist knowledge of a field of study ✓
5
area can be understood through how I was able to improve my skills of negotiation, verbal and
nonverbal communication, problem- solving, decision- making and assertiveness through the
team work we had to do in all the three courses. Furthermore, other people skills learned
included development of an understanding on the importance of ICT application which involve
the development of a mindset recognized by the users, align with their work practices and
organizational contexts.
Table:
MIT Graduate Attribute Justification
Ability to Communicate ✓
Independent and Lifelong Learning ✓
Ethics ✓
Amaytical and Problem Solving ✓
Cultural and Global Awareness ✓
Team Work ✓
Specialist knowledge of a field of study ✓
5
As a networking graduate I would like to focus on my interpersonal skill development
furthermore. This indicates that there will be a change in the manner of my study and focus,
where in the future I’d like to engage new people by being a better listener as IT support help
will be asked of by less tech- savvy peers, in multitasking so I am able to manage multiple
problems and projects and last but not the least,would like to increase my exposure to areas of
networking and strengthen my specialisation.
4.0 Conclusion
This report provided a reflective analysis, both technical and professional reflection in ICT as
three events on networking were attending on the subjects of CCNA Security (i), Cyber Security
Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii). The report
individually described the key reflection of each events as well as the overall experience, in how
the weaknesses of professional skills were improved and how the skills will be further honed in
the future.
6
furthermore. This indicates that there will be a change in the manner of my study and focus,
where in the future I’d like to engage new people by being a better listener as IT support help
will be asked of by less tech- savvy peers, in multitasking so I am able to manage multiple
problems and projects and last but not the least,would like to increase my exposure to areas of
networking and strengthen my specialisation.
4.0 Conclusion
This report provided a reflective analysis, both technical and professional reflection in ICT as
three events on networking were attending on the subjects of CCNA Security (i), Cyber Security
Incident Response Fundamentals (ii) and #DisruptorsInTech in Data Analytics (iii). The report
individually described the key reflection of each events as well as the overall experience, in how
the weaknesses of professional skills were improved and how the skills will be further honed in
the future.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
ACS (2015). ACS CORE BODY OF KNOWLEDGE FOR ICT PROFESSIONALS (CBOK),
Avilable at: https://www.acs.org.au/content/dam/acs/acs-skills/The-ACS-Core-Body-of-
Knowledge-for-ICT-Professionals-CBOK.pdf Accessed: July 10, 2018
7
ACS (2015). ACS CORE BODY OF KNOWLEDGE FOR ICT PROFESSIONALS (CBOK),
Avilable at: https://www.acs.org.au/content/dam/acs/acs-skills/The-ACS-Core-Body-of-
Knowledge-for-ICT-Professionals-CBOK.pdf Accessed: July 10, 2018
7
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.