Career Planning: Job Certifications, Growth Analysis, and IT Security

Verified

Added on  2022/08/01

|4
|671
|3
Homework Assignment
AI Summary
This assignment analyzes a student's career plan, focusing on job certifications and career growth in management consulting and IT security. Task 1 involves researching job advertisements for both immediate post-graduation and ten-year career goals, comparing educational and certification requirements. The student's aspirations evolve from a base-level role to a senior leadership position with a focus on system security and big data. Task 2 involves answering questions related to system security, proposing tools for risk management, and identifying resources that support hackers. The student identifies automated tools, risk assessment strategies, and security tools such as network security monitoring tools, encryption tools, and firewalls to protect systems. The assignment also includes references to support the analysis.
Document Page
1
Job Certification and Job Growth
Student Name:
Institute Name:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
Task 1
1. When I graduate, I plan to get a job in a management consultancy firm. I have chosen
this as it is one of the fastest-growing business opportunities and has a lot of
opportunities for growth both personally and professionally.
Job Link Educational
Qualification
Certification
https://www.linkedin.com/jobs/view/1820158491/?alternateChannel=topapp Graduation
fields such
as business,
math, CS,
Engineering
or finance
Big Data, Data
Science,
python
language
https://www.linkedin.com/jobs/view/1770315085/?alternateChannel=topapp Business,
commerce
CPA/CA/CFA
https://www.linkedin.com/jobs/view/1811561786/?alternateChannel=topapp IT, CS Spanish DELE
Certification,
IT
SAP/Salesforce
architect
2. In the coming 10 years, I would want to be a senior leader in a management
consulting firm.
Job Link Educational
Qualification
Certification
https://www.linkedin.com/jobs/view/1809041185/?alternateChannel=search MBA SCRUM
Master / Six
Sigma
https://www.linkedin.com/jobs/view/1789346093/?alternateChannel=search IT and MBA -
Document Page
3
https://www.linkedin.com/jobs/view/1828797236/?alternateChannel=search MBA Big Data
3. My plans have changed a lot in these 10 years as I now aim for goals which are more
centred towards leading the teams rather than working at the base level. I look for
opportunities which give me time to travel and meet with clients in person and expand
my networking as well. This will help m grow better in my life so that I can create for
myself opportunities which otherwise would have been a little difficult to get hold of.
I want to go more into system securities wing of IT where I can work with Big Data
and come up with solutions which can help create a secure system CITATION
Mar194 \l 1033 (Libicki, 2019)
Task 2
Question 3
Automated tools such as the log analysers that can be used to consolidate system logs
perform comparative analysis and try to detect the common occurrence of the behaviour. To
propose a valid proposal to the risk management branch of the IT, it is essential to have a
proper risk assessment done of the IT infrastructure as well CITATION Kar121 \l 1033
(Karthik Poojary, 2012). RA can be a good tool which can be used to ensure that helps the
organization identify risk immediately and suggests preventive measures as well. here, the
PSV processes help to identify and document other vulnerabilities that may be present in the
system and the potential damage that they can cause. Also, the wireless vulnerability
assessment process is designed in a way so that it can find and document any vulnerability
that may be present in the dial-up modems connected to the organization’s networks
CITATION JOA16 \l 1033 (JACKSON, 2016).
Question 4
Document Page
4
The following website is known to be supporting hackers:
http://www.elite-hackers.com/textfiles
When I was looking for hacking sites, I noticed that a lot of them were either difunctional or
were simply broken links CITATION BRA15 \l 1033 (STOSH, 2015). Finding these
websites were hard as they are all kind of obscure. Nmap is the only similar tool that I
noticed but there was a similar topic of interest such as loopholes in the system, breaking the
RA etc.
The following tools can be used for security of the system:
Network Security Monitoring Tools
Encryption Tools
Blockchain
Packet Sniffers
Firewall
References
Karthik Poojary, 2012. 10 Linux security tools for system administrators. [Online]
Retrieved from: https://www.computerweekly.com/tip/10-Linux-security-tools-for-system-
administrators. Accessed 20 April 2020
JACKSON, J., 2016. Tools for the attacker, tools for the defender. [Online]
Retrieved from: https://gcn.com/articles/2008/06/10/tools-for-the-attacker-tools-for-the-
defender.aspx. Accessed 20 April 2020
STOSH, B., 2015. Top 5 Free Websites to Learn Hacking this 2020. [Online]
Retrieved from: https://freedomhacker.net/top-free-websites-to-learn-hacking-2016-4842/.
Accessed 20 April 2020
Libicki, M., 2019. The Future of Information Security. [Online]
Retrieved from https://fas.org/irp/threat/cyber/docs/infosec.html. Accessed 20 April 2020
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]