1. Research a Cybersecurity related career and make a short PowerPoint presentation of a job position(s)...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
1. Research a Cybersecurity related career and make a short PowerPoint presentation of a job position(s) that a company is trying to fill. a. Pick a Cybersecurity related career that you think might be interesting to get into. Any job within Cybersecurity, Information Security, Information Privacy, Information Technology Security, Penetration Testing, or Cybersecurity jobs in legal, criminal justice, etc. would qualify. Ask the instructor if you are unsure if a particular kind of job is relevant for this exercise b. Research the skill set required for that type of job by looking at actual job postings for a position by a real company. Pick a real company with an active job posting, not a generic job description. Create a PowerPoint presentation to present your results. You need at minimum five slides: c. i. First slide: Title page with your name and major. ii. Middle slides: For your chosen job listing, create a slide that lists the duties, requirements and salary/benefits as summarized for the job listing. You can use up to three slides if necessary. Be sure to include the following information: 1. Company name 2. Geographical area of the job location 3. Duties 4. Technical skills required 5. Non-technical skills required 6. Education or certification requirements 7. Required experience 8. Salary range iii. Last slide: Give a summary of what you found. Briefly discuss anything that was interesting or surprising. d. If you are working in a group with more than just yourself then be sure to present one job for each group member, so the middle part of your presentation will be longer. One job per person in the group is the minimum needed. e. For classroom students you will present it during class. For online students you will record your presentation and submit the video file or PowerPoint with audio narration. Only standalone video files (such as .mpg) or PowerPoint with voice files are acceptable for this. If you create a video file for your recorded presentation some possible tools that you could use are Zoom, Screencast-o-Matic, QuickTime, etc. f. Submit a copy of your presentation file as Ex01. Also post it on the Discussions page for Ex01 - Careers. 1. Research a Cybersecurity related career and make a short PowerPoint presentation of a job position(s) that a company is trying to fill. a. Pick a Cybersecurity related career that you think might be interesting to get into. Any job within Cybersecurity, Information Security, Information Privacy, Information Technology Security, Penetration Testing, or Cybersecurity jobs in legal, criminal justice, etc. would qualify. Ask the instructor if you are unsure if a particular kind of job is relevant for this exercise b. Research the skill set required for that type of job by looking at actual job postings for a position by a real company. Pick a real company with an active job posting, not a generic job description. Create a PowerPoint presentation to present your results. You need at minimum five slides: c. i. First slide: Title page with your name and major. ii. Middle slides: For your chosen job listing, create a slide that lists the duties, requirements and salary/benefits as summarized for the job listing. You can use up to three slides if necessary. Be sure to include the following information: 1. Company name 2. Geographical area of the job location 3. Duties 4. Technical skills required 5. Non-technical skills required 6. Education or certification requirements 7. Required experience 8. Salary range iii. Last slide: Give a summary of what you found. Briefly discuss anything that was interesting or surprising. d. If you are working in a group with more than just yourself then be sure to present one job for each group member, so the middle part of your presentation will be longer. One job per person in the group is the minimum needed. e. For classroom students you will present it during class. For online students you will record your presentation and submit the video file or PowerPoint with audio narration. Only standalone video files (such as .mpg) or PowerPoint with voice files are acceptable for this. If you create a video file for your recorded presentation some possible tools that you could use are Zoom, Screencast-o-Matic, QuickTime, etc. f. Submit a copy of your presentation file as Ex01. Also post it on the Discussions page for Ex01 - Careers.
Expert Answer:
Related Book For
Posted Date:
Students also viewed these algorithms questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
List three specific parts of the Case Guide, Objectives and Strategy Section (See below) that you had the most difficulty understanding. Describe your current understanding of these parts. Provide...
-
Which one can be considered as the last stage in knowledge management system O A. Identifying O B. Disseminating O C. Capturing O D. Storing
-
In one measurement of the body's bioelectric impedance, values of Z = 4.50 102 V and = -9.80 are obtained for the total impedance and the phase angle, respectively. These values assume that the...
-
Kelly is self-employed and incurs \($2,200\) of business meal expenses in connection with business travel. \($500\) of the business meal costs are considered to be lavish or extravagant. How much can...
-
In Figure \(8.10 a\), how does the magnitude of the downward force exerted by the spring on the ceiling compare with the magnitudes of the downward gravitational forces exerted by Earth on the spring...
-
Bad-Debt Reporting Marvin Company is a subsidiary of Hughes Corp. The controller believes that the yearly allowance for doubtful accounts for Marvin should be 2% of net credit sales. The president,...
-
31 The number of protons, electrons and neutrons in aluminium ion Al+ is Protons A. 27 B. 13 C. ABCD 32 32. D. 13 10 Electron 27 neutrons 14 14 14 10 14 17 14 The formula of the compound formed...
-
A bumper, consisting of a nest of three springs, is used to arrest the horizontal motion of a large mass which is traveling at 40 ft/sec as it contacts the bumper. The two outer springs cause a...
-
During an investigation, a detective found my client's blood at the crime scene along with a file folder on a computer that contained emails. This file was labeled "Potential Divorce." How could...
-
The owner of a shoe firm could instead work as an accountant to earn $300 per week. What is the implicit cost of her contribution to production?
-
Discussion: Business Presentation versus a Speech This module is about giving an effective business presentation, which is a key skill related to communication in the workplace. Take a moment,...
-
What is Financial Forecasting and Financial modelling and its' importance? Explain the difference between Financial Forecasting and Financial modelling
-
What tax rate is appropriate when calculating the net sale proceeds from a residential property that you held for less than one year? Discuss.
-
Sarah has two dependent children who attend Sun Valley Day Care while she is at work. She will claim a $1,200 credit for child and dependent care expenses in the current tax year. What amount of...
-
If an ideal gas is compressed isothermally: The internal energy of the gas decreases. No work is done in the process O Heat is transfered from the gas Work is done by the gas.
-
What are the six activities involved in the physical supply/distribution system?
-
A large product-distribution company is having a problem during its group meetings: One department manager is constantly disrupting the meetings while trying to get his ideas across. He has so...
-
Summarize what LPC contingency theory and situational leadership theory say about the connection between leadership style and situational variables.
-
Ive brought shame on myself, my family and the profession were the words of Tim Donaghy, as a federal district judge sentenced him to 15 months behind bars in July 2008. Formally, the charges against...
-
In Fig. 1130, there is no explicit invariant that states that a Transaction cannot be linked to movements that are linked to the same account, because the structure of the model already demands is....
-
Apply the Account/Transaction pattern to the parallel financial transactions of the example shown in Figs. 1131 to 1135. As the bills may be paid forward, it may be necessary to use memo entries....
-
Look at Fig. 1119 and create a new discount strategy that gives a percentage of discount for sales with more than a certain number of products. Order | < > < > +nr: Natural = < > +date: Date...
Study smarter with the SolutionInn App