Engineering Homework Help

Southern New Hampshire University Industry Certifications Discussion

 

In this discussion, you will reflect on your course experience and think about industry certifications and what they can do for you. In your initial post, make sure that you address at least one reflection question, as well as the certification question.

Course Reflection Questions:

  • What is your the biggest course takeaway?
  • What do you feel was the most important aspect of the course?
  • Is this course what you anticipated or what you thought it would be? Are assumptions you had about the industry or the work different now?

Certification Question:

  • Now that you have thought about your career aspirations in Module One and learned about certifications here in Module Eight, what certifications are targeted toward your desired job role?

Ryan Taylor posted Oct 18, 2021 7:21 AM

Subscribe

Howdy,

My biggest course takeaway was learning about the CIA Triad and the fundamental security design principles. These two concepts are the cornerstones of cybersecurity. We focused a lot of time on learning these and going over different scenarios that we will see in our future of cybersecurity. These principles and concepts are powerful mental tools for approaching security that never go out of date.

I’m already working in my field of study at Los Alamos National Laboratory but wanted to further my education in the field as technology is always changing, oh yeah and a raise in pay, ha. Some of the certifications that I would like to obtain would be Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Cyber Forensics (CCFP), Certified Cloud Security Professional (CCSP), and an ISSEP. I have been really looking into working with the NSA for a long time now, have even had the opportunity to work with them at the lab on a couple of things. I find I have been leaning towards forensics and National security accepts of my career and want to get more involved in those.

It has been great learning with all of you this term and looking forward to next term! Good luck with your future endeavors!!

Cheers,

Ryan

Works Cited

Kim and Solomon. (2016, October). Fundamentals of Information System Security, 3Rd Edition. https://learning.oreilly.com/library/view/fundamentals-of-information/9781284116465/

Mason Voorhees posted Oct 18, 2021 10:02 AM

Subscribe

Hey Class,

When taking this course my biggest take away was understanding threat actors, I think it is very important to know about each type of threat so when I am working, I can keep this in mind, My work uses key cards and other security methods but I never new about a tailgator which is someone who does not have access gains access by someone holding the door open for them. I do this all the time which freaked me out ot know this was a real issue.
I feel this whole course is so important. At work I needed to take cybersecurity trainign which was alot like this course. The main difference between the course at work and this class was the amount of depth. I think my work did a great job on training me though because I leard about many types of attacks like phishing, defense in depth, principles like principle of least privilage. All of this course was very infomative and needed.
This class was not what I thought it was, I thought it was going to invovle programming or creating a security system. After taking the course Im very happy that it was the way it was, it taught me so much about cybersecurity.
For certifications, for my career I dont think I require any of these certifactions needed to become a full stack developer. But a certificaton that strikes my interest has to be a CISM certification. This stands for Certified Information Security Manager. I would want this certification because of how desireable it is by employers and also because it shows how devoted I am to making sure I know the most about security. This would mean I have the mind set of someone who wants to keep there data secure.
Cybersecurity is a topic that needs to be taught to anyone in the techinical field because of how serious attack can get. I recently had a phishing attack on my companies emails which was a pretty serious attack to obtain passwords and usernames of employees.