Technical skills developed
Discuss about the Networking Project for National Broadband Network.
This professional exposure has helped in gathering new knowledge and skills about the four events organized. I have developed my professional and technical skills by attends these four events. The first event, DDLS seminar has been focused on the cybersecurity. Cyber security has been an important topic for all the organizations in the market [1]. The seminar has focused on the different mitigation technique of cyber security including the encryption technique. The standard encryption (TLS) method has been discussed in the seminar. I have gained technical skills in the encryption technique from the cyber security seminar. The second seminar has focused on the National Broadband Network and its application. This helped me to earn precious knowledge on the different topics of networking [2]. In addition, the practical sessions helped me to gather crucial experience on the subject, those that will help me to take prompt decisions in real life scenarios while dealing with networking tasks and challenges in a professional environment.
The use of the network in various fields has been discussed in the seminar. I have gained knowledge about the networking and different cabling set ups. The impact of networking in the organization has been discussed in the seminar. I have learned about different networking skills including hardware and software. The third seminar has focused on the solving real world problems with IBM Cloud [3]. I have learned about the cloud computing and its benefits in the company. The use of the cloud computing in the company has been discussed in the report. I have learned about various problems in the cloud computing including IBM Cloud. The characteristics and problems in the cloud computing and its services has been learned by me. The fourth seminar has focused on Melbourne server less meet up [4]. The use of the server less meet up application have been discussed in the seminar. In have learned about the networking department of the companies in the market.
I have learnt a lot about advance technologies used in the companies in the market. I have learnt about the encryption technique used for the cyber security and cloud computing. The demerits and problems in the cloud computing has been learnt by me. I have learnt technical skills in the networking system of the company [5]. I can use my learnings in the future for developing myself as a networking graduate. The use of these professional skills learnt during the practical exposure of the seminar. I might help my company in making use of my skills and knowledge. I have learnt how to encrypt a data packet to protect it from hackers and other intruders. The encryption method have helped in securing data and information in securing data and information of the company. The use of encryption technique has helped in maintaining the cyber security of the companies in the market.
Events Name |
Units Outcome |
DevSecOps |
MN502 (Overview of Network Security) a. Analyze and discuss the main security issues and emerging trends of information security; |
Blockchain Security |
MN503 (Overview of Internetworking) b. Explain human factors in achieving business and technical goals through planning and design. |
DDLS Cyber Security |
MN502 (Overview of Network Security) f. Demonstrate professional and ethical behavior with regard to network security. |
NBN NOC Tour |
MN504 (Networked Application Management) d. Analyse performance and deployment issues for networked applications; |
Google Cloud Platform |
MN506 (System Management) a. Analyse and compare various server management systems; |
IPV (Indian Professionals in Victoria) |
MN503 a. Analyse and discuss the significance of internetworking for contemporary organisations. |
Future Usage of Knowledge or Skills
I have learnt about cybersecurity as this is my interest of topic. I have been maintaining a proper approach to the development of the company. I have gained technical skills in the encryption technique from the cyber security seminar. The second seminar has focused on the National Broadband Network and its application. The use of the network in various fields has been discussed in the seminar. The four events have been helping in providing a practical approach to therefore important topics discussed. I have learnt a lot about the cybersecurity, cloud computing, networking and application development. The characteristics and problems in the cloud computing and its services has been learned by me. This variety of knowledge might help me in getting a proper career as a networking graduate [6]. Therefore, the importance of these skills have been increased with the application of the skills in the market. The use of the cybersecurity has been maintaining the security of the data and information of the company. The use of the cybersecurity has been creating various opportunity for me in the future.
The fourth seminar has focused on Melbourne server less meet up. The use of the server less meet up application have been discussed in the seminar. In have learned about the networking department of the companies in the market. The use of the cloud computing has been helping me in understanding the online storage of the data and information in the internet. The real problems of the cloud computing has been helping in maintaining brief idea about the solutions in the cloud computing. I have learned about various problems in the cloud computing including IBM Cloud. Professional Skills [7].
The practical exposure that I have acquired through attending the seminars shall prove to be extremely helpful in the fields of network computing. The skills that I have acquired can be largely grouped under the banners of Cloud computing, network security, data mining, broadband connectivity and many more. This will help me to solve real world networking problems and develop networking environments with more knowledge and precision. I did not like was that in some cases they did not provide the hidden details behind the highlighted issues which is however understandable owing to the shortage of time in these seminars.
For example, the practical knowledge that I had developed regarding cryptography has provided crucial information in the field of network security. Cryptography is the process of encrypting data that is stored on the servers of the cloud, thus protecting them from unauthorized access. Data security is the most important factor in networking, in the modern times [8]. I have learned to use the various tools and techniques that help in the process of encryption and decryption. These include Triple AES, Blowfish and Towfish techniques. These techniques are used widely by several U.S Government and other private organizations all over the world. Through these learnings I have managed to protect virtual servers from intended attacks by encrypting crucial data that was presented as part of practical test exercises.
MIT Graduate Attributes |
Justify the coverage based on capstone project exposure and professional exposure |
|
Ability to Communicate |
The ability to communicate effectively and appropriately in a range of contexts to achieve high order speaking, listening, reading, writing, numeracy and information technology communication skills. |
This skill is developed during this seminar. |
Independent and Lifelong Learning |
A capacity to be a self-directed learner and thinker and to study and work independently. Resulting in continuous learning, resilience, confidence, learning transferable and time management skills and an ability to learn independently. |
The NBN event was one of the technical event. However, the trainer has helped in creating a proper learning to an advanced level. |
Ethics |
Awareness, sensitivity, and commitment to ethics and ethical standards in personal, social, business and professional contexts. |
I would like to mention the IBM Cloud event here. The event has focused on the real knowledge of ethics helps to improve skill in the capstone project. |
Analytical and Problem Solving |
The ability to collect, analyse and evaluate information and ideas and to solve problems by thinking clearly, critically and creatively to solve problems and issues using established methods of enquiry. |
The NBN NOC tour has covered up this area. But, I need to improve this skill set more. |
Cultural and Global Awareness |
An acknowledgment of and respect for: equality of opportunity; individual and social responsibility; and a recognition and appreciation of other cultures and times recognizing the global context of business. |
The cybersecurity event was one of those that covered up this knowledge area by taking examples of other countries such as India, Australia and South Africa. |
Team work |
A capacity to relate to, collaborate with, and, where appropriate lead others, and to exchange views and ideas in order to achieve desired outcomes through teamwork, negotiation, conflict resolution, and leadership. |
The Melbourne serverless meetup event has shed light upon teamwork skills. |
Specialist knowledge of a field of study |
Comprehensive specialist knowledge of a field of study and defined professional skills ensuring work readiness. |
The NBN event’s trainer has provided speech on the specialist knowledge of a field of study. |
Having been engrossed with the knowledge of networking, I would like to endorse myself in the professional realms of networking. However, the concept of cyber security entertained me the most. I hope to have ample beginners’ knowledge to pursue a career in Cyber Security.
With the advent of the internet, cyber security has been the biggest challenge of information technology. These threats include hacking, phishing, man-in-the-middle attacks and many more. Hacking involves expert personnel to enter someone else’s account or system without their prior knowledge and hence make unauthorized modifications or get away with thefts. Through phishing, a third-party application can acquire login details of other users without their knowledge. DDOS attacks are however very common nowadays. Cybercriminals all over the world has now chosen this technique to destabilize the website servers of the big corporate names of the world thus hindering their official delicacies[9].
I had always been awed by the practicalities of network computing, even though I could not figure which field of networking attracted me the most. Over the time period due to the seminars, I got to learn more due to my interaction with many experts. These practical sessions helped me to magnify into the core aspects of networking and has certainly guided me to choose a career in this. As mentioned in the section above, I finally chose network security as a career path. The challenges in cyber security needs to be addressed with highest priority and I would like to be a part of the change.
To interact with aspirants and experts from various universities have been the best aspect of the professional exposure. This helped me to earn precious knowledge on the different topics of networking. In addition, the practical sessions helped me to gather crucial experience on the subject, those that will help me to take prompt decisions in real life scenarios while dealing with networking tasks and challenges in a professional environment. One thing that I did not like was that in some cases they did not provide the hidden details behind the highlighted issues which is however understandable owing to the shortage of time in these seminars. Nevertheless, I would like to take forward these learnings and brush up the practical qualities with more practice and finally move forward in my career path.
References
- Mackey, Tim K., and Gaurvika Nayyar. “Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies.” British medical bulletin118, no. 1 (2016): 110-126.
- Mittal, Sudip, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, and Tim Finin. “Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities.” In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on, pp. 860-867. IEEE, 2016.
- Peng, Shin-yi. “Cybersecurity threats and the WTO national security exceptions.” Journal of International Economic Law18, no. 2 (2015): 449-478.
- Montgomery, Chelsea. “New Security for a New Era: An Investigation into Law Enforcement Cybersecurity Threats, Obstacles, and Community Applications.” PhD diss., Utica College, 2017.
- Rubio, Juan E., Javier Lopez, and Rodrigo Roman-Castro. “Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection.” (2018).
- Nobles, Calvin. “Cyber threats in civil aviation.” In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 1185-1207. IGI Global, 2018.
- Webb, Timothy, and Sumer Dayal. “Building the wall: Addressing cybersecurity risks in medical devices in the USA and Australia.” Computer Law & Security Review33, no. 4 (2017): 559-563.
- Johnson, Tsutomu. “Sorry I Lost Your Files: Cybersecurity Threats to Confidentiality.” Utah BJ28 (2015).
- Goode, Jodi. “Towards A Comparison of Training Methodologies on Employee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs.” (2016).