I Want To Pursue My Degree In Cyber Security

Decent Essays
My goal is to work for the Homeland Security Department in the cyber security. Computers, laptop, phones, tablets, and watches are used every single day in life and become more and more popular with criminals. I would love a career where I can prevent sensitive information as well as personal data from getting into the wrong hands. By continuing my studies in cyber security, I will help to give me all the necessary abilities and skills to have a successful career. My studies at Tuskegee University has confirm my interests in cyber security and made me realize I want to work with computers in the future. I have been interested in computers since high school. I am interested in doing cyber security to experience real world problem and create

Related Documents

  • Decent Essays

    Dual Admission Essay

    • 441 Words
    • 2 Pages

    I enjoy working with technology and thus why I am applying into the computer science field. I know that there is where I will find my true passion and one that I can pursue for the rest of my life, at least with the help of NSU…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Triton Multi-INT

    • 505 Words
    • 3 Pages

    I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Air Force Jobs The three jobs that I am interested in going into Air Force are Contracting, Cyber Surety, and Cyber System Operations. All three jobs are in the "General" area and all require pretty high scores with both Cyber Surety and Cyber System Operations requiring a general score of 62 while Contracting requires a general score of 72. All three jobs require at least 7.5 weeks of basic training including airmen's week and a high school diploma. You must also be between the ages of 17 and 39.…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    EDUCATION • Capella University: Bachelor of Science Degree: IT Information /MIS Technology • Philadelphia Wireless Technical Institute: Electronics Security Engineering • St. Joseph University Beginning studies for the MBA in Business Management • Cambridge University External Campus Certification. England (UK). PROFESSIONAL RSA ARCHER: RSA Archer trained and educated/Authentication Manager SIX SIGMA YELLOW BELT Project Management certified ISACA: Membership: (CISSP) CISSP trained and educated CHECKPOINT: (CCSA) Certified Checkpoint Security Administrator CISCO (CCNA)…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Course Title: Security Guard Development Diploma By Craig E. Brown Security Officer Development Program Overview: Our comprehensive Security Officer Development program was design by experts to prepare student for entry level position in the security industry. Our program exceeds the minimum requirements by most states, although additional licensing, training, and/or other requirements may vary by states. The program covers fourteen units of instruction that will prepare student with the fundamental and foundation for a successful career in the security industry. The course will include the following: writing assignments, quizzes, and a final examination.…

    • 287 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Through the DHS, the federal government uses resources and skills from the ICE and USSS in addition to working with the private organizations to investigate cyber terrorism. The DHS is a partner in the National Cyber Investigative Joint Task Force, whereby they work to improve inter-agency information sharing. Moreover, the government works in collaboration with the EU working group on Cybercrime and Cybersecurity to develop approaches that deal with cybercrime and cybersecurity. This partnership works to secure training required by the agencies, software licenses and computer forensic…

    • 820 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Ideally, students will major in one of these academic fields and minor or specialize in homeland security. Therefore, an online degree in homeland security should be considered an extracurricular academic choice. Additionally, students can start their career by obtaining an entry-level government job, regardless of the agency or department. Once they have their foot in the door, they students can advance their education and directly apply to…

    • 558 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post-Military Careers

    • 417 Words
    • 2 Pages

    Cyber Security According to DoD Live, cyber security is a hot post-military career. It just makes sense. Military personnel already know some of the issues they’ll deal with when it comes to terrorism and other possible threats. And many members of the military have already worked in cyber security in the military.…

    • 417 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ever since I was a child, I wanted to be a police officer or a law enforcement official. When my childhood home was burgled, the first responders’ priority was to ensure that my family and I were safe. My experience with law enforcement had a positive impact on my life because of the officers’ devotion and dedication to public service and safety. I made an effort to begin devoting my life to public service and be a part of something greater than myself through enlisting in the Oklahoma Army National Guard and working as a Security Officer. I wish to continue with my endeavors in the field of law enforcement.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    That same year, cyber space was adopted by the military as the fifth domain of warfare (Rowen, 2016). Since then, the Army has been racing to react to this new battlefield by assigning new CI agents directly from Counterintelligence Special Agent Course (CISAC) to specialized cyber units with limited knowledge in computer systems, networks, and CI as a whole. The current process is undermining and weakening the necessary support, strength, and expertise to mitigate, neutralize, and exploit Foreign Intelligence Entities and International Terrorist Organizations in the cyber domain. When Soldiers are accepted to CISAC and become a CI Special Agents, the Soldiers are taught the basics of the multiple disciplines in the CI field. Support cyber is barely covered in the course brief compared to the other…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Discipline Investigation: Network System Analyst Introduction Information system is the most popular technology in the past two decades, but I have decided to get into the field is not because of the popularity. I have chosen network analyst as my future path because my mom used to restrict my internet usage. The reason sounds unique but that is why I initiate my interest on this “forbidden thing”. However, I never learn anything about it until I took a class in my high school, call Network Administration. The teacher has explored a new world in the class, and I have realized that my interest can be my future career choice.…

    • 1954 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    I became interested with an Information Security Analyst because my father is one. Every take your child to work day I would wake up early with my dad and run to his car excited to go to his office for the day. The building is a plain, brown brick building, but every time I saw it, I instantly got excited. Walking into the office everyone knew my name, I would always wave at everyone I saw. The secretary always gave me a lollipop and called me her “Little bundle of sunlight”.…

    • 1514 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Cyber-attacks. With a large amount of hacker groups out there, there needs be just as many hackers that do good rather than bad. So this what I want to do. I want to be the person to help prevent these attacks, or even stop them. Cyber Security experts as basically people that watch data logs, set up security and…

    • 754 Words
    • 4 Pages
    Improved Essays