My Next 3 Year Plan

Decent Essays
Graduating from St. Cloud State University, gaining security certifications, and attending Information security conferences are the main goals in my next 3 year plan. First, graduating with a master’s program in Information Assurance with a Grade Point Average of 3.75 or better will distinguish me among many jobs candidates. Furthermore, gaining certifications (Cisco Certified Network Associate - Security (CCNA Security), Linux Security, and penetration testing) will enhance my technical skills, as well, Certified Information Systems and Security Professional (CISSP) will deep my technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage the overall information security program to protect organizations from growing sophisticated attacks. Finally, attending security conferences is effective to keep me up to date with the latest information on security topics. As a result, I strive to obtain a position in the government sector working in the field of cyber security.

With the United States housing more than 15 critical infrastructures, all of which are implementing information and communication technologies (ICT) systems, a risk of a cyber war is always a possibility. I am planning to contribute in addressing pressing issues by integrating my education in computer engineering and information assurance, experience in VSAT networking, and advanced training and certifications to implement and assure the critical information

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Expeditionary Force 21 (EF21) “provides guidance for how the Marine Corps Total Force – as an integral part of the lager naval and joint team – will be postured, organized, trained, and equipped to fulfill assigned public law and national policy responsibilities.” (Expeditionary Force 21 Capstone Concept p. 5). Expeditionary Force 21 is essentially the Marine Corps 10 year vision and action plan. According Week 1’s video presentation, EF21 seeks to: establish a forward presence of one-third of U.S. Marine Corps operational forces; establish regionally oriented units connected and integrated with theater staff; maintain modular forces capable of being tailored respective to the mission and requirement; possess a standing headquarters capable…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The US Army has proven successful implementation of pilots in the warrant officer grade. Their pay is less than that of a fully commissioned officer, yet they have years of experience as enlisted personnel. Although the military is reducing its overall manpower numbers, a challenge is faced in retaining personnel in critical areas. In order to deter and defeat cyberspace threats, we must recruit and retain a superior cybersecurity team. Retention of these trained personnel will prove to be a daunting task since the civilian sector can offer a much more favorable compensation than the military.…

    • 873 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Rodney Brown, who have served over 14 years in information security field managing IT enterprise system on midrange and mainframe platforms. Rodney Brown currently work as Information Risk Management. At his work, he manage the security controls, vulnerability and threats scanning risk management and security awareness programs for domestic and international Mergers & Acquisitions for various companies. Upon asking why you become a CISSP, he says certification classify me as a security professional, who well grab knowledge and experience. Taking CISSP certification shows that I am one who is concerned in protecting current security technologies.…

    • 537 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    One of the problems that remains an issue for fusion centers is although they are good at dispersing information between all levels of law enforcement, there remains a disconnect between the private sector and the fusion centers. In a recent survey conducted with seventy of the seventy-seven fusion centers around the country, 2.1 percent of them admitted that they received daily information from the private sector (Erickson, 2012). Without the private sectors input of information there remains a disconnect of information and this should be addressed as soon as possible. Another problem that persists is the difficulty that fusion centers have when it comes to their ability to “analyze cyber security relevant information (Erickson, 2012).” This could easily be fixed by employing more knowledgeable personnel.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    After the 2001 attacks The Department of Homeland Security had to completely remodel its system and focus on terrorism as the main threat. “Terrorists today can strike at any place, at any time, and with virtually any weapon. This is a permanent condition and these new threats require our country to design a new homeland security structure.” Our country suffered from this event and it has been the focus of Homeland Security to make sure nothing like that ever happens again. The USSS has taken effective measures in expanding its investigation in computer networks and monitoring internet activity.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Critical Infrastructure (CI) is very important because the nation relies on it to carry out its essential activities. Since there are many essential activities that must be carry out at all times across the nation, CI has been divided into 16 different CI sectors (Department of Homeland Security, 2017). While each sector is different and perform different functions, all CI sectors are interdependent. That means that each CI sector relies on the functions of other CI sector(s) in order to be able to carry out their functions. That is why all CI Sectors are equally important because the disruption of one CI sector could also lead to the disruption of another or multiple CI sectors.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    I’m just now scratching the surface of this great world of technology, but I am taking steps in the right direction. I am currently in college for Network Systems administration, and after I graduate from this 2 year degree I plan to get an entry level job and then go back to school for another 4 years and obtain my degree in cyber security. Now I’ve set it in my head that I’m not going to find a security job right away so I plan to start taking certification tests as soon as I possibly can, and I plan to get as many that relate to my field that I possibly can. It’s going to take a long time, but I plan to stick with it and follow it to wherever it takes…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays