Description
Executive format programs have an applied learning component (internship/practicum) that is an integral (essential) part of the established curriculum. These programs require the student take part in an internship (that is offered by the sponsoring employer through a cooperative agreement with the school), job shadow experience, or job reflection experience.
The INTR course serves as one way to help students reflect and connect their coursework to their practical work experience. This course is one of several integrated components that connect the practical experience to the curriculum. In this course, students can choose to participate in an alternative work-study, internship, cooperative education, or Curricular Practical Training (CPT) in an area directly related to the student’s course of study.
Due to the embedded practical experience component in the curriculum, students must identify their work-study, internship, cooperative education experience by the start of the term.
Please answer the following questions to identify what you have done to prepare for success in your INTR course this semester.
Question 1 – Briefly explain any steps you are taking, or plan to take, to gain hands-on experience in your program of study. (100 words)
Question 2 – State two goals you hope to achieve through applying your coursework this term to your workplace experience. (100 words)
NOTE: i need 100 words for each question total 200 words, below is my resume & the syllabus for the subject for your reference.
Unformatted Attachment Preview
Subject: Organ leader & decision-making Bi term
Subject: Dissertation full term
Executive Program Practical Connection
Name: Shoeb Ali syed
Date: March 12, 2023
As a Cyber Security Analyst, my work involves analyzing, monitoring, and protecting an
organization’s network from various cyber threats. The skills and knowledge gained from the
Master of Science in Information Systems & Security and the experience of working as a Cyber
Security Analyst have equipped me with a sound understanding of the importance of data
analysis, manipulation, and visualization in cybersecurity. Thus, the course content of this course
is directly relevant to my current work experience, and I believe that the knowledge and skills I
gained from this course have been directly applicable to my work as a cybersecurity analyst, and
it will continue to be useful as I continue my work. I appreciate the opportunity to take this
course and continue to learn and grow in my field.
The course content revolves around R programming language, a widely used tool for data
analysis, manipulation, and visualization. The knowledge gained from this course can help me
analyze large data sets, an essential part of my work as a Cyber Security Analyst. I can use R to
perform various statistical analyses to identify patterns, trends, and correlations in network traffic
data. This can help me to detect any unusual or malicious activity on the network and take
appropriate measures to prevent it. The course also covers essential UNIX tools, crucial for
managing and analyzing large datasets. As a Cyber Security Analyst, I often work with large
volumes of log files, and knowledge of UNIX commands such as grep, awk, and sed can help me
to search and filter these logs efficiently. This can help me to identify potential security threats
quickly and take appropriate measures to mitigate them. The course also covers SQL, a powerful
language used to manage relational databases. As a Cyber Security Analyst, I often work with
databases that store network traffic data. Knowledge of SQL can help me extract, manipulate,
and analyze data from these databases efficiently. This can help me to identify any strange
behavior on the network and take appropriate measures to prevent it.
The knowledge and skills gained from this course directly relate to my current work
experience as a Cyber Security Analyst. It can further help me to use appropriate analytical
methods and tools to analyze big data, thereby allowing me to gain valuable insights into
potential security breaches and take proper measures to prevent or mitigate them. The course can
also help me to think critically about the concepts and practices of computer information
technology, enabling me to stay front corners in a rapidly changing field cybersecurity. The
course content, which includes R programming language, UNIX tools, and SQL, can help me to
analyze, manipulate, and visualize large datasets efficiently. This can help me to identify
potential security threats quickly and take appropriate measures to mitigate them. The course can
further enhance my skills and profile, making me a more valuable asset to any organization in
the field of cybersecurity.
Purchase answer to see full
attachment