IT-200 MOD7 PDF

Title IT-200 MOD7
Course IT-200
Institution Southern New Hampshire University
Pages 5
File Size 75.3 KB
File Type PDF
Total Downloads 14
Total Views 141

Summary

Assignment 7...


Description

Prof. Luke Konrath IT 200: Project Two: The IT Professional 14 August 2021

Computer science is the study of algorithmic processes, computation, and information. Generally intended for determining new ways to use computers and technology. Computer science covers a range of topics from pragmatic subjects like implementing computing systems to the software and hardware that supports them. Thought to be the root for other fields in IT. It is comprised of the foundation on which areas like Information Technology can build on. Careers that practice computer science include Data Scientists, Full-stack Developer, and Computer Systems Analyst. The technologies and tools relevant to these fields include Systems Flowcharts, Decision Tables, and IDE’s. Computer engineering combines multiple areas of engineering. Like electrical engineering and computer science in order to create computer software and hardware. Computer engineers typically have experience in electrical engineering, software/hardware integration, and software design. They participate in a multitude of software/hardware features of computing. From composition of personal computers, microprocessors, and supercomputers, to circuit structure. This field understands and implements computer systems. Software engineering focuses on the development of software. However, it is customer focused. They produce products for customer distribution. Information systems end goal is to aid in operation, planning, and decision making of businesses. Although, IT focuses on the hardware and technology requirements. Both are centered on the demands of business. One implements systems and their counterpart repairs them. Roles & Careers: Hardware Engineer, Network Engineer, Database Administrator.

Tools used: Fume extractor, Microscope, Multimeter. Information Systems the theoretical interpretation of systems with a particular respect to information and the corresponding networks of software and hardware that organizations and people use to process, collect, create, filter and also disseminate information. With emphasis based on information systems that have a recognized user, boundaries, storage, processors, outputs/inputs and the previously mentioned communication networks. Each information system strives to assist management, decision making, and operations. Information systems are the communication and data technology (ICT) that organizations use. It is also how people collaborate with said technology in the aid of business processes. Roles & Careers: Systems Analyst, Information Systems Manager, Software Support. Tools used: MS Office, DBAN, Sysinternals Suite. Information technology is the utilizing computers to retrieve, manipulate, transmit, and store information. IT is frequently practiced within the field of business operations in contrast to entertainment or personal technologies. Information technology can be viewed as a subgroup of information and communications technology (ICT). An information technology system is typically a communication system, information system, or more commonly known as computer system. It includes all software, hardware and peripheral equipment. Sustained by a finite group of users. Roles & Careers: Information Technology Consultant, Information Technology Business Analyst, Information Security Analyst. Tools used: VOIP Phone Service, MS Office, Screen Sharing program. Computer programming is the process of building and designing functional computer programs to fulfill a specific computing outcome or execute a particular task. Programming includes tasks such as:

generating algorithms, analysis, resource consumption and accuracy, as well as the execution of algorithms in a particular programming language. Frequently labeled as coding. Source code is a program that is written in one or more languages that are comprehensive to programmers. Unlike machine code which is performed by the central processing unit. The purpose of programming is to find a sequence of instructions to automate the performance of a task on a computer. Frequently for solving a given problem. Skilled programming commonly requires mastery on several different subjects. Included but not limited to specialized algorithms, knowledge of the application domain, and formal logic. Scripting is a list of commands that are executed by a certain program or scripting engine. Scripts are used to automate processes on a local computer or to generate Web pages. Examples are DOS scripts and VB Scripts. These are applied to run processes on Windows machines. AppleScript scripts automate tasks on Macintosh computers. ASP, JSP, and PHP scripts are often ran on Web servers to produce dynamic Web page content. Things that distinguish a script from a program are a program is compiled, while a script is interpreted. A program creates executables or binaries or from the system’s memory, and a script does not. A script does not use any system memory. Programs can run independently, while scripts run inside another program. An IT professional would use scripting to automate tasks such as file removal, copying and management. An IT professional would use programming to test program functionality, write a specific program for a user or update/modify designs given by software developers and engineers. Cyber security specialist is the entry level job that I chose. As a security specialist I would manage daily operational performance on the computer systems in place. Conducting needed software upgrades. I would also conduct threat and risk analysis. Cyber security specialist is responsible for aiding in the

elimination of risk associated with information that has been acquired and analyzed. The specialist defines and interprets security requirements necessary for computer systems. The tools required for this field are generated by the specialist after assessing the technological needs of the client. There are specific requirements needed to obtain a cyber security specialist position. An Associate degree in computer science/information technology. Certifications like CompTIA security+, cisco certified network associate- security (CCNA-security), and Microsoft technology associate (MTA) A mid-level position that has piqued my interest is Cybersecurity manager. A cybersecurity manager is accountable for assessing and maintaining any network vulnerability. They supervise the system put into place by the security specialist. Using information obtained from the security specialist they establish network security protocols and policies. That will be used to control network access as well as employee access. If a breach happens to the network, it is the cyber security managers responsibility to resolve the breach quickly and effectively. Finally, the responsibility and ability to supervise, coordinate, and train are key elements to a cyber security manager. Employers commonly require soft skills like effective communication skills and leadership qualities for this position. The Armed Forces and government positions will require a security clearance to obtain a job as a cyber security manager. Education requirements to obtain this level of a job would be a bachelor’s degree in information technology and some certificates that would be useful when applying would be CISSP, CEH, CISM.

Job References: https://gr8usajobs.com/jobs/cyber-security-engineer-marietta-georgia/3464817082/?utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic https://www.usajobs.gov/GetJob/ViewDetails/610084700?utm_campaign=google_jobs_apply&utm_so urce=google_jobs_apply&utm_medium=organic https://gr8usajobs.com/jobs/senior-cyber-security-engineer-duluth-georgia/3315473592/?utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic...


Similar Free PDFs