Skip to main content

INTRODUCTION POST

Source: https://dm0qx8t0i9gc9.cloudfront.net/thumbnails/video/H8WuRINimqur8ud/introduction-word-intro-word-intro_bxbepgas_thumbnail-1080_01.png

 Hello, in this post I will introduce my degree, Cyber Security BSc (Hons), and the university I am studying at, DMU.


I chose DMU because it was the top school among five universities that offer cybersecurity at a bachelor’s level. I also liked the diversity of DMU, which has a high percentage of international students.


DMU has been great so far. The computing tutors are helpful and understanding to everyone. My degree consists of three years of study, with four modules each year.


The first-year modules are Foundation of Computing and Cyber Security, Endpoint Security, Secure Coding, and Business Infrastructure and Security.


The second-year modules are Secure Scripting and Business Applications, Incident Response and Cyber Threat Intelligence, Penetration Testing, and Industrial Cryptography.


The third-year modules are Malware and Attacker Techniques, Cyber-Physical Systems Security, and the Final Project. There are also some optional modules, such as Cyber Security and Social Responsibility, Artificial Intelligence for Cyber Security, and Digital Forensics and Cyber Crime Investigation.


The modules that interest me the most are Endpoint Security and Penetration Testing. After I finish my degree, I would like to work at Cisco and then return to my country and start a cybersecurity consulting company. I think DMU can help me achieve my goals by providing me with quality education and exposure to successful figures in the industry. In the next ten years, I hope to see myself running a successful cybersecurity unicorn company and securing many businesses and governments from cyber attacks.

Comments

Popular posts from this blog

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...

Initial Project Plan(Gantt Chart Update)

 BEFORE CONTINOUS ASSESSMENT AFTER CONTINOUS ASSESSMENT I used the Gantt chart above to plan and monitor all the blogs I had to write for this module. It was a rewarding experience to explore these topics and share my insights with you. The chart also helped me stay focused and motivated by showing me my progress and achievements. REFERENCE https://online.officetimeline.com/app/#/file/5cacb847-5749-4e92-9d55-25480acdc8b4/gantt-view [Accessed Date: 4th June 2023]

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security.