Does the essay sound like a summary

Assignment Help Computer Engineering
Reference no: EM133550658

Physical or Cyber Security 

While growing up I was always interested in how computers were built. As I grew up, I still maintained that interest in computers, however I had taken steps to learn how to troubleshoot problems with them and learned how to build them. As I finished high school and started my career and to further my education, I decided to continue my career in computer hardware and started getting my degree in CIS user support. However now I have had thoughts of switching careers and changing my education. Today, I will be looking at the different requirements for being a hardware technician and cyber security technician based on certifications, salary, and degrees.  

While on my search for which certification are recommended for a hardware technician, I stumbled upon Indeed.com. Indeed, a job searching website that I have been using to find a new job, has a section where they recommend the "7 Top Hardware Certifications for Computer Technicians," and I will go over the top 3. Of the seven certifications in the list, I already have one, the CompTIA IT Fundamentals+. The first recommendation is the Apple Certified Macintosh technician. This is a certificate that shows you know how to repair and diagnose apple computers. The prerequisites are that you be an apple technician and you take a three-hundred-dollar class. The second is Cisco Certified Technician; this certification establishes that you can diagnose, test, repair, and restore Cisco devices. The third one is Microsoft Technology Associate; this shows that you are understanding multiple IT platforms, software, and other components. 

After I started my search on Cyber Security certifications, a website called coursera.org had an article titled "10 Popular Cybersecurity Certifications [2023 Updated]." I do not have any of these certifications, however I was planning to work towards my Security +. Infact CompTIA Security+ is the most obtained security certification around. It is an entry level security certification that shows you know and understand the core skills that are required for cyber security. The next certification is Certified Information Systems Security Professional. This certification is the most sought out for since it shows you are an experienced security technician. The third certification is Certified Information Systems Auditor. This shows that you are experienced in finding and assessing security vulnerabilities. 

With certifications down, salaries were up next. I decided to use Indeed.com to use the salary finder implemented on the website. After thinking for a way to work It hardware technician, I decided to use IT Technician as my word of choice. In West Carrollton, Ohio, the average salary for an IT Technician is around $19.01 per hour, or $57,992 per year. As for cyber security, the average salary for a Cybersecurity specialist is $37.75 per hour, or $75,501 per year. Looking at this, I am slowly towards switching careers however I still want to look at potential degrees for both career options.  

For the Degrees, I decided to look at 3 different schools for both jobs. The schools I will be looking at are Sinclair, Wright State, and Ohio University. For Sinclair I will be looking at my current degree, Computer information Systems/User Support. In this course the minimal tuition is $8,433.86 for the entire course. For Wright State, there is no major for Information Technology, however they do have an undergraduate degree that would come to around $44,992 if I lived on campus and $25,076 if I lived off campus. Ohio University has a degree called Computer Technology Major. If I were to live on campus and do four years for the degree, it would cost $106,296. 

Now for Cyber Security I do not believe it will be much more different for Ohio University which will be $106,296, However I do think there will be a cost difference for Wright State and Sinclair. For Sinclair we will be using Cyber Investigation Technology. For the total cost, the minimum cost would be $8297.83 not including any class fees. For wright state I will be using Science in Information Technology and Cybersecurity. This will bring me to $89,984 if I decide to live on campus and $50,152 if I lived off campus. 

After my evaluation's finding, I believe I have decided which one I will do. I will finish m y current degree which is CIS User Support from Sinclair and then transfer all credits I can over to Wright State. The reason for this is that way I can start my career in Information Technology so I can save up to go to Wright State and get my bachelor's in Science in Information Technology and Cyber Security. 

  1. On what criteria is the evaluation based??(Are these clearly established? If not, make suggestions.)
  2. What is the thesis statement (criteria) of the paper? Is it clear by the end of the introduction what the writer will be evaluating, and on what criteria? Any suggestions?
  3. Is the evaluation clear? Are judgments supported by examples? Is there too much summary or description? Is the evaluation fair and balanced?
  4. Does the opening paragraph grab your attention? Does it give enough information to orient the reader to the topic and establish the writer's credibility? Too much? Too little?
  5. Does the writer sound knowledgeable and fair? Does she/he anticipate and address other viewpoints? Make suggestions for improvement.
  6. If the author has included an extended analogy, is it creative? Does it address both items that are being compared with explicit details? What can be done to improve it?
  7. Does the conclusion successfully close the paper and persuade you to agree with the writer? Any suggestions for a better ending?
  8. What is the greatest strength of the paper? What's the biggest weakness? (Please consider grammar/spelling errors and suggest tutoring if needed.)
  9. Does the essay sound like a summary or provide too much detail without making a clear judgment? Help the writer see where she/he can be more objective.

Reference no: EM133550658

Questions Cloud

Why do you consider global a social problem : Why do you consider global a social problem? What are ways we can do to help when it comes to global warming?
What are ethical and legal implications for practice members : What are the potential ethical and legal implications for each of the following practice members?
Describe the properties of your chosen sample : Select a favorite mineral or rock of your choice. Briefly describe the properties of your chosen sample. Include with your description
Analyze potential effectiveness resulting from professional : Analyze the potential effectiveness resulting from professional or nurse-provided social support versus enhancement of social support provided by personal.
Does the essay sound like a summary : Does the essay sound like a summary or provide too much detail without making a clear judgment? Help the writer see where she/he can be more objective
Are two of the three capacities more likely to overlap : Are two of the three capacities more likely to overlap? If yes, which two capacities? Who are these leaders and followers?
Perform reconnaissance on it : Perform reconnaissance on it. Since this is a non-intrusive information gathering exercise, you can choose any organization that interests you
Identify at least two barriers you might encounter : Identify at least two barriers you might encounter when using the dissemination strategies, you are most inclined to use. Be specific and provide examples.
What can you suggest to maintain a strict password : What can you suggest to maintain a strict password policy for the five managers but loosen requirements for the remaining staff? What steps would you take

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd