7-2 Project Two - The IT Professional

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200 200

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

11

Uploaded by Mngene2002

Report
7-2 Project 2 1. Computer Science - the study of computers and their systems, which pertain to the software, software systems, also includes their theory, design, development, and application . Most roles in the IT field are computer science: Application analyst Applications developer Cyber security analyst Data analyst Database administrator Forensic computer analyst Game designer Games developer The tools needed for most of these roles is having the right software, coding/scripting, and training. Also a fast connection on a network helps data or information to be transferred fast. 2. Information Systems - a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information . Information Systems roles include: Network Support Personnel Systems Analysts Consultants Computer Programmers Database Support Personne l
Computer Support Specialists Web/Internet Support Specialists Having the right networking hardware and software are the core tools needed for these roles. Also servers, switches, routers, coding, and connection are essential tools. 3. Engineering - is the use of scientific principles to design and build machines, structures, and other items, including bridges, tunnels, roads, vehicles, and buildings. The discipline of engineering encompasses a broad range of more specialized fields of engineering , each with a more specific emphasis on particular areas of applied mathematics , applied science , and types of application. Computer engineering - is a discipline that integrates several fields of computer science and electronics engineering required to develop computer hardware and software . These roles include: Computer Programmer Mechanical Engineer Electrical Engineer Industrial Engineer Computer Systems Analyst Computer User Support Specialist Web Developer Computer Network Architect The tools needed for this role are the right hardware components and various computer hand tool if you are building systems form the ground up and if you are
repairing systems instead of replacing them. Also software programs and coding/scripting are a must. 4. Information technology (IT) - is the use of computers to store, retrieve, transmit, and manipulate data or information . A few roles for IT: Hardware Technician Help Desk Analyst and Help Desk Suppor t Network Administrator/Engineer Business Analys t IT Project Manager Systems Engineering Manager IT Director, Vice President, CIO/CTO H ere the tools needed are the processes, and methodologies (such as coding/programming, data communications, data conversion, storage and retrieval, systems analysis and design, systems control) and associated equipment employed to collect, process, and present information . 5. Scripting - a programming language for a special run-time environment that automates the execution of tasks; the tasks could alternatively be executed one-by-one by a human operator. Scripting languages are often interpreted , rather than compiled . 6. Programming or Computer Programming - process of designing and building an executable computer program to accomplish a specific computing result or to perform a specific task. Programming involves tasks such as: analysis, generating algorithms , profiling algorithms' accuracy and resource consumption, and the implementation of algorithms in a chosen programming language (commonly
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
referred to as coding ). Also, i s essentially a formal language that combines a set of instructions that can be fed into the computer to generate a specific output. The relationship or primary difference between a scripting language and a programming language is in their execution – programming languages use a compiler to convert the high-level programming languages into machine language, on the other hand, scripting languages use an interpreter . The difference between a program and script are: A "program" in general, is a sequence of instructions written so that a computer can perform certain task . A "script" is code written in a scripting language. A scripting language is a type of programming language in which we can write code to control another software application . IT professionals use scripting in the networking, games, and administration of computer systems in the IT field. They would also use scripting for: PHP The most popular server-side language used on the web. ASP.NET Web-application framework developed by Microsoft. Node.js Can run on a multitude of platforms, including Windows, Linux, Unix, Mac, etc. Java Used in everything from your car stereo’s Bluetooth to NASA applications. Ruby Dynamic. Focuses heavily on simplicity. Perl A bit of a mashup between C, shell script, AWK, and sed. Python Great for beginners to learn. Uses shorter code.
HTML The foundation of web development. CSS Improves appearance and graphics on pages in your web browser. JavaScrip t Though typically client-side, can occasionally be used on server-side as well. Programmers can write code for computer programs and mobile applications. They also maintain, debug , troubleshoot systems and software to ensure that everything is running smoothly . Programming skills are essential for many technology disciplines, especially in high demand for software and web development roles. Programmers create and install updates for existing software programs. An update might include a bug fix, or enhanced functionality to improve the user experience. Depending on the complexity of the update, these projects can take from a few days to several months. P rogrammers have to rewrite code in a different languages, so programs and applications can be compatible with different operating systems. Windows and OS X programs are coded differently. Some programmers are trained to write new applications in SaaS code, which works with both operating systems. Many computer programmers work in the cybersecurity field, they identify malicious software and fix software that could be vulnerable to potential hacks. P rogrammers can write code that stops security breaches and data leaks. Positions Entry Level The 1 st job I chose as an entry level cyber security job is an Information Security Analyst. This position is aligned with Information Technology and Information
Systems. These a nalysts plan and carry out security measures to protect an organization’s computer networks and systems. Most of these analyst work for computer companies, consulting firms, or business and financial companies. Some of the tools a Information Security Analyst would need and use would be: 1. An OSINT Monitoring Platform 2. A WHOIS/IP Geo-location Tool 3. A Search Engine Training for this career would need at least a bachelor’s degree in computer science, information assurance, programming, or a related field. Some employers prefer applicants who have a Master of Business Administration (MBA) in information systems. G eneral information security certificates, such as the Certified Information Systems Security Professional (CISSP), while others have a more narrow focus, such as penetration testing or systems auditing. With multiple certifications company like having a worker that is trained with the software they use. Mid Level As a mid level career I would like to be a Network and Computer Systems Administrator . This position I feel is aligned with Information Systems, Technology, and Engineering. The administrators are responsible for the day-to-day operation of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
computer networks and they can work with the physical computer networks of a variety of organizations and therefore are employed in many industries. Some of the most popular tools for a Network and Computer Systems Administrator are: Wireshark and Microsoft Message Analyzer Clonezilla PowerShell ISE and its Script Browser and Script Analyzer Add-ons RSAT Tools for Windows 10 Tools from the Sysinternals Suite System Monitor (Sysmon) AccessChk Autoruns Process Explorer Process Monitor 7-zip Notepad ++ Netwrix Account Lockout Examiner Process Hacker PuTTy Training required for this career includes a bachelor’s degree in a field related to computer or information science. Others may require only a postsecondary certificate or an associate’s degree. A few certification to have that will help for this career are: CompTIA A+ Certification.
CompTIA Network+ Certification. CompTIA Security+ Certification. Cisco CCNA Certification. Cisco CCNP Certification. Microsoft Certified Solutions Associate (MCSA) Microsoft Certified Solutions Expert (MCSE) Ultimate Position The ultimate career goal or position for me is with my current company Wal-Mart as an Incident Response Specialist with their cyber security team. I think this position aligns with information technology, computer science, engineering and information systems. Wal-Marts system requires all of these aspects.
This role has employees stay current on new tooling capabilities, threat landscape trends, and response strategies; mentor junior members of the InfoSec department; participate in Purple Team efforts and engagements. Document action plans and provide status updates as needed in order to keep leadership informed of ongoing response efforts . Rotate r esponders through the team's Threat Hunting program in order to proactively identify potential risks to the organization. Partner closely with Walmart's Privacy, Legal, Investigations, Program Management, and Threat Intelligence teams to ensure risk is fully mitigated and our recommendations are implemented. Discover and Timeline the facts of any suspected Cybersecurity incident as they occurred on endpoints and the network, both for Walmart and all global subsidiaries. Walmart provides everything an employee would need for this role and uses their own software programs. As for training, their m inimum q ualifications are a Bachelor’s degree in Computer Science, Information Technology, Engineering, Computer Information Systems, or related field and 3 years' experience in information technology or related field within the last 7 years OR 5 years' experience in information technology or related field within the last 7 years. T heir certifications and preferred qualifications are b uilding system requirements, Information Security, Information Systems, Installing computer hardware or software, Investigations, Programming Languages, Support, Troubleshooting. CISSP - Certified Information Systems Security Professional - Certification, GCIH - GIAC Certified Incident Handler - Certification Certifications
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
CISSP - is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². GIAC Certified - GIAC stands for Global Information Assurance Certification. CompTIA A + - This certification is designed for folks seeking a career as a help desk, support, service center or networking technician. It covers PC and laptop hardware, software installation, and configuration of computer and mobile operating systems. CompTIA Network+ - is an IT certification exam that verifies you have the essential knowledge and skills in networking to develop a career in IT infrastructure. ... CompTIA Network+ certifies a professional-level understanding of emerging technologies, including cloud and virtualization technologies. CompTIA Security+ - is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career . CCNA Security - validates knowledge of security infrastructure, threats, and vulnerabilities to networks and threat mitigation. Required skills include installation, troubleshooting and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices. CCNP Security - certification program aligns to the job role of the Cisco Network Security Engineer, who has responsibility for security in routers, switches, networking devices, and appliances, as well as choosing, deploying, supporting, and troubleshooting firewalls, VPNS, and IDS/IPS solutions for their networking environments. Most these certifications can be obtained by these companies offering these classes and exams. Also, some schools will offer them through their programs with your tuition.

Browse Popular Homework Q&A

Q: manufacturer knows that their items have a normally distributed lifespan, with a mean of 8.9 years,…
Q: Espanol An intelligence test was recently administered to a group of 22 people. Their respective…
Q: fence post is 54.0 m from where you are standing, in a direction 35.0 ∘ north of east. A second…
Q: The table shown below lists the cost y (in dollars) of purchasing cubic yards of red landscaping…
Q: Ubj. 1, 2, 3, 4 PR 2-2A Journal entries and trial balance On October 1, 20Y6, Jay Crowley…
Q: Shade a Venn diagram to represent (AUC) nB'. I C IV b Review shading Venn diagrams here. 01 O II III…
Q: File Edit Format View Help LONGEST COMMONE SUB SEQUENCE Given two sequences X and Y, we want to find…
Q: The rabbit population at the city park increases by 13% per year. If there are intially 149 rabbits…
Q: You borrow $710 from your brother and agree to pay back $770 in 3 months. What simple interest rate…
Q: Suppose IQ scores were obtained for 20 randomly selected sets of siblings. The 20 pairs of…
Q: If next years dividend, D = $1.25, g (which is constant) = 5.5%, and the current price, P = $28,…
Q: Using the definition, calculate the derivatives of the functions in Exercises 1–6. Then find the…
Q: Oral N-acetylcysteine (NAC) exerts a beneficial action in chronic bronchitis by reducing the number…
Q: Find the pvalue for the intercept and state the correct representation of the related logistic…
Q: 1.) Let U=(n, o, p, q, r, s, t, u, v), A=(n, p, q, s) and B= (n, o, t, u, v). Draw a Venn diagram to…
Q: V = ? (± 3.2 5 2 5 + Vx = 9V
Q: The lift force of an aircraft will be studied in a cryogenic wind tunnel, in which nitrogen at low…
Q: The history of Benford’s Law The application of Benford’s Law to auditing and accounting When to use…
Q: The mass of a Ford F-150 truck is M. If the truck is moving with speed s, what is the kinetic…
Q: How are intracellular and extracellular proteins degraded?
Q: Consider a tank with a semi-circular wall of radius, R. The atmospheric pressure is P0. Density of…
Q: O'Brien Ltd.'s outstanding bonds have a $1,000 par value, and they mature in 25 years.  Their…