Following details will be shared with the tutors you will contact:
Confirm to delete
Are you sure want to delete this?
Michael funsho kayodeExpertise cyber security
No reviews yet
Performing various security audits and analyzing logs. Providing support to all firewalls and network for operating systems. Scanning all network devices. Designing and enforcing all security standards and procedures in systems. Designing all security policies and guidelines for system security processes. Cybersecurity can be divided into these common categories: Network security: This involves securing a computer network from intruders, which can be targeted attackers or opportunistic malware.
Application security: This focuses on keeping software and devices free of threats. A compromised application could end up providing access to the data it was designed to protect.
Information security: This involves protecting the integrity and privacy of data, both in storage and in transit.
Operational security: This includes handling and protecting data assets such as the permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared.
Disaster recovery and business continuity: This involves how an organization responds to a cyber-security incident or other events that might cause the loss of important operations or data. Disaster recovery policies show how the organization restores its operations to the same operating capacity before an incident. Meanwhile, business continuity is the plan the organization falls back on while trying to operate without certain resources.
End-user education: This category addresses people – the most unpredictable cyber-security factor. Anyone can accidentally introduce a virus to a secure system by failing to follow the appropriate security practices. Cybersecurity involves teaching users to delete suspicious email attachments, not plug in unidentified USB drives that may contain malware and various other important lessons that are vital for the security of any organization. Training colleagues – That is, you will be responsible for teaching employees the appropriate security procedures on all information security issues. Maintaining the required security standards and staying up-to-date. Educational Requirements To pursue a career in Cyber Security, a secondary school background in Computer sciences and related fields is required. Although some employers accept Cyber Security Specialists with Associate Degrees, it is ideal to have a Bachelor’s Degree. The Bachelor’s degree can be in Computer Science, Information Technology, Telecommunications, Electronics & Electrical or any related field. Education programs for prospective Cyber Security Specialists typically focus on computers and networks. Some other career paths that are similar to Cyber Security include:
Database Architect Computer Programming DevOps Engineers Network Security Specialist Computer Security Specialist Information Security Specialist IT Security Specialist Although these careers are aspects of cybersecurity processes, they differ because their experts only pay attention to specific areas of cybersecurity.
Postgraduate Options The University of Law Business School Postgraduate in London offers an MSc Cyber Security and Data Governance that focuses on a combination of technology, business, and policy. The tuition is GBP 17,000 and it lasts for 12-18 months full-time.
Subjects
Cyber Defense Tools Beginner-Intermediate
Experience
No experience mentioned.
Education
Basic skill writing certificate (Feb, 2011–Sep, 2022) from University of Michigan, Dearborn–scored 80/100
Fee details
₦2,000–3,000/hour
(US$1.29–1.94/hour)
Michael funsho kayode ********* United bank of Africa (UBA)