Michael funsho kayode Expertise cyber security
No reviews yet

Performing various security audits and analyzing logs.
Providing support to all firewalls and network for operating systems.
Scanning all network devices.
Designing and enforcing all security standards and procedures in systems.
Designing all security policies and guidelines for system security processes. Cybersecurity can be divided into these common categories:
Network security: This involves securing a computer network from intruders, which can be targeted attackers or opportunistic malware.

Application security: This focuses on keeping software and devices free of threats. A compromised application could end up providing access to the data it was designed to protect.

Information security: This involves protecting the integrity and privacy of data, both in storage and in transit.

Operational security: This includes handling and protecting data assets such as the permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared.

Disaster recovery and business continuity: This involves how an organization responds to a cyber-security incident or other events that might cause the loss of important operations or data. Disaster recovery policies show how the organization restores its operations to the same operating capacity before an incident. Meanwhile, business continuity is the plan the organization falls back on while trying to operate without certain resources.

End-user education: This category addresses people – the most unpredictable cyber-security factor. Anyone can accidentally introduce a virus to a secure system by failing to follow the appropriate security practices. Cybersecurity involves teaching users to delete suspicious email attachments, not plug in unidentified USB drives that may contain malware and various other important lessons that are vital for the security of any organization.
Training colleagues – That is, you will be responsible for teaching employees the appropriate security procedures on all information security issues.
Maintaining the required security standards and staying up-to-date.
Educational Requirements
To pursue a career in Cyber Security, a secondary school background in Computer sciences and related fields is required. Although some employers accept Cyber Security Specialists with Associate Degrees, it is ideal to have a Bachelor’s Degree. The Bachelor’s degree can be in Computer Science, Information Technology, Telecommunications, Electronics & Electrical or any related field. Education programs for prospective Cyber Security Specialists typically focus on computers and networks.
Some other career paths that are similar to Cyber Security include:

Database Architect
Computer Programming
DevOps Engineers
Network Security Specialist
Computer Security Specialist
Information Security Specialist
IT Security Specialist
Although these careers are aspects of cybersecurity processes, they differ because their experts only pay attention to specific areas of cybersecurity.

Postgraduate Options
The University of Law Business School Postgraduate in London offers an MSc Cyber Security and Data Governance that focuses on a combination of technology, business, and policy. The tuition is GBP 17,000 and it lasts for 12-18 months full-time.

Subjects

  • Cyber Defense Tools Beginner-Intermediate


Experience

No experience mentioned.

Education

  • Basic skill writing certificate (Feb, 2011Sep, 2022) from University of Michigan, Dearbornscored 80/100

Fee details

    2,0003,000/hour (US$1.291.94/hour)

    Michael funsho kayode
    *********
    United bank of Africa (UBA)


Reviews

No reviews yet. Be the first one to review this tutor.