During my time with Auxiliary Business Services, there were a variety of tasks that we did most of the time this semester. After viewing documents that discuss setting up hardware and configuring desktops and laptops. The first task we worked on was setting up new desktops and monitors for the ODU Mail Center. First, we were shown how to determine which hardware the ODU Mail Center. The equipment arrived in the next following days, so we went to the Mail Center to set up the equipment for about 30 to 45 minutes. Problems that the team and I ran into were the placement of the desktop they wanted the desktop didn’t have a network jack nearby and the network cables that were provided were damaged.
Internship experience with Centura Health
In my meeting with one of the Information Security Analysts in the Cyber Assessment & Testing branches, I was shown different cybersecurity tools that are used for their daily duties. Tools that they use are Sentinel One, Carbon Black, Virus total, Palo Alto, Panorama, Mimecast, LogRhythm, and SIEM.
Internship experience with Auxiliary Business Services
We have started Jamf and Microsoft Intune. We would mostly use Microsoft Intune because most of the devices on campus are mainly Microsoft devices. We use MDM for devices we would configure to add or remove from the ODU cloud network. We usually do this when we are replacing old equipment with new updated systems.
How does your major relate to cybersecurity technology?
My name is Joseph Koduah, my major does not relate to cybersecurity technology, it is cybersecurity. Originally, I was aiming for a bachelor’s degree in chemical engineering because I thought that I had a genuine passion for Engineering. I spent two years thinking about how I would see myself in the workforce but as time went by, I realized I did not like it as much. I have always known I wanted to associate my career with computers, so it was either between information technology, information systems, or cybersecurity. Out of the three, cybersecurity stuck out the most. Having a system that cannot be penetrated by any attack can be beneficial to all users. I was inspired by one of my cousins to pursue the cybersecurity career route. We have sat down with each other to discuss my future. We started by listing everything we wanted to accomplish in the next five years. Then began to discuss our career goals. Once he notices that I was not sure about engineering, he introduced me to the world of the technology workforce. He suggested the I should look into cybersecurity and start by using a website called Udemy. He stated, “If you truly are serious about your education and your goal, you will be able to accomplish anything you put your mind to. Try checking out cybersecurity and tell me how you like it. Get started now before it’s too late.” After that meeting with my cousin, I became more confident in myself. I have been using Udemy consistently to educate myself about the cybersecurity world. I am still a beginner with coding, but I know the fundamentals of coding and securing the devices that I use. This summer I will strive to achieve my security+ certification to have a better opportunity to obtain a career.
Hello world!
Welcome to Old Dominion University – WordPress. This is your first post. Edit or delete it, then start blogging!