Read the article and write a summary reaction to the use of the policies in your journal.  Focus primarily on the literature review and the discussion of the findings. (Week 12-2)

with No Comments

The article references policy strategies that could be implemented to regulate “ethical hacking” or “white hat hacker”, that seek to bug bounty. An activity where an individual uses their skills of penetration testing to identify and sometimes notify the organization … Read More

Read the article “An Emerging National Security Requirement” and write a journal entry summarizing your response to the article on social cybersecurity. (Week 11-1)

with No Comments

I see this field as an essential aspect of national security for the United States. With its focus on understanding and planning around behaviors that might arise from social, political, or cultural scenarios, its uses to assist with safety are … Read More

Week 1 – Journal Entry

with No Comments

The NICE workforce framework has a plethora of career specialties that I find appealing to work in. Previous positions I’ve held and found enjoyable align with the Oversight and Governance work role category, specifically systems security management. It would be … Read More