Create your Cybersecurity Portfolio Portfolios are an invaluable tool in academic and professional development. They provide a powerful medium for users

Create your Cybersecurity Portfolio

Portfolios are an invaluable tool in academic and professional development. They provide a powerful medium for users to efficiently collect and organize artifacts representative of work completed over time. Portfolios offer a means to demonstrate formative and/or summative progress and achievement. Portfolio authors are empowered with tools to effectively present their information in a cohesive, personalized format.

The goal is for all students in this class to create an Portfolio which offers an audience artifacts and student reflections as to serve as both a showcase of student work but reflection of the learning through that student cybersecurity work.

Essential Question: How do I create a professional portfolio which will exhibit my best work to University admissions, administration, scholarship opportunities, and future employers? 

Objective: I will be able to create a professional portfolio profile to market myself for potential cybersecurity opportunity door-openers.

Task: Create a Portfolio for this Cybersecurity course.

  1. Title: Your title should be your first name last name’s Cybersecurity Portfolio.
  2. Create Introductory page. Introduce yourself in a professional way. Include your class rank, college, organizations you are involved in at college and in community, cybersecurity – competitions/challenges/conferences/workshops you worked on or attended or contributed, a part-time job, past internships and/or employments, your career goal, one person who is a role model for you and a quote from that role model which is appropriate to why he or she is your role model.  
  3. Add a picture of yourself to your profile. 
  4. Choose a layout and color that you would like to assign for a theme for your portfolio.  
  5. Format your prose so it is easy to read. Maybe use a color that matches the picture that you add. Remember, readability is HUGE! 
  6. Create a Word Cloud ( to an external site.)of about 30 words that mean a lot to you! Save your Word Cloud as a .jpg in Paint and then insert at the bottom of your profile description. 
  7. Add documents that will market you. Suggestions: a resume, a recommendation letter from an internship supervisor or employer, certificates, a paper or project you are proud of in college 

To have it graded: Submit your portfolio to the professor for any feedback. If the professor has any feedback, update accordingly and and re-submit it and it will be regraded.

Share your portfolio with others, both at your institution and outside the walls. Each time you share a portfolio with other users, you create a static snapshot of that portfolio at that point in time. What is shared is that static snapshot. If you make edits that you want to share, you need to share the portfolio again.

Below is link to good sample ePortfolios from Auburn students and alumni:

here is the example sample:-

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

ERP and ITSM are interconnected in supporting the effective operation of an organisation’s IT infrastructure and business processes. By aligning ERP and IT

ERP and ITSM are interconnected in supporting the effective operation of an organisation’s IT infrastructure and business processes. By aligning ERP and ITSM efforts, organisations can ensure the reliable performance, security, and usability of ERP systems, ultimately driving business efficiency and success. In this assessment, you need to select one

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Read the Tyrvainen et al. (2006) article (see the Figure 1 framework) and Grahlmann et al. (2012) article (see the Figure 2

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Key Assignment template. Propose an appropriate network infrastructure that

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should demonstrate your understanding of professional and ethical responsibility in relation to cyber security operations and leadership. For this assignment, review your coursework  and identify artifacts that can

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled Data Breach an All-Too-Often Occurrence. After reviewing the story, conduct research online into

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled The Importance of Knowing Your Own Security Posture.  After reviewing the story, conduct