Report 2 7

REPORT # 2
Name: Mohammad Ghori
Course number:BA63270G120
Student ID:
1. Courses I Am Taking This Term – Describe the eight-week online course (course #,
course title, & course description)
I am enrolled in in BA63270G120 Cyber Security eight hour online course.Industry characterizes Cyber
Security as the practice of protecting systems, networks, and programs from digital attacks. This
course explores the current body of knowledge, skills, techniques, and tools used to recognize and
mitigate Cyber Security Attack
2. List Outcomes from Your Eight-Week Course – List the outcomes (objectives) as
written in the course syllabus from the eight-week online course.








Objectives of Cyber Security Course include learning
domain and network layers of the OSI model
intrusion detection system (IDS) systems used to monitor network traffic for suspicious
activity and issues alerts when such activity is discovered
intrusion prevention systems (IPS) which operates much line IDS but adds a layer of security
to reject (or nullify) the potentially malicious activity
Honeypots – used to attract harmful activities in order to understand the mechanisms used
malicious software
software vulnerabilities
cryptography – the practice and study of techniques for secure communication in the
presence of third parties called adversaries
encryption and decryption techniques used to secure data and limit the potential for data
breaches
3. Apply Your Work Experiences to The Course – Correlate your job responsibilities
with the eight-week online course outcomes listed above.
I am currently working as a software developer. Cybersecurity addresses the key aspects
confidentiality, authentication, integrity, and availability.As part of my job responsibilities to
create applications using java programming language and i have learnt to use encryption,
hash functions, message digests, digital signatures, and digital certificates from cyber security
and use it in my coding for security purpose.I am involved creating aws architecture for for
hosting applications.After this course i have more knowledge in using encryption, digital
certificates and signatures in my applications for security purpose to prevent my applications
from intruders.I am involved in developing applications in java programming language and it
is necessary to learn about java security. Java security includes a large set of APIs, tools, and
implementations of commonly-used security algorithms, mechanisms, and protocols. The
Java security APIs span a wide range of areas, including cryptography, public key
infrastructure, secure communication, authentication, and access control. Java security
technology provides the developer with a comprehensive security framework for writing
applications, and also provides the user or administrator with a set of tools to securely
manage applications.security protocols and creating virtual private clouds and subnets and
regions are main vital specifications need to be done while creating AWS architecture for
hosting applications.
Eight-week online course outcomes and correlation of job to the course (total 250 words)

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with StudyAcademia.com
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat