Professional Documents
Culture Documents
Assignment 2 Gene 60 Akshay Kumar 4342270 Spring 2023 1
Assignment 2 Gene 60 Akshay Kumar 4342270 Spring 2023 1
ASSIGNMENT 2
SPRING 2023, GENE 60
Date of submission: WEEK 5
NAME: Akshay Kumar
ID: 4342270
ASSIGNMENT TYPE: ESSAY
TOTAL CONTRIBUTION: 10%
TOTAL MARKS: 40
Rubric:
GENE 60
Assignment #1 – 10%)
Self-Assessment
Guidelines:
Make sure you have completed the assessments on pages 4-19 in your copy of “Get a job”
workbook before attempting this exercise.
1. Introduce yourself (Tell me a little bit about yourself, your academic background etc.)
ANS: My name is Akshay Kumar, and I am currently a student of Computer System Technician
at Alpha College, with student ID 4342270. I come from a background of completing a
bachelor’s degree in computer applications in my home country. During my degree, I developed
a strong interest in cybersecurity and earned a certificate in ethical hacking. I am truly
enthusiastic about two things: hacking and innovation. The field of cybersecurity is where I see
my future, combining my passion for hacking with a commitment to ensuring a secure digital
landscape. In my free time I love to read business articles.
3. What will a potential employer find attractive about your current or past
accomplishments and/or education?
ANS: Here are some aspects that a potential employer may find attractive about me
current or past accomplishments and education:
Relevant Education: Having earned a bachelor's degree in computer applications, I have
a solid background in technology and computer science. I think Candidates with formal
educational backgrounds are valued by employers.
Specialization in Cybersecurity: I have an interest in ethical hacking and in
cybersecurity demonstrates a narrow and focused interest in the topic of computer
systems. As I have a certificate in the IT sector’s, Employers who place a high priority on
cybersecurity measures may find me to be an asset with my specialization.
International Experience: Having completed my bachelor's degree in computer
applications in my home country adds a valuable international perspective to your
education. This global exposure can be advantageous to employers seeking candidates
with diverse perspectives and cross-cultural understanding.
4. List your top 5 marketable skills, related to your area of study and give at least one
example of each skill of how you have put each of them to practice. (You can include
your transferable skills and technical skills.)
ANS:
Ethical Hacking and Cybersecurity
Risk Assessment and Management
Communication and Collaboration
Leadership
Ability to train.
1. Ethical Hacking and Cybersecurity:
TASK: The task was to assist the senior members of the team in conducting the penetration test,
which involved simulating real-world hacking techniques to identify weaknesses in the web
application. Our objective was to provide the client with a comprehensive report detailing the
vulnerabilities discovered and recommending appropriate remediation strategies.
ACTION: Under the guidance of the senior team members, I actively participated in various
stages of the penetration testing process. This included conducting reconnaissance to gather
information about the target system, performing vulnerability scanning and analysis, and
attempting to exploit identified vulnerabilities. I also used specialized tools and techniques to
simulate common attack scenarios and carefully documented my findings. Throughout the
project, I adhered to ethical guidelines and maintained the utmost integrity to ensure the client's
data and systems remained secure.
RESULT: As a result of our ethical hacking efforts, we successfully identified several critical
vulnerabilities in the client's web application. Our detailed report outlined each vulnerability
along with recommended mitigation strategies. The client appreciated our thoroughness and
professionalism, as they were able to address these vulnerabilities promptly, thereby
strengthening their security posture and protecting their sensitive data. This experience further
solidified my passion for cybersecurity and ethical hacking while providing me with valuable
insights into the field.
TASK: My task was to develop and implement a training program that covered various
computer-related topics, such as coding, digital literacy, and software applications. I aimed to
equip students with essential skills to thrive in the digital age and pursue their interests in the
field of technology.
ACTION: I first evaluated the understanding of my classmates before identifying the areas that
would benefit from more instruction. I developed a well-organized curriculum that featured
engaging workshops, coding challenges, and specific projects. I kept the students interested
during the training sessions by using dynamic presentations, live demonstrations, and supervised
activities. I simplified difficult ideas into material that was simple to understand while promoting
involvement and addressing queries to make sure everyone understood. I offered individualized
support to students who required it, delivering one-on-one coaching and supplemental materials
to accommodate various learning styles.
ACTION: I took my pencil and started to write points in my notebook. It helps me a lot to speak
with fluency and with proper knowledge. During the competition, my judge asked me some
questions, and I answered all this makes him happy.
RESULT: I was awarded with first position and I also gained so much confidence to speak in
front of the public.
4. Leadership:
SITUATION: During my high school, I was selected as the captain of the debate team. Our
team had qualified for the regional debate championship, and we had limited time to prepare for
the intense competition.
TASK: The task was to lead and motivate my team to perform their best and ensure we were
well-prepared for the regional debate championship. Our goal was to win the competition and
advance to the state level.
ACTION: I organized regular team meetings to discuss strategy, research potential arguments,
and practice debating different topics. I assigned specific research topics to each team member,
ensuring that everyone had a clear role and responsibility. I also facilitated practice debates,
providing constructive feedback and helping teammates improve their delivery and
argumentation skills. Additionally, I encouraged open communication, listened to my team
members' ideas, and addressed any conflicts that arose to maintain a positive team dynamic.
RESULT: As a result of my leadership, our team performed exceptionally well at the regional
debate championship. We won several rounds and received praise from judges for our persuasive
arguments and strong teamwork. We secured a place in the state-level competition, which was a
significant achievement for our school. Personally, this experience taught me the importance of
effective communication, collaboration, and supporting others' growth as a leader.
5. : Ability to train’s:
TASK: The task was to assist the senior members of the team in conducting the penetration test,
which involved simulating real-world hacking techniques to identify weaknesses in the web
application. Our objective was to provide the client with a comprehensive report detailing the
vulnerabilities discovered and recommending appropriate remediation strategies.
ACTION: Under the guidance of the senior team members, I actively participated in various
stages of the penetration testing process. This included conducting reconnaissance to gather
information about the target system, performing vulnerability scanning and analysis, and
attempting to exploit identified vulnerabilities. I also used specialized tools and techniques to
simulate common attack scenarios and carefully documented my findings. Throughout the
project, I adhered to ethical guidelines and maintained the utmost integrity to ensure the client's
data and systems remained secure.
RESULT: As a result of our ethical hacking efforts, we successfully identified several critical
vulnerabilities in the client's web application. Our detailed report outlined each vulnerability
along with recommended mitigation strategies. The client appreciated our thoroughness and
professionalism, as they were able to address these vulnerabilities promptly, thereby
strengthening their security posture and protecting their sensitive data. This experience further
solidified my passion for cybersecurity and ethical hacking while providing me with valuable
insights into the field.
Tips: