COMP 552
Introduction to Cybersecurity
Page 1 of 4
Lab Report 2: Career Exploration
Due Date: By 11:59 p.m. the day of your lab
Submission Method: Dropbox (“Lab 2 – Career Exploration” folder)
Submitted by: Abhijeet Singh Brar
Student ID: 10195425
Section: L-03
Date submitted:
Instructor submitted to: Robert French
Rubric
Report Format (content is well organized by section) /2
Content (relevant ideas are presented and cited accurately) /6
References (cited research sources are listed in APA format) /2
Cover Page (content is missing, inaccurate, or incomplete) /-1
Total /10
COMP 552
Introduction to Cybersecurity
Page 2 of 4
Introduction:
The purpose of this activity is to explore careers in computer security in Canada to better
understand the educational requirements and income potential for jobs in this dynamic field.
Activities:
Research online career sites in Canada (e.g., monster.ca, careerbuilder.ca, indeed.ca,
jobbank.gc.ca, etc.) for computer security positions. What training and certifications are
employers asking for? What income can you earn in these positions? Summarize your findings
in your own words using the table below. Complete at least three entries.
Wireless Technology and Computer Security Positions in Canada
Employer
(include hyperlink to job
posting)
Job Title Job Description
(in your own words)
Starting
Salary ($)
Educational Requirements Years of
Experience
Needed
PlanIT Search IT Specialist Installation,
Configuration, support,
monitoring, troubleshoot
the IT systems and
equipment.
Monitor, secure and
guide Network, Design
and Develop Architects.
C$36K Computer Science or related
fields, knowledge of network
topologies, IT Background,
Experience with different OS
systems, Troubleshooting,
Ms-Office, Virtualization,
following Documentation
Minimum
3-5
years of
experien
ce in IT
system
and
support
backgrou
nd.
Profile
Solutions
Information
Security
Specialist
Secure system’s architect
and resources, Determine
Security hazards and keep
system controls sustain.
C$60K System and Network
Administration, knowledge of
Network Protocols and
Troubleshooting,
Minimum
5-6 years
of
experienc
e in IT
field and
Knowledg
e of
Networkin
g.
Randstad Service
Desk Analyst
(backend)
Interaction with teams
members, good customer
service provider, remote
and desktop support and
solving documentations.
C$37K Computer Science or related
diploma, Degree or
certification, Knowledge of IT,
Ms-Office, Windows Active
Directories etc.
Minimum
2 years
of work
experien
ce in IT.
Discussion:
COMP 552
Introduction to Cybersecurity
Page 3 of 4
Answer the question below in the space provided in five to seven sentences.
Based on your research and the following online resources, what actions must you take to
prepare yourself for a career in computer security? Cite and reference your response using
American Psychological Association (APA) format (this is already done for you in this lab).
• http://www.computerworld.com/article/2603927/security0/how-to-get-a-job-in-computersecurity.html
• https://www.infosecurity-magazine.com/news/how-to-prepare-for-a-cybersecurity/
• https://www.lifewire.com/and-a-cybersecurity-job-2487279
• http://www.cyberdegrees.org/resources/transitioning-from-general-it/
Answer question here.
? Academic degree or certification is not sufficient to build your career.
? Practical knowledge and experience in field is an asset.
? Focus on one field and get perfection in that because it is impossible to be a king of
every field.
? Be always active and updated about upgrading and coming trends in IT sector.
(Cyber Degrees, n.d.; O’Donnell, 2016; Seals, 2014; Winkler, 2014)
Conclusion:
In the space below, explain in two to three sentences what you have learned from this activity.
Provide conclusion here.
The whole research cleared out my vision to some extent about company’s requirements,
hiring procedures, job posting, various skills and minimum salaries in IT fields. Also gave me
idea about academic qualifications and Entry-level certifications that help in future career.
At the end I want to conclude that now I know where and how to accomplish my dream job.
References (list research sources cited in lab alphabetically in APA format – already completed):
Cyber Degrees. (n.d.). Transitioning from General IT to Cyber Security. Retrieved from
http://www.cyberdegrees.org/resources/transitioning-from-general-it/
O’Donnell, A. (2016). 5 Tips to Help You Land a Cybersecurity Job. Retrieved from
https://www.lifewire.com/and-a-cybersecurity-job-2487279
Seals, T. (2014). How to Prepare for a Cybersecurity Career. Retrieved from
https://www.infosecurity-magazine.com/news/how-to-prepare-for-a-cybersecurity/
COMP 552
Introduction to Cybersecurity
Page 4 of 4
Winkler, I. (2014). How to get a job in computer security. Retrieved from
http://www.computerworld.com/article/2603927/security0/how-to-get-a-job-in
computer-security.html
Please refer to the following online resources to help you with APA Citing and Referencing:
• Purdue Online Writing Lab (OWL): https://owl.english.purdue.edu/owl/resource/560/01/
• Citing and Referencing document in “Additional Resources” folder in D2L
• YouTube Videos 

x

Hi!
I'm Katy!

Would you like to get a custom essay? How about receiving a customized one?

Check it out