StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software as a Service Methodology - Personal Statement Example

Cite this document
Summary
The author of the paper "Software as a Service Methodology" is an MSc in Information Security from the Royal Holloway University of London. S\he completed his\her Masters's degree in 2013. In MSc, the author's final year project title was security vulnerabilities and possible methods of attack in SSL/ TLS…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Software as a Service Methodology
Read Text Preview

Extract of sample "Software as a Service Methodology"

I have done my BA in Police Science from Kuwait Police Academy in 1997 and BSc in Information Technology in 2008 from Arab Open University. Moreover, I have achieved numerous certificates. I have a certificate of Implementing ISO 9001 and Cybercrime Forensic from Information Centre Kuwait and Interpol (Damascus) respectively. CMI Forensic Investigation, CMI Malware Investigation CMFS Apple Mac Forensic, and CAST Advanced Application Security Testing certificates are a few certificates which I got from 7asfe. In addition to it, from 7asfe, I have certificates of CFIS Advanced Forensic Investigation, CSTP Ethical web Application Hacking, CIIP Implementing ISO 27001, CTSA Ethical Hacking, and CWSA Wireless Security. I have two more certificates, one of Computer Hacking Forensic Investigator (CHFI) v8 from EC- Council and another from Access Data which is of Mobile Device Forensics (Kealey, 2005).

I was a system analyst at the Information Centre ministry of Interior in 2013. I started my career by working at the Ministry of Social Affair and Labor from 1992- 1993. After this job, I continued my studies and completed my BA in Police Science after which I started working as an Immigration Officer at Kuwait International Airport (1997-2006). I became a VIP immigration officer at the same place in 2006 and served this organization till 2009. From 2009- 2013, I worked at the Information Centre Ministry of Interior as a Software Developer.

I am well versed in the skills of programming language. I have high skills in HTML, CSS, XML, JavaScript, and Java programming languages. I have some level of expertise in C/ C++, PHP, SQL, and Python programming languages. I am highly proficient in computer skills and can easily operate different operating systems. I can easily operate Mac, Windows, Linux (Debian, Fedora, Red Hat, Ubuntu, Kali and Backtrack 5), and IBM (z/ OS and CICS).

I have various Information Security skills which I have learned from my working place and academic studies.  SQL injection and XSS are web penetration testing (pentest) which is helpful in attacking the computer system (ethical hacking) to gain information about the weakness of the security. I have polished skills in Wireshark, Armitage, Metasploit, Nmap, cain, and Abel, Nessus 7, and Aircreack- ng which are different tools of network penetration testing and are used in the different operating system. Mobile forensic which is a branch of digital forensic is very useful in the field of Information Security. I have skills in FTK, X- ways, and MPE + which are different forms of Mobile forensics. I am also efficiently skilled in implementing ISO 72001 and security risk management which comes under Information Security Management.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“PERSONAL STATEMENT Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
PERSONAL STATEMENT Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/information-technology/1698101-personal-statement
(PERSONAL STATEMENT Example | Topics and Well Written Essays - 500 Words - 2)
PERSONAL STATEMENT Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/information-technology/1698101-personal-statement.
“PERSONAL STATEMENT Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1698101-personal-statement.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software as a Service Methodology

Software Reconmmedation Report

Material Requirements Planning module of RAD provides benefits similar to its CRP module since RAD's approach has ISO9001:2000 accreditation and all consultants operate under PRINCE2® project management methodology.... Mosaic Implementation methodology (MIM) makes sure the implementation is successful and according to plan and usually takes 90 days on average.... As part of the management team for PPQ Parts manufacturing company, I have analyzed six software packages in the following report in light of our firm's materials requirements planning (MRP), capacity requirement planning (CRP), and enterprise resource planning (ERP) needs....
3 Pages (750 words) Essay

The Modern Era Is Characterized by Digital Communication Means

This would be followed by the research methodology phase of the dissertation which would include the explanation and discussion of the ground level activities and facts related to VOIP.... Using the software is also part of the overall project for purpose of pilot test and evaluation.... software tool application would enable for practical demonstration of the VOIP features, its services and its compatibility with other underlying technologies and hardware applications....
3 Pages (750 words) Dissertation

Service Oriented Architectures

he large scale success of component-based architecture has lead to the development of service Oriented Architectures (SOA).... The concept of SOA is an evolution of the Component Based Architecture in which the enterprise's architecture is developed in a ‘service-Driven Approach'.... service driven approach means that the requirements of an infrastructure are broken down into multiple components; each component providing a distinct service and each service is autonomous....
12 Pages (3000 words) Essay

Software Process Models

In June this year, Television Network Company embarked on the spiral methodology for developing the accounting software “X,” and awarded the world's leading manufacturer of personal computers, Hewlett Packard (HP) the contract to go ahead with its production.... 21st September 2012Subject: Software DevelopmentSpiral methodology in software development In June this year, Television Network Company embarked on the spiral methodology for developing the accounting software “X,” and awarded the world's leading manufacturer of personal computers, Hewlett Packard (HP) the contract to go ahead with its production....
2 Pages (500 words) Essay

New Trends in Software Process Modeling

The author of this essay under the title "New Trends in Software Process Modeling" touches upon the methodology of software engineering.... MemoRespected CIO, since our company has planned to implement the methodology of software engineering, I have gone through all the aspects of the decision to state a brief report.... methodology ChosenThe methodology that has been chosen after careful considerations is Prototyping....
2 Pages (500 words) Essay

Service-Oriented Architecture

Basically, agile software development approach is based on some rules which can be changed according to the changing requirements of software projects On the other hand, SOA (service oriented architecture) refers to a communication framework that is initiated to support communications between services (Rouse, 2008).... There is a strong relationship between agile approaches and service oriented architecture.... The first section of this report discusses the basics of agile and its relationship with service oriented architecture....
12 Pages (3000 words) Assignment

Evaluation of System Development Methodology, Software Prototyping

The paper "Evaluation of System Development methodology, Software Prototyping " states that the prototype should give at least a realistic indication of the system structure needed to implement the chosen solution.... nbsp;… The prototyping methodology should give at least a realistic indication of the safety-critical functions that will form part of the proposed solution.... nbsp; Indeed, a competitive prototyping methodology must give a realistic abstract of all the important features of a software application....
23 Pages (5750 words) Coursework

Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics

nbsp;I… Software engineers should identify a methodology that suites the project.... This paper "software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics" discusses a software engineers that have a task of ensuring that software is secure.... In order to develop secure software that ensures the forensic integrity of digital forensics, it is essential for developers to incorporate systematic approaches that support security methodologies....
20 Pages (5000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us