Travis William Harrington
Bryant & Stratton Collage
|
Describe the benefits and challenges organizations face when exploring the utilization of cloud computing, including selection of the appropriate WAN technology.
Analyze situations to recommend virtualization techniques and/or cloud computing solutions for various scenarios.
Propose strategies and best practices for maintaining and managing cloud computing resources, based on provided scenarios.
Compare and contrast on-premises solutions and cloud-based solutions for enterprise deployment.
Evaluate options for the replacement of existing application with cloud-based solutions, based on provided scenarios.
Analyze potential security threats involved with cloud computing and propose solutions to mitigate them.
Draw conclusions to make decisions through the application and analysis of quantitative information using proportional reasoning.
Draw conclusions to make decisions through the application and analysis of mathematical models utilizing Microsoft Excel software.
Draw conclusions to make decisions through the application and analysis of probability.
Draw conclusions to make decisions through the application and analysis of statistical information and summaries.
Install and configure Windows servers.
Configure server roles and features based on provided scenarios.
Remotely Manage Windows servers.
Deploy and configure Active Directory based on provided scenarios.
Create and manage group policies.
Describe the characteristics of wireless networks.
Explain the elements and operation of modern wireless network technologies, including IEEE 802 standards, wireless LANs, and Bluetooth technology.
Apply the TCP/IP protocol in a wireless/mobile business setting to meet all appropriate wireless standards.
Implement a wireless/mobile network by applying effective planning, design, installation, configuration, and security.
Demonstrate how to monitor network performance of wireless LANs, including routing, protocols, and applications, with industry-standard tools.
Use command line utilities to manage and configure Linux shell environments.
Create and manage Linux file systems, including disk quotas and disk partitions, following the Linux Filesystem Hierarchy Standard.
Install, remove, and update packages using Linux commands based on provided scenarios.
Create and manage Linux groups.
Manage and configure Linux directories, file permissions, and file ownership based on provided scenarios.
Analyze security needs and potential vulnerabilities to devise viable solutions.
Explain network security concepts, issues, and vulnerabilities in the network architecture and, given a scenario, implement the required steps to plan for network security design and concerns.
Demonstrate network hardening practices and security measures on physical network devices and systems on the network.
Implement a security policy that can be enforced by network security techniques, based on provided scenarios.
Recommend actions and deploy applications for ensuring a secure network operation that align organizational needs with information technology initiatives.
Configure and troubleshoot host defenses consistent with the operation of an enterprise environment to keep data assets secure from common network security attacks, such as malware, password attacks, and other threats, based on provided scenarios.
Explain the utilization of the security configuration techniques to create secure frameworks, including best practices, redundancy, cloud computing, and security protocols.
Demonstrate an understanding of all layers of the OSI model.
Demonstrate the use and configuration of IP addressing, including IPv4, IPv6, subnetting, “NAT”ing, and additional networking architecture to develop and troubleshoot routing schema.
Demonstrate the use of various routing protocols and cabling options.
Configure various switching technologies, including WANs, VLANs, STP, trunk and access ports, remote access, and additional networking architecture, based on provided scenarios.
Analyze switch configurations and propose and implement secure solutions to protect data assets and mitigate potential attacks.
Enhance employment documents and complete steps to secure an internship assignment and/or employment opportunity.
Refine and tag ePortfolio assessments for the MyCred professional portfolio.
Articulate the knowledge, skills, and behaviors connected to Program Outcomes to demonstrate workplace readiness.
Synthesize and apply career development theories and ethics to shape employment goals and plans.
Evaluate interview feedback to adjust your portfolio contents and/or presentation outline.
To obtain and maintain my leverage in my interpersonal skills. This is always a work in progress and is something that I will have to keep working on to keep a job. This assessment is to show where I need work and how to build my skills that I need to be the best employee that I can be. This assessment gives you something to go by and something to work on to get you ready for a career. I know by looking at my scores that I have improve all my interpersonal skills. Being average is ok but I would like to be above average. The best way that I know how to bring up these skills is to use Google. You can type in the skill that you want to know about, and it tells what it is and how to improve that skill. My goal is to bring up scores and get the most out of what I can by learning new things. I have never been comfortable being in groups of people. There always seem to be to many Chiefs and no Indians. This is something that I will be working on because it is my lowest score.
SHARE
Download QR Code