Prosper Career & Independent Study
Quote:
“When something is important enough, you do it even if the odds are not in your favor.”
- Elon Musk
Email: puranjayprashanth@gmail.com
Mission Statement
“I strive for excellence by being as productive as possible, limiting procrastination, and maintaining kindness and respect for others throughout my journey. Making the most out of every day, pushing more and more towards my goals and dreams. I must put great effort into pushing for things I want to accomplish. Without work, there is no success.”
Career Forecast
After concluding my research, I identified that Cybersecurity has many tools and systems involved in securing websites and computers in an industrial space. It involves using operating systems such as Linux, Windows, and Mac for pen testing. Kali Linux is an industry favorite since it already includes many tools for ethical hacking, cyber security analysis, and cyber defense, making it tailored to individuals in the cybersecurity space. In addition, further research showed two different sectors of cybersecurity, including hardware and software-centric partitions in the field. Hardware based cybersecurity included the security and defense of devices such as cell phones, tablets, computers, and embedded systems at the hardware level rather than through the software level. The software side of cyber security is on top of hardware security; things such as encrypted data and secure encryption systems can help secure the device content, routine scans, and password changes, which can additionally increase the security of a company's cybersecurity and defense.