This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Career planning

Practical connection paper

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Practical connection paper

This course offers learners knowledge and skills which can be practically be applied in their careers. In my case, the knowledge and skills gained from this course will be of much use when it comes to my career. My current job is QA Automation Tester. There are some skills, as well as the knowledge that a person should have to become a QA automation tester. I have experience in software analysis and software quality assurance testing. By taking this course, I have added more knowledge and skills which will be useful in my job.

Through taking the course, I have come to learn more about the information systems security (ISS) policy. This information is very useful in my career. In my current career, I mostly deal with quality assurance meaning that I will interact with different systems. As far as I am interacting with the systems, I should be in a position to handle them without violating the security policy in place (Lopes & Oliveira, 2016). This course introduces some of the information system security policy which should be followed. Since I have taken this course, I have more knowledge about the systems security policies; hence I will be keen on my testing. My test plans should be accurate to ensure that I do not go against these policies.

Don't use plagiarised sources.Get your custom essay just from $11/page

Through the course, I have learned the relationship between business drivers and information systems security policies. This knowledge is useful in my career. In most cases, I deal with clients who have different needs—the business drivers, for this case, may change from one client to another. While I am interacting with the clients and their systems, I should know the relationship between the business drivers in their organization and the information systems security policy (Njenga, 2017). I should encourage the clients that the business drivers follow the information systems security policy for the better performance of the systems.

 

I have come to understand how security policies help mitigate risks that are experienced by different clients. The course clearly explains how security policies support the running of businesses by minimizing the impacts of risks. I will use this knowledge to advise my clients on how to minimize the threats by implementing security policies. Since I have knowledge concerning the security policies, then I am in a position to come up with some security policies which will help the clients. The course has helped me understand the implementation of the security policies and challenges involved; hence I will be fit for this role.

In most cases, I deal with IT infrastructure. The course has explained details concerning IT infrastructure. By taking the course, I have gained knowledge and skills concerning the IT infrastructure. So, I will be in a position to interact with the IT infrastructure without any significant challenges. While interacting with the IT infrastructure, I will be able to apply the knowledge of information systems security policy and safeguard the infrastructure. At the end of the course, there is some information concerning compliance systems and technologies which are discussed. This information will help me in monitoring, tracking, reporting, and automating some compliance systems which I come across.

This course is one of the best in terms of providing the learners with knowledge and skills which are useful in their careers. By taking this course, I have added more knowledge and skills which will not only be applied in my career but also other daily activities. I would encourage people to take this course so that they may expand their knowledge when it comes to information systems security policy.

 

 

References

Lopes, I., & Oliveira, P. (2016). Adoption of an information systems security policy in small and medium-sized enterprises. Journal Of Information Systems Engineering & Management1(1). doi: 10.20897/lectito.201605

Njenga, K. (2017). Understanding Internal Information Systems Security Policy Violations as Paradoxes. Interdisciplinary Journal Of Information, Knowledge, And Management12, 001-015. doi: 10.28945/3639

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask