Are you unsure about your future? |
||
Are you graduating soon? |
||
Do you have any plans after high school? |
||
Do you know why your going to college or why your not? |
||
Are you aware of what jobs will be available to you?
Get Informed!
The world of work is changing
and you need to be aware of your options.
Consider the following fields: |
||
Digital Forensics |
... is the art and science of applying computer science to aid the legal process. Although plenty of science is attributable to computer forensics, most successful investigators possess a nose for investigations and a skill for solving puzzles, which is where the art comes in. - Chris L.T. Brown, Computer Evidence Collection and Preservation, 2006 | |
Homeland Security Homeland security is the term generally used to refer to the broad national effort by all levels of government--federal, state, local and tribal--to protect the territory of the United States from hazards both internal and external, natural and man-made, as well as the Department of Homeland Security itself. |
||
Systems Aministrator
|
is a person employed to maintain, and operate a computer system or network. System administrators may be members of an information technology department. |
|
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff. A System Administrator must demonstrate a blend of technical skills and responsibility | ||
Network Security |
||
Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together | ||
Cybersecurity |
||
Check out some additional opportunities at |
||