FINAL PROJECT:Structures and Arguments > Guide to Entering the Cybersecurity Field.

Beginning: Opening with a statistic about the growing need for cybersecurity specialists, but create dissonance by describing the difficulty for interested interns and students to find readily available information on how to enter the field. Inform reader that this guide will provide suggestions on internships, classes, certifications and networking.

Middle: Outline my main points of emphasis. Will first provide campuses and university options for students looking for college level education. This will transition into specific classes at the University of Maryland, and provide personal experience and knowledge from my time as a computer science undergraduate. Next, I will highlight the most prestigious companies and internships available (near the D.C. area). This will include skills (i.e. programing languages and concepts) that are preferred. Lastly, delve into personal projects, hackathons, certifications and other extracurricular opportunities that will benefit interested parties.

End: End with noting that this is not a comprehensive, guaranteed guide to getting into the cybersecurity field. Acknowledge there are many paths to gaining a successful career in cyber. Recommend that one should consult with their respective schools and companies on their specific requirements. Urge any interested individuals to continue to pursue cybersecurity and not to be discouraged by seemingly exclusive entry process.

LOGOS: 1) Data on how the cybersecurity field is growing and in need of more specialists 2) Detail percentages of interns that are re-hired and accepted for entry level positions in various cyber orientated companies. 3) Data on current cyber employees and the certifications they have

PATHOS: Reveal personal experience, being a computer science student in Advanced Cybersecurity Experience for Students Program (A.C.E.S). Describe my own struggles attempting to get a foot in the door.

ETHOS: I am a credible source as I am conducting this process for my own future. Also providing information from agencies such as the N.S.A, F.B.I, C.I.A as well as companies like Northrop Grumman will provide integrity to the guide.

STRUCTURE: I will use two structures 1) an information guide, where I delve into the tactics and suggestions I presented above. 2) Secondly, have a shortened directions style paper at the end, where it condenses the guide into direct, step-by-step instructions to entering the cyber field.

GOAL: To give interested individuals a better understanding of the requirements and skillset needed to enter the cybersecurity field.
May 6, 2018 | Unregistered CommenterHF
H, ask me about how to use your voice strategically, in either short sections where you comment (in italics) or by opening/closing notes.

You will need to work hard to incorporate the sources you find, against a backdrop of hidden information.

As for CIA and FBI, you really should push the physical fitness, team sports aspect. Ask me more about this.
May 7, 2018 | Unregistered CommenterMbS
Use the BLS federal website to help teach colleagues about the names for cyper/comp sci jobs. Here is an example:
https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
May 7, 2018 | Unregistered CommenterMbS