At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).School of Computer and Information Sciences


Course Information

ITS834 – M50 Emerging Threats & Countermeas

Fall 2020 Full Term

Course Format: Hybrid

CRN: 12052

Class Time and Location: F 08:00 AM – 10:00 PM, DAL

Residency Session: 10/02/2020 – 10/04/2020 

Instructor Information

Name: Dr. Irvin Heard


Phone: 305-965-6757

Office Location: Remote

Office Hours/Preferred Contact Times: 1 PM – 3 PM (Mon – Fri)

UC Directory URL:

Course Description

Covers security issues and current best practices in several applicative domains,

ranging from the enterprise to the military. Discusses emerging security threats and

available countermeasures with respect to the most recent network and computing

technologies, including wireless networks, computer-controlled physical systems, and

social networks. Concludes by presenting current trends and open problems.

Course Objectives

Upon completion of this course:

Students will explore the options for addressing cybersecurity engineering needs

Students will define and structure metrics to manage cybersecurity engineering

Students will identify and evaluate existing capabilities for cybersecurity


Students will identify competency and capability gaps for cybersecurity


Students will define and prioritize cybersecurity engineering needs

Students will summarize and plan for improvements in cybersecurity engineering


Learner Outcomes

Learn how to perform research identifying and analyzing technological


Build critical thinking skills to develop and apply solutions that achieve strategic

and tactical IT-business alignment

Develop professional skills and expertise to advance knowledge in your chosen

field or discipline within information technology

Conduct research with professional and ethical integrity

Address complex technical questions and challenge established knowledge and

practices in the area

Identify, comprehend, analyze, evaluate and synthesize research

Communicate effectively and employ constructive professional and interpersonal


Critically evaluate current research and best practices

Demonstrate IT leadership skills at the team and enterprise levels following

tenets of professional, social, and ethical responsibility

Recommend IT strategies that support enterprise mission and objectives

Course Website

Access to the course website is required via the iLearn portal on the University of the

Cumberlands website: 


Required Books and Resources

Title: Academic Writer


About: This is APA’s resource for APA format, style, citations, and document types (like

how to write a literature review). UC has a dedicated link fo

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.