Feedback details
Custom Questions
question 1
I attest that I have adhered to ICT Ignite Cyber Terms and Conditions: bit.ly/ignite-cyber-terms
Yes
question 2
I confirm that the learner has completed the required project deliverables within 60 hours
Yes
question 3
I approve the final deliverables submitted by the team and believe they should receive payment for their work
Yes
Team feedback
Individual endorsement
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
Great work. Stephen has learned the entire vulnerability management CVE software vulnerabilities analysis process.
A quick learner and great performer based on our objectives.
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
- Author
-
Admin
- Experience
- ICT Ignite Cyber (June 24th - July 19th 2024)
- Project
- Cybersecurity Data Collection Research Assistant
- Created At
- July 16, 2024
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability