Feedback details
Individual Endorsement
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
Great work. Stephen has learned the entire vulnerability management CVE software vulnerabilities analysis process.
Team feedback
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
A quick learner and great performer based on our objectives.
Custom Questions
Q1 - Checkbox
Q2 - Checkbox
Q3 - Checkbox
- Author
-
Admin
- Experience
- ICT Ignite Cyber (June 24th - July 19th 2024)
- Project
- Cybersecurity Data Collection Research Assistant
- Created At
- July 16, 2024