CIS 512 Strayer Advanced Computer Architecture Most Informative Classes Discussion

Description

For this final course discussion post, take a moment to review and reflect on the five course outcomes for CIS512, Advanced Computer Architecture:

  1. Evaluate the hardware components of modern computing environments and their individual functions.
  2. Review the basic security implications of modern computing environments.
  3. Review foundational cybersecurity concepts and the federal, state and local cyber defense partners/structures.
  4. Research the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
  5. Examine responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues, and how the type of dispute affects the evidence used to resolve it.

Please respond to the following in a post of at least 200 words:

  • Identify the three to five core lessons you learned from taking this course.
  • Describe how you plan to integrate these core lessons into your daily life.
  • Determine the methods you will use to retain and revisit this information.

In 60 to 75 words, please respondt6o the student’s comment below:

Professor and Peers,

Ed here. In this our final discussion post of the semester, we’ve been asked to reflect on the concepts we learned over the past 11 weeks. We are also to consider ways to retain and use the information we learned in our professional and daily lives.

What are the core lessons learned from taking the course Advanced Computer Architecture?

The name of this class is CIS 512 – Advanced Computer Architecture. The name of the textbook given to us is Effective Cybersecurity – A Guide to Using Best Practices and Standards. I don’t know, but something tells me, there is a mix-up here. An Advanced Computer Architecture class, to my understanding, is loosely based on advanced topics regarding multi-core hardware: memory systems, cache coherence protocols, cache hierarchies, consistency models, transactional memory, interconnection networks, core design, and parallel algorithms. Such a class provides a comprehensive overview of Computer Architecture and Organization from a practical perspective. On the other hand, our textbook – Effective Cybersecurity, is made up of three parts. Part 1 talks about Planning for Cybersecurity, Part 2 talks about Managing the Cybersecurity Function, while the last part, part 3, talks about Cybersecurity Assessment. We went into not enough details about cybersecurity. Its threat, and how to manage it. This is really an area I am totally interested in, but I was kind of disappointed that we did not carry out any practical labs on it. I lamented about it in course of our blackboard discussions forum.

How to integrate the core lessons learned in Advanced Computer Architecture into my professional and daily life?

Although, the name of the class and the textbook do not match, it is my intention to pursue the cybersecurity threat, and do something about it. What with the daily occurrences of cybersecurity issues. Covid – 19 occurred. The world came together, and found a cure for it within a year. Why can’t the world come together and resolve this panning cybersecurity issue. Is it because some countries, and some companies are benefitting from it? I am available for any company to pick me up for advanced cybersecurity studies. This is how I want to integrate the core lessons learned in this class into my professional and daily life.  

The methods to be used to retain and revisit the information gotten from Advanced Computer Architecture

It is my intention to pursue advanced studies in the field of cybersecurity. Apart from that, there are several E-learning websites and opportunities that I can gain knowledge from, but it costs money.

In concluding my last discussion of the semester, a computer architecture class should lean toward the design of computer architecture of complex modern microprocessors, etc. Did we learn that in this class? A resounding no. Rather, we learned about planning for cybersecurity, managing the cybersecurity function, and assessing cybersecurity. May be, those in-charge can do something about it.

Professor Barrett, your awesome and mind-blowing comments kept the course alive. Thank you for your helpful reviews of our discussions. Thanks for sharing your feedback. And to my peers, this is wishing each and every one of you the very best in your endeavors. See you guys in latter classes. Bye for now.

Ed.

References:

Stallings, W. (2019). Effective Cybersecurity: A Guide to Using Best Practices and Standards. Pearson Education (1st

edition).