Recently our University was pleased to find that we had been ranked number one in San Diego for Cybersecurity degrees by Universities.com. If you did not already know, Coleman has had the longest running Cybersecurity (formerly Network Security) degree program in San Diego. Since 1963 when we first began our journey as The Automation Institute, our organization has been at the center of technology development and we have graduated many distinguished alumni over our 54 years in Southern California. From Data Processing to Cybersecurity we have come a long way by following the trends and seeing the potential in every student that walks through our door. Our alumni have gone on to work for SPAWAR, Cisco, Kyocera, and many other incredible companies that are the leaders in technology development. With our lifetime Career Services access and small class sizes our students have been able to create lucrative careers in exciting fields. More importantly, they have brought integrity to the Coleman name and we are proud to continue to provide a top Cybersecurity education for San Diego. Our mission statement is “To deliver relevant education that prepares individuals for technology focused careers, while providing an environment where they may develop to their full potential” and we will remain dedicated to that mission long into our future. This is exciting news for our university and we are so happy to share it with our followers and alumni!!
Coleman University’s mission statement is “To deliver relevant education that prepares individuals for technology-focused careers, while providing an environment where they may develop to their full potential”. That mission statement is not just focused on our learning environments. Our emphasis on developing to a full potential also applies to the various opportunities that Coleman is bringing to our students that take place outside of the classroom and within our community. Since 2016 we have provided a portion of a warehouse for the non-profit Ssubi to operate out of, as well as encouraged our students to work with them to collect and ship donations around the world. This organization has taken on the enormous task of processing gently used medical equipment from local hospitals and clinics and distributing to areas in Africa that have no access to basic and essential medical materials. The founder, Laura Luxemburg, has worked tirelessly throughout Southern California to encourage the leaders in the Healthcare industry to be more conscious of their potential impact through conservation and to donate their equipment to communities who need it. It is her goal to bring jobs to our city in an environment that promotes conservation. Through efforts in connection with Sharp Healthcare and the San Diego Veterans Association, Laura has been successful in reaching the first part of her overall goal for Ssubi: the potential millions of tons of medical waste that can be reused are being saved from landfills. Sustainability is important for helping to make San Diego a Green city and Coleman University wants to be a part of that movement.
In conjunction with their effort called Greening for Good, Ssubi is also offering gently used computer equipment to low income families in San Diego. Our University has provided Ssubi with a center on our campus to clean, store, and refurbish 50 computers that were donated by Sharp Healthcare. Using the Cybersecurity Club room which serves as a lab on our campus, student volunteers are installing new software and returning the equipment to their factory settings. Once each computer has been cleaned, they will be donated to local shelters and families who may not have access to computer equipment. Computer and internet literacy are vital skills that will help every child become more successful in their academic careers. Coleman is dedicated to promoting this literacy effort and we are doing our part by donating equipment to help maintain an equal educational playing field for young learners and their parents. We hope to continue to work closely with Ssubi again in the future, and we look forward to seeing all of the delighted faces of the families who will be receiving these donations.
In the height of the westward expansion into California, the “Wild West” became not only a place, but a term that described an entire cultural phenomenon. What made the west so wild were the apparent lawless territories that saw hostile takeovers, train and carriage robberies, kidnapping, and ransoming. Over time the west was settled and developed into new states with their own laws and regulations. The wild part of the west was no longer a threat, at least in the physical world. Today we have a new and almost lawless place, however this territory only exists online. Though there are plenty of companies and programs that work 24/7 to ensure safety online, there are still opportunities for malicious attacks to be carried out. The robberies and takeovers that plagued the westward expansion have now become digital.
A typical scam that you will see online is the email phishing that we talked about in a previous blog. These scams can be easy to avoid as long as the recipient is not engaging with the email or providing any personal information. Unfortunately that does not always protect online users from being attacked for their information. Ransomware has become a bigger threat that is hard to trace and causes an incredible amount of damage. Essentially it is software that takes all of a victim’s personal files and information and holds it for a ransom that must be paid. Recently a large ransomware attack has become global news, with at least 150 countries experiencing the same attack. The most affected victims were the small businesses, universities, and hospitals that were unable to protect themselves and had to either pay the ransom or risk losing all of their data (CNN Money). Reports from China, Germany, Japan, Russia, the US, and Spain confirmed that there had been attacks from the same ransomware and that they had taken the necessary precautions to try and stop its spreading.
Through a patch in the Microsoft Windows software, the ransomware “WannaCrypt” was able to target specific users and take over their systems. Ransomware works as a lock box for your data, keeping you from accessing any of your files or personal information unless you agree to the terms and conditions set up by the creator. Victims were told to use Bitcoin to pay for the return of their files (Microsoft). Many of the Windows users who were targeted were not using an updated, or a licensed version of this software making them even more vulnerable to patches that could not be fixed in the Microsoft updates. In the wake of this viral attack, Microsoft released a statement outlining the efforts they were making to avoid these attacks in the future. However, they also called on the public to become more aware of their own responsibility in updating their computers and backing up their information with an external drive and cloud software. Proactive actions are the key to being safe online. This idea of being proactive is also what stopped the ransomware attack from continuing to spread. A young cybersecurity student in the UK decided to look more closely at the software behind the attack and discovered a kill switch. The malware was using “a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading” (The Guardian). Once the student located the domain name, all he had to do was buy it. The domain cost $10.69 and was immediately registering thousands of connections every second; once it was purchased the malware was stopped in its tracks. Additionally once this domain was bought he was able to determine the IP addresses attached to the malware and reported them to the authorities. Though this was a great victory, in the world of Cybersecurity it is just a temporary fix. There are just as many entities creating malware as there are cybersecurity experts trying to stop them. What makes this malware attack so dangerous is that it can be replicated and reused at any time.
Backing up files, or storing information in the Cloud, and regularly updating your software are the best measures you can take to protect yourself from ransomware. As we mentioned in a previous blog on email phishing, it is imperative that you avoid any email from a company or bank that is asking for your personal information via email.
If you are interested in becoming a cybersecurity expert yourself, consider a degree from Coleman University. Perhaps it could be you that stops the next big cyber-attack in its tracks! Call (858) 499-0202 for information on our technology focused programs.
Cybersecurity is a hot button topic lately. With the rumors of Russian infiltration into the United States Presidential election, and the exposure of private emails and photos onto sites such as WikiLeaks, the privacy that we covet online is becoming increasingly endangered. With the recent phishing scam going through Google Docs, it is imperative to remember the necessary steps to take online in order to ensure that you are not a target of a scam. First, let’s review what online scamming/phishing looks like, and the ways to spot one.
The most likely scam that you will encounter is a phishing email that can be sent to your accounts. Phishing is defined by the Merriam-Webster Dictionary as “a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly.” An email may look legitimate with logos and graphics, but that does not mean that it should be taken at face value. For example, banks have taken a stance against phishing by only allowing account actions to be completed through their own websites or at a physical bank location. Your private bank will never ask you for passwords, social security numbers, account numbers, routing numbers, or any other private information via email (Telegraph.co.uk). Be on the lookout for emails that inform you of account changes or updates; if you did not authorize changes, immediately report this issue. The best course of action to protect yourself if you feel that you have been targeted by a scam is to document as much as you can with photos, emails, and phone calls. If an email comes into your inbox that seems suspicious call the company that supposedly sent it and ask about the email. Taking the initiative to validate the email before responding is one of the best ways to protect yourself from online threats. So what happened in regards to the Google Docs scam that went viral last week?
Gmail users were sent a notification from a known contact to click on a shared Google Doc. In order to access the document, the users had to authorize a transfer of contact information to the sender. Since the sender was perceived to be a friend or family member, there was little hesitation to allow this authorization. Routing the doc through an unauthorized Google Docs app prompted the Gmail user to allow the application to take control of their email information as a “management” tool (BGR.com). As a result, any personal information attached to contacts was downloaded and stored. Google reported shortly after this spamming went viral that over one million accounts were potentially compromised and the unauthorized application was shut down, as well as the email accounts that were the source of the scam. Information from email accounts linked to sites such as iTunes, Amazon, Twitter, and Facebook were the most vulnerable to this scam. Any users who had encountered this phishing email were asked to change their emails and passwords immediately. An interesting thing to note is that a majority of these emails were addressed to “firstname.lastname@example.org” (Forbes.com).
One of the first things that you should look for when it comes to identifying phishing emails is the sender’s name, the name that they have addressed the email to, and the language they have used. If there are typos, or if the language is not clear, that should be your first indication that the email in question is not valid. Most often the email address of the sender will look like an official domain, but there could be minor differences such as a period between words, or a domain extension from another country such as “.ru” or “br”, which can be hard to miss. If links are provided in the body of the email, hover your cursor over them and the destination for the link should pop up. If an IP address comes up instead of the domain name, then the link could be fraudulent. Another item to look for is the tone of the message. If you receive an email that has a threat such as closure of an account, that tone is your best indication that the message is fraudulent. A good source of examples for phishing is the Microsoft website, which also lists the information for phishing phone calls and how to report phishing activity.
Taking that extra moment to evaluate an email is your best line of defense in keeping your private information safe. Make sure to update your email passwords and delete unwanted or fraudulent emails as soon as possible. If you are interested in how online security works, and want to learn more about protecting online identities think about the possibility of a career in Cybersecurity. This field is growing fast and will be a lucrative degree option long into the future. Call Coleman today to schedule an appointment and speak with an admissions counselor at (858) 499-0202 Monday through Friday.
Part of what makes Coleman University so unique to San Diego is the incredible faculty that we have on our campus. Technology and its development are not pastimes for our faculty; their careers and passions are built around it. We sat down with one of our Cybersecurity instructors, Mr. Thomas Byrne, to talk about his passion for technology and teaching. Hopefully we can show you something new and exciting about your instructors!
1.So, Mr. Byrne, what drew you to technology and network security?
I grew up with technology and thinking back here are some of my memories: I was literally amazed at my first RED Led watch in the mid 1970’s as well as PONG, which I had hooked up to my TV. I thought to myself “this is the future, these digital readouts.” Then one day in 1982 my father, who worked at McDonnell Douglas in Long Beach as a Branch Chief Engineer, brought home a Compupro 8/16. It ran CP/M off of 8-inch floppies. One of my favorite games to play on the computer was “Colossal Cave Adventure,” which was a text based adventure game that made you visualize the world you were exploring. I spent a lot of time exploring that cave and one day I got stuck in the cave and actually phoned the author for a game hint in the help file. That was cool, knowing that I could phone the creator of the game. The hint was “Did you get the axe? Did you throw the axe at the Minotaur?” Ooops! I also read a lot when I was a kid, and I eventually came across tech magazines in the electronics store. I read an article and found out that you could punch a hole on the back of that huge floppy to make it double sided; it was so exciting to learn that I could double my storage! I learned to program in Assembly, which meant manipulating the CPU stack, and I watched my dad write code to track expenses and even predict when airplanes were flying overhead as they landed in LAX. I also received my HAM radio license back when you had to learn Morse code and was communicating with people in Japan and Germany… so that’s how I sort of got hooked on technology, it was my fun time. As for network security, I like to be secure and wanted to learn how to maintain my systems against threats. I saw all the virus activity and did not want to lose my data, so I researched how to stay safe online and really liked understanding how the hackers think and what motivates them. I also learned how vulnerable this technology is, and I wanted to do something about it.
2.How long have you been teaching at Coleman? What inspired you to become a teacher?
I was hired as an Instructor in August of 2010. Before that I was a corporate trainer for Luxottica. I always was someone who could learn and then explain almost any topic and gain insights on it. I really like helping people understand difficult concepts in cybersecurity. This is a huge positive, as a lot of the material can be difficult until you understand it. I try to make it easy to understand, so that my students can remember the material down the road and make use of that knowledge. I try my best to cut through the noise to the essence of what’s really important to know.
3.Do you have a piece of advice or information that you want all of your students to know before they graduate?
There is a job for you, as the world certainly needs trained cybersecurity professionals. It will not be handed to you though. One piece of advice I have is to be very flexible in your careers and gravitate to the areas that interest you. Learn everything you can about security and technology; we live in amazing times and the whole world is going through a digital transformation right now. The world needs your help, so study hard and keep up with all the changes in technology and security. The Internet is a great human resource, so use it; learn how to find good sources of information and never stop learning. It’s very important to learn to interact with others in a positive way and become a good communicator. Be a positive person. Technology is hard for many so help them understand it.
4.Where do you go for the most accurate and up-to-date information on what is happening in technology?
I take advantage of my commute time and listen to podcasts. I’ve got my podcast apps, and I can tie into any podcast out there. I listen to Google, Apple, Microsoft, Security Podcasts, etc. It really comes down to about five companies that are at the head of technology development. It is all interesting to watch and hear, like a big game to see who will come out with the next trend.
5.What are some basic tactics that you would recommend to the public, who may not be fully aware of online cyber risks?
First of all, don’t believe in total privacy online. If you’re on the Internet regularly, you are not doing it privately. If you’re using the Internet you’re going to be in some database somewhere. In regard to keeping your own computers and other devices secure, try not to click on links that you don’t recognize, use two-factor authentication whenever possible, have a password manager for your personal emails and other log-ins, keep up with the news, and don’t go to websites that you can’t verify. Most importantly, don’t allow any action on your devices that you do not personally approve. So if an email comes up with a link that you do not know, reverse it, call the company directly and ask if they contacted you. You need to initiate the connection instead of assuming a provided link is good.
6.What are you involved in outside of the classroom that involves technology development?
Well, I am a mentor for First Robotics. My son wanted to start a robotics club at his high school with two friends, after seeing that other schools around the city, such as Hi Tech High had them. They started a robotics team for Mission Hills High School in San Marcos. I met with them and let them know that I wanted to help out, so I met all the parents of the other students and we worked together to start a robotics team. It’s a lot of work! You have to form the team, and it costs about $4000 to compete in these competitions, so that takes a lot of fundraising. You’re given parameters like the weight of the robots, which has to be 120 pounds, and the cost, which has to be less than $4000, and so on. So you need to get sponsors. We got started in the robotics competitions in San Diego four years ago, and our first project was a defensive robot which was required to have the ability for aerial assist. In that first competition we placed 23rd out of 60 teams, which was pretty high for a rookie team, considering that some of the other teams had been doing this for at least ten years. From there we ended up going to St. Louis to compete, because we won Rookie All Star; we were up against teams from across the nation, but there are also about 30 countries that do this every year as well. Right now there are about 6,000 teams globally that are a part of this competition. We were up against the best and that motivated us to come back even better the next time. So in the following years we have been semi-finalists in both the national and international competitions. This year we were semi-final and quarter-finalists. There are a lot of scholarships attached to this, so students can get money from Boeing and other companies who are looking for engineers to sponsor. Our team is so successful because we have so many mentors who specialize in every aspect of building and implementing.
7.What is an up and coming technology or technology trend that you are really excited about?
Well people like to say that my head is in the clouds, because I am so invested in cloud computing! This is the next paradigm shift in major technology. A cloud service run by major corporations like Google and Microsoft provides the advantage of a powerful storage facility, with massive processing power, and servers that can shift their computing power to adapt to any situation. In regards to hacking, people are going to start seeing the value of the cloud, because it offers more security at less expense, and it is consistently updated. The ability to share and store information will connect the world and give everyone access to technology.
We want to thank Mr. Byrne for taking the time to tell us about himself and his passion for technology. Keeping students motivated and engaged is a full-time job and there is a lot more beneath the surface here than you might think. Join us again next month for another spotlight on our incredible faculty at Coleman University! If you would like to know more about First Robotics and the team that Mr. Byrne is mentoring follow the links below.
March is Women’s History Month, a time to reflect on the contributions and movements that have come from women throughout history. Think about what you take for granted every day without thinking of where it came from or who invented it; would you immediately think a woman had created it? Take the modern medical syringe, an item that is now in every doctor’s office across the globe. The first patent for the single plunger syringe was given to a woman, Leticia Greer, in New York in the year 1899 (you can see the original patent application here). In 1966 a woman by the name of Stephanie Kwolek invented the first prototype for Kevlar, the material that would become integral in crash helmets, radial tires, and eventually bulletproof vests (learn more about her invention here). We also owe a lot of our modern inventions in computing and coding to women who were passionate about, and dedicated to improving, technology.
The first documented coding concept for a machine was invented by the Mathematician Ada Lovelace, who had become fascinated with Charles Babbage’s design for a computing machine. The Analytical Engine was conceptualized to perform long and complex mathematical equations in a short amount of time. Using the pattern designs from the Jacquard Loom, Lovelace conceptualized a set of “cards” that would have holes in them that would correspond with numbers and patterns established by the creator. These cards would be read through the holes by the machine and in turn produce a numerical answer. The notes on this card design that Lovelace published in a Scientific Memoirs journal are now considered to be the first plan for a “coding” system for a machine. The Analytical Engine could have been programmable, thus making it customize-able for various types of computing and the punch cards could then also be reused. Initially Ada Lovelace imagined that this engine would be used to create and play music, as well as do complex mathematics. Though the Analytic Engine was never constructed, the notes that Lovelace published set the ground work for the future of programming and computing. For more information on Ada Lovelace and her programming design, click here or visit The Ada Project website.
Another pioneer in computing and programming is Grace Hopper, an Admiral in the United States Navy. Have you ever “de-bugged” your computer? Well that term came from Grace Hopper herself! After removing a moth from the Mark I computer and taping it to her notebook, the term stuck and has been a part of our culture ever since. Hopper was born at the beginning of the 20th century in New York City. After completing her Bachelor’s in Mathematics, she went on the Yale to complete her Master’s and then her Ph.D. She taught for a number of years until she enlisted in the United States Navy Reserve where she was assigned to the Bureau of Ships Computation Project being researched at Harvard University. She was then later named as a Research Fellow. Her work was dedicated to the first large-scale computer named the Mark I, and would go on to help develop the Mark II and Mark III. After working with numerical code in computing, Hopper began work on the first computer compiler and computer programming language referred to as COBOL. It was her idea to start collecting programming commands for a shared library of codes in order to save time and reduce programming errors on projects. The collection of commands using binary code allowed for the computers to begin to understand basic phrases in English and then translate them into binary. She is called “Amazing Grace” for a reason! Learn more about her life and her work here, at the US Navy website.
Mathematicians have been integral in computer and science technologies and even space exploration. During the Space Race in the 1960s, Katherine Johnson paved the way for space flight and helped NASA put Astronauts into orbit, and put them on the Moon. Her story begins in West Virginia where she was born in 1918. From an early age she was gifted with incredible curiosity and determination to succeed. She moved ahead several grades when she was in middle school, and started high school at the age of 13. She graduated from West Virginia State College with honors and began a career teaching mathematics in 1937. By 1939, she was invited to become one of the first African American citizens to attend the Graduate program at the recently opened West Virginia University. Though she left the program early to marry and start a family, she still continued to teach math in local public schools. In 1952 she applied to become a computer for the National Advisory Committee for Aeronautics’ (NACA’s) Langley Laboratory. At the time this computing section was all African American; science was still segregated. After her first two weeks, she was promoted to work on the Maneuver Loads Branch of the Flight Research Division where she analyzed data from flight tests. After the successful launch of Sputnik from Russia, her work became much more in demand. As NACA (soon to be NASA) began to frantically develop a plan to put men into space, Johnson became an integral part of the team to calculate and analyze data in order to make that happen. Her calculations were used for the Freedom 7 mission in 1961 that put a human into orbit around the Earth, which led to her development of a set of calculations and equations that would make it possible to accurately determine the landing point of a space craft. However, her most famous project was the orbital mission of John Glenn, who demanded that she do the calculations for his orbit despite the mechanical machines that had been put in place to do all of it. He trusted her mind and her calculations with his life, and would not go into space until she had confirmed that the machine’s results were accurate. She did all of the thousands of calculations by hand, using only her desktop mechanical calculating machine, which was at the time the equivalent to a basic calculator. She was also asked to work on the plans for the moon landing and her calculations helped to ensure that the Lunar Lander would synch with the Command and Service Module. After 33 years in Langley, she retired. In 2015, at the age of 97 she was awarded the Presidential Medal of Freedom. You can read more about her on the NASA website.
We owe a lot to the women who have taken their passions and followed them into greatness. These three women are just the tip of the iceberg on a long list of female led technology development throughout history. The next time you turn on your laptop, or use your phone to calculate, think of these women who had to create these technologies that we freely use today. For more on these women, click on the links provided or go to computerscience.org for more information on other women who have made history and the issues that women in technology are still facing.
The esteemed Institute of Electrical and Electronics Engineers (IEEE) held a luncheon for their Life Members in San Diego in early March. The Life Member status for IEEE is awarded to members who have been an active part of the organization for a certain number of years while maintaining a positive status within the IEEE community. The Life Member Association invited the President of Coleman University, Norbert Kubilus, to be a Keynote Speaker for this event and to discuss the dedication of the University to fostering technology development in San Diego. The agenda for the luncheon speakers included topics such as robotics in military and commercial fields, renewable energy, automotive developments, and the benefits of increased technology in medical fields. In his Keynote, the President reflected on the history of Coleman in San Diego and the legacy that the university has maintained as an influencer in technology. The President then outlined the steps being taken to bring the latest developments in Software Development and Cybersecurity to the Coleman campus and integrate them into the curriculum. Mr. Kubilus discussed the efforts being made at Coleman to bring experiences to its students that enhance the curriculum, which is continuously developed through input from professionals in technology fields and the instructors at the university. The keynote closed with an invitation from the President for the Life Members to visit the Hornet’s Nest Indoor Drone Testing facility run by ENVI. The members were excited to be given the opportunity to see for themselves an example of the technological developments that Coleman is fostering and the extracurricular experiences that are available to its students.
Coleman University does its best to host events that our students can sit in on, and ones that will directly benefit out students through professional development. Follow our Coleman Calendar, The Coleman Post newsletter, and look for announcements on campus to find out about all of the student opportunities each month.
Our University has been successful throughout its many years due to the relationships that we have curated with local companies and institutions that share our vision of community engagement with progressing technology. In February of this year we worked with a local organization that also seeks to advance understanding of technology not just for our city, but also nationally. Tech San Diego has been a purveyor of the San Diego technology community since 1994. Their mission is to foster the growth of collaborations between industry, education, and government as a support structure for our community. Tech San Diego supports various industries such as: Cybersecurity, Big Data (analytics), Robotics, IOT, Defense, Telecommunications, and Cloud Infrastructure. This month they hosted two events on our campus centered on the future of technology development in Big Data Analytics and Cybersecurity. On February 23, 2017 Ramkumar Ravichandran presented his speech on his experience as Director of Analytics for VISA and using Teradata in major data analytics. Teradata is database management system founded in 1979 that has become a leader in the Analytics of Things (AoT) for major corporations (Teradata.com). Mr. Ravichandran drives Visa’s actionable insights derived from Business Analytics, Advanced Analytics and A/B testing. He discussed how to build high performing data science/analytics teams and the best practices for delivering results to drive business impact. The presentation was attended by representatives from Big Data companies and students from local universities as well as Coleman. The second event was a round table discussion on the current state of cybersecurity in major company networks led by Stephen Cobb. This round table was a deep look at what is on the horizon for threats to not just personal information but also to companies that handle mass amounts of data daily. Attendees were able to ask questions about what threats are trending now, and how to promote “cyber-awareness” within a corporate community.
Events such as these are open to Coleman students and Alumni who are interested in registering, and the university encourages our community to attend. Promoting technology awareness is more than being in a classroom, it is also about the extracurricular events that allow for public participation with accurate information. If you would like to attend more events such as Tech San Diego keep an eye on the Coleman Post newsletter for updates on what is coming to campus, follow the Coleman University blog, and look for the digital displays on campus for daily reminders of upcoming events.
This post was written by the Director of Career Services, Robert Sweigart in preparation for the upcoming Job Fair, on March 28, being hosted on our campus. Thank you to Mr. Sweigart and his team for working so hard to help our students find their dream careers! Contact your Career Services adviser for help with your resume, or email email@example.com.
At Coleman University, our diverse student population includes those seeking their first job, returning veterans, students interested in changing careers, and individuals returning to the workforce after a leave of absence. What they all have in common is the need to create an appealing, professional resume that catches an employer’s eye.
Today, employers spend only a few seconds on each resume they receive. Therefore, employees need to develop a resume that differentiates their work background from the competition. Coleman’s career services advisors work one-on-one with students to provide personalized professional development services, and our experience shows that when it comes to resumes, one size does not necessarily fit all. There are requirements and recommendations that we have for each of our programs. What suits your resume is not guaranteed to work for your peers. The basics of a resume are the same, however each resume is unique. If you need help updating your resume or would like to have it reviewed make time to visit your Career Services Advisor as soon as possible so that we can help you get into the career you really want.
Candidates should thoroughly read the job description and tailor their resume to the needs of the company. Is the company interested only in candidates that hold a specific degree or certification? Does the company require candidates to submit a portfolio of their work? At Coleman, our graphic design and game development and design students are encouraged to refine their portfolios and post them online, so that they are easily accessible to employers. You do not need to bring an arsenal of technology and handouts to go with your resumes, but keep in mind that employers will search for your name online and it is pertinent to ensure that what they find will not disqualify you as a candidate. Update your portfolios, websites, or any other digital media that you curate, before you begin submitting resumes.
Keep in mind that many large and small companies utilize applicant tracking systems to assist in their recruiting efforts. These systems search for key words in your resume to add to their database. It is important that candidates include those key words from the job description so that they are not automatically disqualified before they even meet with an employer.
What other aspects should be considered when writing a resume?
- Formatting is important. You may want to research resumes from peers in your field to determine whether there is a certain outline that should be followed, or speak with a career advisor. Use (but don’t overuse) bullet points. Avoid graphics, large blocks of single-spaced text, and varying font sizes.
- Proper grammar and punctuation is critical. There is no place for slang words in a resume. If you have questions about grammar or punctuation, check out grammar books from the local library, view online sources, or seek out a career advisor or trusted friend for advice.
- Place name, phone number(s), address, and e-mail address in the top left-hand corner. Create a professional e-mail address and take a professional photo for social media sites.
- Write a succinct profile that highlights work experiences and the skills you have to offer an employer. This profile should entice a hiring manager to read further.
- Resumes no longer include an objective. Instead, we recommend students write a summary of their skills, using bullet points to identify all the relevant abilities that pertain to the job for which they are applying.
- The work experience section of the resume should include dates of employment in reverse chronological order, the name of organization, the physical location of the employer (city and state), the title of the position, and description of work responsibilities. Under each position, emphasize specific results generated (how you reduced costs, increased sales, overcame a challenge) and use action verbs.
- Maintain a simple and direct resume. Do not exaggerate your experience or your qualifications as that is a good way to put yourself in a work situation that you may not be ready to handle. Be honest and concise with the information that you put onto your resume as it sets the tone for what an employer can expect from you as a potential employee, including your work ethics.
- The Career Services Department strongly suggests avoiding using a template for your resume. Downloaded or borrowed templates are not guaranteed to look the same after they are sent off and employers will notice immediately if you have sent in a template resume, which will not work in your favor.
If you experienced a gap in employment due to illness or caring for a family member, be prepared to give a short response that explains the situation. Business Insider gives 3 tips for addressing a job gap: be honest and upfront, consider doing volunteer work or taking relevant classes, and, explain the skills acquired while you were out of work. Gaps in employment are not necessarily viewed as negative if it can be explained how time away from the workforce has strengthened your background as the perfect candidate for the job.
- The education section should include the name of the institution, dates attended, and degree or degrees earned. Remember to include the major, minor, and important certifications. Make mention of academic awards if they are applicable to the position. Include a GPA if it is higher than 3.0, or if you do not have previous work experience.
- Veterans are often concerned how to transferring their military experience into civilian terms. Many skills gained in the military, such as organization, leadership, responsibility, and technical ability can be easily translated to a civilian job.
- Make sure that you include everything that an employer asks for with your resume submission, which may include a cover letter. The Harvard Business Review suggests a list of important cover letter aspects that will make your resume stand out. The Career Services Advisors at Coleman are here to help you with drafting your cover letters. Again, it is important that you make time to speak with them as soon as possible in order to be completely prepared for your career search.
Now that you have an understanding of what to include in a resume, we recommend omitting the following information:
- Personal information, such as age, marital status, race, or number of dependent children need not be included. Hobbies should be mentioned, only if they are applicable to the job. There is also no need to include high school graduation information.
- Irrelevant work history and nonessential extracurricular activities should not be listed. Think of your resume as your personal “elevator speech.” Only include work experience that highlights relevant skills and experience.
- All employers expect job applicants to have references, so there is no need to include a statement such as, “References will be furnished upon request.”
- It has become a more common practice among employers to seek out the private social media profiles of candidates in order to gain better insight into an applicant’s background. However, there is no need to include links or information pertaining to your personal social media profiles on your resume. It can be beneficial to include a link to your LinkedIn profile, so make sure that you have updated your LinkedIn before you start applying to employment opportunities. However, that is not something you are required to provide as part of a resume submission.
While we all live in a fast-paced world, it is important to take time with the resume process. Developing a carefully constructed resume could be the difference between hiring you, or the competition, for the next “dream” job.
Coleman University offers a certificate program for cybersecurity professionals wanting to brush up on their skills in one or more of our three tracks: Ethical Hacking and Penetration Testing, Digital and Network Forensics, and Management of Information Security. Courses begin on Monday, October 17, 2016 at Coleman University. Students who successfully complete each track will receive a certificate of completion. All courses are taught in the evening on the Coleman campus.
The 40-week Ethical Hacking and Penetration Testing track provides an in-depth knowledge of network and operating system security, followed by familiarization with the tools and techniques used by both ethical hackers and penetration testers towards network defense and security assessment. Courses in this include Intermediate Network Security Operating System Hardening, Advanced Network Security / Ethical Hacking, and Advanced Network Security / Penetration Testing.
In the 20-week Digital and Network Forensics track, students learn about the techniques used in data recovery for civil and corporate proceedings, along with those used in the corporate environment for investigations following network intrusions and breaches. The two courses in this track are Intermediate Network Security, and Computer and Network Forensics.
The 20-week Management of Information Security track provides the core knowledge necessary to manage an organization’s information security program, including an understanding of risk management and corporate information security governance. The two courses in this track are Management of Information Security, and Governance, Risk, and Compliance Management.
Call 858-499-0202 to find out how you can get started today.