Feedback details
Custom Questions
Q1 - Checkbox
Q2 - Checkbox
Q3 - Checkbox
Team feedback
Individual endorsement
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
Great work. Stephen has learned the entire vulnerability management CVE software vulnerabilities analysis process.
A quick learner and great performer based on our objectives.
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
- Author
-
Admin
- Experience
- ICT Ignite Cyber (June 24th - July 19th 2024)
- Project
- Cybersecurity Data Collection Research Assistant
- Created At
- July 16, 2024
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability