Détails de la rétroaction
Questions personnalisées
Q1 - Case à cocher
Q2 - Case à cocher
Q3 - Case à cocher
Rétroaction d'equipe
Approbation individuelle
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
Great work. Stephen has learned the entire vulnerability management CVE software vulnerabilities analysis process.
A quick learner and great performer based on our objectives.
Vulnerability management
Report writing
Data extraction
Ethical standards and conduct
Cyber security
Student engagement
Cyber security management
Collaboration
Presentations
Vulnerability
- Auteur
-
Admin
- Expérience
- ICT Ignite Cyber (June 24th - July 19th 2024)
- Projet
- Cybersecurity Data Collection Research Assistant
- Créé
- juillet 16, 2024