TRANSCRIPTEnglish

DSPD2783 - VIDEO ASSIGNMENT

3m 40s386 words70 segmentsEnglish

FULL TRANSCRIPT

0:16

Hi, my name is Amin and this video is

0:18

about my future planning for my career

0:20

in computer science.

0:24

>> Currently, I am pursuing a diploma in

0:27

computer science. Although the journey

0:29

has been challenging, I'm proud of

0:31

myself for staying committed and making

0:33

it this far. But what's next? Let me

0:38

tell you,

0:40

cyber security has always been my dream

0:43

career. That's why I plan to further my

0:46

studies in a bachelor of computer

0:48

science in computer network and security

0:52

at University Technology Malaysia

0:57

under the faculty of computing.

1:00

These are the subjects offered in this

1:02

program which has a duration of four

1:06

years. We're going to talk about it

1:08

later.

1:12

For diploma holders, UTM allows students

1:15

to apply for credit transfer for this

1:17

program. According to UTM academic

1:20

regulations, up to 50% of the total

1:23

degree credits may be transferred from

1:26

diploma courses, which can reduce the

1:29

overall duration of study.

1:32

Now, let's talk about the requirements.

1:37

To continue this degree, you need to

1:39

have at least a diploma or any

1:42

government recognized qualification of

1:44

the same level. Your CGPA must be at

1:48

least 2.8. If not, you will need at

1:52

least 2 years of relevant work

1:54

experience in the same field.

1:58

Alhamdulillah.

2:00

In addition, you are required to have at

2:02

least Ben one in Malaysian University

2:06

English test or when

2:10

now let's talk about the subjects that I

2:13

will be learning and how the skills

2:15

gained can be applied during my

2:16

industrial training.

2:19

First, network communication.

2:22

In this subject, students learn how data

2:25

flows across a network, including how

2:28

information is transmitted, received,

2:30

and managed. This knowledge is important

2:33

in understanding and preventing

2:35

networkbased attack such as DOS and

2:39

DDOS.

2:40

For my industrial training, I choose

2:44

condition zebra, a cyber security

2:47

company in Malaysia as an IT security

2:50

training.

2:54

The company has over 14 years of

2:57

experience in information security

2:59

research and development. My

3:01

responsibilities as a traininee include

3:04

security analysis and reporting as well

3:07

as existing in vulnerability assessments

3:11

and penetration testing projects. These

3:14

tasks allow me to directly apply

3:16

theoretical knowledge into practical

3:19

security operations.

3:22

In terms of requirements, applicants

3:24

must possesses a diploma or degree in a

3:27

related field, demonstrate a strong

3:29

passion for information security, and

3:32

maintain a good academic records. That's

3:35

the end of the video. Thank you.

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.