DSPD2783 - VIDEO ASSIGNMENT
FULL TRANSCRIPT
Hi, my name is Amin and this video is
about my future planning for my career
in computer science.
>> Currently, I am pursuing a diploma in
computer science. Although the journey
has been challenging, I'm proud of
myself for staying committed and making
it this far. But what's next? Let me
tell you,
cyber security has always been my dream
career. That's why I plan to further my
studies in a bachelor of computer
science in computer network and security
at University Technology Malaysia
under the faculty of computing.
These are the subjects offered in this
program which has a duration of four
years. We're going to talk about it
later.
For diploma holders, UTM allows students
to apply for credit transfer for this
program. According to UTM academic
regulations, up to 50% of the total
degree credits may be transferred from
diploma courses, which can reduce the
overall duration of study.
Now, let's talk about the requirements.
To continue this degree, you need to
have at least a diploma or any
government recognized qualification of
the same level. Your CGPA must be at
least 2.8. If not, you will need at
least 2 years of relevant work
experience in the same field.
Alhamdulillah.
In addition, you are required to have at
least Ben one in Malaysian University
English test or when
now let's talk about the subjects that I
will be learning and how the skills
gained can be applied during my
industrial training.
First, network communication.
In this subject, students learn how data
flows across a network, including how
information is transmitted, received,
and managed. This knowledge is important
in understanding and preventing
networkbased attack such as DOS and
DDOS.
For my industrial training, I choose
condition zebra, a cyber security
company in Malaysia as an IT security
training.
The company has over 14 years of
experience in information security
research and development. My
responsibilities as a traininee include
security analysis and reporting as well
as existing in vulnerability assessments
and penetration testing projects. These
tasks allow me to directly apply
theoretical knowledge into practical
security operations.
In terms of requirements, applicants
must possesses a diploma or degree in a
related field, demonstrate a strong
passion for information security, and
maintain a good academic records. That's
the end of the video. Thank you.
UNLOCK MORE
Sign up free to access premium features
INTERACTIVE VIEWER
Watch the video with synced subtitles, adjustable overlay, and full playback control.
AI SUMMARY
Get an instant AI-generated summary of the video content, key points, and takeaways.
TRANSLATE
Translate the transcript to 100+ languages with one click. Download in any format.
MIND MAP
Visualize the transcript as an interactive mind map. Understand structure at a glance.
CHAT WITH TRANSCRIPT
Ask questions about the video content. Get answers powered by AI directly from the transcript.
GET MORE FROM YOUR TRANSCRIPTS
Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.