Model essay on career planning of information security major (original)

Information is an important strategic resource for social development. The international struggle around the acquisition, use and control of information is becoming increasingly fierce. Information security has become a key point in maintaining national security and social stability, and all countries have given great attention and input. Network information security has become an important key issue that needs to be solved urgently and concerns the overall situation and long-term interests of the country. It is not only a powerful guarantee to exert the high efficiency and effectiveness brought by the information revolution, but also an important barrier to resist information aggression. Information security capability is an important part of comprehensive national strength, economic competitiveness and viability in 2 1 century, and it is the commanding height that all countries in the world are struggling to climb at the turn of the century. Information security issues have a comprehensive impact on all aspects of China's political, military, economic, cultural and social life. If it is not solved well, the country will be threatened by information war and the economic and financial risks will be high.

One: Preface

In today's era of talent competition, career planning has become another important weapon in the competition for employment. For everyone, career is limited. Without effective planning, it will inevitably lead to a waste of time and energy. As a contemporary college student, how can I win a place for myself when I step into this highly competitive society with a blank face? Therefore, I make a career plan for myself. With goals, there is motivation and direction. The so-called know yourself and know yourself. On the basis of recognizing your current situation, carefully plan your career.

Effective career design must be based on a full and correct understanding of one's own conditions and related environment. We should look at ourselves, know ourselves, know ourselves and do a good job in self-evaluation, including our interests, specialties, personality, knowledge, skills, IQ, EQ, way of thinking, etc. That is to find out what I want to do, what I can do, what I should do, what I will choose in front of many positions and so on. So if you want to succeed, you must evaluate yourself correctly.

Second: self-evaluation.

Personal character: there are both extroverted and introverted sides. Sometimes, as long as there are any activities, you will probably see me participate. When I am introverted, I can make people ignore my existence.

Personal interests like reading books and walking alone.

Personal advantages: perseverance, courage to ask questions with an open mind, righteousness to correct mistakes, and above all, a loyal heart. Personal knowledge: junior college

Personal ambition: I want to be an excellent senior information security Commissioner, who can work in the fields of computer, communication, e-commerce, e-government and e-finance.

3. Understanding of occupation

This major is an interdisciplinary subject of computer, communication, mathematics, physics, law and management, and mainly studies science and technology to ensure information security. Cultivate senior information security professionals who can engage in computer, communication, e-commerce, e-government and e-finance. The concept of information security has experienced a long historical stage in this century, and has been deepening since the 1990s. Entering the 2 1 century, with the continuous development of information technology, the problem of information security has become increasingly prominent. How to ensure the security of information system has become a concern of the whole society. The research on information security in the world started earlier, invested a lot, and achieved a lot of results, which has been popularized and applied. At present, there are a number of research institutions and high-tech enterprises specializing in basic research, technology development and technical services of information security in China, forming the embryonic form of information security industry in China. However, there is a serious shortage of technical talents specializing in information security in China, which hinders the development of China's information security industry. Information security is a promising major.

Specialized courses: The professional foundations and courses of study mainly include: advanced mathematics, linear algebra, calculation methods, probability theory and mathematical statistics, computers and algorithms, C++ language programming, data structures and algorithms, computer principles and assembly languages, database principles, operating systems, college physics, set theory and graph theory, algebra and logic, cryptography principles, coding theory, information theory foundation, information security architecture and software engineering.

Professional Employment Direction: Information is an important strategic resource for social development. The international struggle around the acquisition, use and control of information is becoming increasingly fierce. Information security has become a key point in maintaining national security and social stability, and all countries have given great attention and input. Network information security has become an important key issue that needs to be solved urgently and concerns the overall situation and long-term interests of the country. It is not only a powerful guarantee to exert the high efficiency and effectiveness brought by the information revolution, but also an important barrier to resist information aggression. Information security capability is an important part of comprehensive national strength, economic competitiveness and viability in 2 1 century, and it is the commanding height that all countries in the world are struggling to climb at the turn of the century. Information security issues have a comprehensive impact on all aspects of China's political, military, economic, cultural and social life. If it is not solved well, the country will be threatened by information war and the economic and financial risks will be high.

In short, with the rapid development of network information technology today, information security has become crucial, and information security has become a hot topic in information science. At present, the starting point of information security technology in China is still low, and only a few universities in China offer information security majors, and there is a shortage of information security technicians. Graduates of this major can engage in the research, design, development and management of various information security systems and computer security systems in government agencies, national security departments, banks, finance, securities, communications and other departments, and can also engage in computer applications in the IT field. We should fully understand the importance of information security and its extremely broad market prospects in the network information age, adapt to the times and seize the opportunity!

Four: professional prospects

1. Network Police Network Police is a comprehensive combat police that takes network technology as the main means and integrates crime fighting and management prevention. In addition to detecting cases, it is also responsible for public information monitoring, participating in the special clean-up and rectification of harmful information on the Internet, coordinating relevant departments and websites to delete harmful information, and strengthening the construction of public security science and technology. The main job of network police every day is to conduct online search, manage internet cafes, retrieve harmful information such as obscenity and reaction on the Internet, and investigate and deal with cyber crimes according to clues.

2. The increasingly serious information security problem of anti-virus engineers reflects the lack of information security technicians, and professional anti-virus engineers are a blank in the IT talent structure. Anti-virus engineers need to know network knowledge, host operation, application system knowledge, data inventory knowledge, all kinds of special instruments and meters knowledge, security detection and monitoring software knowledge, scanning and anti-hacking software knowledge. From a certain point of view, anti-virus engineers are powerful guardians against network hidden dangers.

3.honker (Information Security Officer) In China, red has specific values: justice, morality, progress, strength and so on. Honker is the patron saint of the Internet with these qualities. They are computer enthusiasts who are diametrically opposed to hackers. They are keen to study the computer attack and defense technology, and constantly improve it, so as to better serve people. They play the role of network information security officers and are emerging cyber soldiers.

Information security major is an interdisciplinary subject in computer, communication, mathematics, physics and other fields. It mainly studies science and technology to ensure information security. Professional courses cover the main knowledge points in the field of information security, focusing on cultivating senior professionals who can hold information security positions in the fields of computer, communication, electronic information, e-commerce, e-government, e-finance and military affairs. Students who have completed all the courses specified in the teaching plan and passed the examination can obtain a certificate of computer grade above intermediate level, a certificate of registered information security engineer, a certificate of registered information security manager and a certificate of registered information security auditor. Statistics from the Ministry of Education show that at present, there are only about 2 100 information security talents with bachelor degree or above in China, and only about 1400 with college degree. There is a huge gap between social demand and talent supply, and the talent problem has become a bottleneck restricting the development of information security industry. Therefore, the information security major has the employment advantages of hard qualification certificate, few graduates, many demanding departments, large employers and broad employment prospects.

The employment direction of information security major mainly includes information monitoring of public security bureau, websites, virus anti-virus companies and places involving information security, such as technical security maintenance departments of telecommunications and Netcom, and network security monitoring departments of important government departments.

Five: My goal

A life without an aim is like an unmanned boat drifting aimlessly in the wind. You must decide what you want to do before you can achieve your goal. Goals will make you ambitious, goals will give you the courage to try again when you fail, and goals will unify my ideal self with reality. Just as air is to life, goals are necessary for success. Clear goals are the foundation of success, so setting goals is very important.

In the process of success, it is advisable to guide students to clarify the relationship between big goals and small goals and make orderly arrangements according to the implementation steps, so that they can do it faster and better.

5. 1 Short-term goal

I should study all the related subjects of information security seriously and get all the knowledge I need for my major. At the same time, I want to read more extracurricular knowledge, expand my knowledge and broaden my horizons. There is also a desire to increase contacts and improve interpersonal relationships.

I want to get all kinds of certificates related to my major, pass English exams and computer exams, participate in various activities that can improve my ability and accumulate social experience at the same time.

5.2 Long-term goals

Accumulate social work experience, increase practical knowledge that can't be learned in textbooks, and combine theoretical knowledge to make their own innovations. After work, you should learn all kinds of knowledge, improve your ability and increase your ability to be out of touch with social knowledge on campus. Strive to improve one's self-cultivation.

5.3 occupation

I want to be a computer system software engineer, who can coordinate the construction, maintenance and expansion of an organization's computer system. Coordinate the computer requirements of various departments and give suggestions on technical direction; Establishing an organization's network is usually a post responsible for the design and implementation of system security and data security. Also often provide technical support for salesmen; Help to determine the customer's needs and make changes to the system according to the customer's requirements; Responsible for the security between their configuration systems. Education and quality requirements: education and quality requirements:

Bachelor degree or above is required, and some complex projects require a master's degree. In addition to academic qualifications, employers attach great importance to relevant programming skills and experience. Therefore, we should participate in more internships and do more hands-on operations. The requirements of some new technologies should be constantly updated. Computer software engineers also need some skills of the units they serve, such as banks: they need to understand the requirements of finance and bank computing.

Quality requires strong ability to solve and analyze problems; Flexibility and creativity are very important for designing new functional software; Effective communication skills, able to communicate effectively with team members, other employees and customers; Concentration and concentration when handling multiple tasks at the same time.

5.4 Promotion opportunities

Experienced software engineers can be promoted to project manager, information system manager and chief information officer. Some software engineers can get high-paying positions, such as system designers and independent consultants, especially in some special fields, such as security and data security. Employment prospects: Employment prospects: the growth rate is ahead of the average level of all industries. With the development of internet technology, there are new requirements for computer software engineers to develop Internet, intranet and web applications. Similarly, the application of electronic data processing in commerce, telecommunications, medical care, government and other fields is becoming more and more complicated. New growth areas: mobile technology, wireless Internet, PDA, resulting in many product requirements, new mobile applications and system software.

VI. Plan to achieve the goal

6. 1 during college

Freshman studied introductory courses such as introduction to information science, computer foundation of university, signal and information processing foundation, C language programming and so on. , let us have a general understanding of the characteristics of electrical information science, and also learn calculus, linear algebra, college English, college physics and other courses to help us lay a good foundation. At the end of the term, we chose our major, and information security was my major. To be honest, I didn't know much about this major at first, and I didn't know much about it until I listened to the teacher's introduction in the introductory class.

During my sophomore year, we will study professional courses such as probability theory, discrete mathematics, mathematical statistics, circuit and electronic technology, digital circuit and logic design, information and coding, data structure and communication principle. At present, there are few courses that need to be programmed by yourself, so we should seize the time to exercise ourselves as much as possible during the period with few courses, debug more programs, master system operation skillfully, and make up the basic courses that freshmen should learn well. The third and fourth years are the key periods for us to further master our professional knowledge, so we must concentrate on our studies. I'm not going to take the postgraduate entrance examination, so we should spend all our time studying and mastering professional knowledge. So that you can find a job smoothly when you graduate. But now enterprises and institutions have high requirements for experience. I can use the winter and summer vacations to find some jobs related to my major to increase my practical experience, which is called part-time. I won't put money in my position, but accumulate more experience to prepare for the future.

6.2 After graduation

After graduation: I will work in schools, government agencies, national security departments, banks, finance, securities, communications and other departments to accumulate experience. After work, I will continue to learn professional knowledge to make my knowledge more comprehensive. Work hard, let the leaders notice me, and get promotion opportunities. Actively consult predecessors, because their experience is valuable, and then combine their own knowledge to build their own brand. I try my best to participate in establishing a good communication network, colleagues' dinners and activities organized by the company. Ability is exercised, experience is accumulated, and venture capital is saved.

Here, at this time, I will open my own nutrition package store and make it colorful with my knowledge.

Road to Postgraduate Entrance Examination: After being admitted to graduate school, I will continue my tenacity in preparation for postgraduate entrance examination and will not let myself relax. During this period, I will do some scientific research and gain knowledge through research and exploration. Actively strive to become the assistant of the research-oriented professor, and carefully observe and think during the professor's research, and get insights from it. Write more research papers. I hope that professionals can put forward some knowledge that I didn't expect after reading it, so that I can improve myself continuously.

Seven: Conclusion

The society is constantly changing, and things will not stay the same, but I will keep moving towards my goals. Even if the road is tortuous and the taste is bitter, I will not give up. However, appropriate and timely adjustment is inevitable. I will evaluate myself regularly and make some better adjustments according to the actual situation to adapt to the new changes in society.