Drilldown: CapGrads
Use the filters below to narrow your results.
I think that really making it about something you're already passionate about is super important. It's only as much extra work as you make it really. My paper is fairly concise but it's the accumulation of work I've been doing for a long time. Don't write it off immediately and finish it in the end, (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
My capstone is a summary (more or less) of the work I've been doing on myself over the past 3ish years and what I have learned over that time. At first it was more physical, but it turns out that way more work had to be done mentally. It was originally longer but I trimmed out parts that weren't nee (1)
I had to ditch the poster-board aspect due to the circumstances, and my goals for me have evolved majorly since it was assigned as well. That lesson of learning how to learn is still very important, but now it's more focused on discipline and being emotionally healthy. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I learned a lot about me, and the "demons" I have. I feel not near as powerless as I did to them even just a little while ago. I'm learning to heal the mental things that need to be healed and grow in a healthy way, and not feel like a core part of me is a mistake and has to be hidden away. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 2 results in range #1 to #2.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)


