Are you unsure about your future?
 
     
 
Are you graduating soon?
     
Do you have any plans after high school?
     
Do you know why your going to college or why your not?
     
     
     

Are you aware of what jobs will be available to you?

Get Informed!

The world of work is changing

and you need to be aware of your options.

 

Consider the following fields:
     

CHAMPLAIN COLLEGE

UNIVERSITY OF RHODE ISLAND

Digital Forensics

... is the art and science of applying computer science to aid the legal process. Although plenty of science is attributable to computer forensics, most successful investigators possess a nose for investigations and a skill for solving puzzles, which is where the art comes in. - Chris L.T. Brown, Computer Evidence Collection and Preservation, 2006
     
     

Homeland Security

Homeland security is the term generally used to refer to the broad national effort by all levels of government--federal, state, local and tribal--to protect the territory of the United States from hazards both internal and external, natural and man-made, as well as the Department of Homeland Security itself.

 
     

Systems Aministrator


is a person employed to maintain, and operate a computer system or network. System administrators may be members of an information technology department.

The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff. A System Administrator must demonstrate a blend of technical skills and responsibility
   
   
Network Security
Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together
     
 
Cybersecurity
 
     
     
     
Check out some additional opportunities at
CyberWatch
     
     
 
BACK TO PHS