Statement Of Purpose (S.O.P)
Statement Of Purpose (S.O.P)
Information security is a constant in my life, that has always weighed more heavily on my conscience than it has for others. Growing up in Greenville, North Carolina, I have always been attracted to the manifestation of network systems and all other elements central to defining the subject. The limited access to capable computer, communication networks, and more importantly, the internet at the time only served to motivate my interest and compel me to learn more in this particular area. I became more gravitated to the subject on computers as a whole. Seeing that I could not be able to maintain proper attention in the subjects I was learning in school, I saw it fit, to drop out of school when I was in sixth grade, and instead pursue my passion, in learning about computer systems the best way I could. With the adequate access to learning and educational materials off our local town resource center; Sheppard Memorial Library off Evans St., I embarked on a journey that would come to define both me as a person and my future aspirations.
Access to the library, allowed me to deep my feet into the pool of academic research and overtime, it additionally opened a portal of curiosity within me that gave me focus and motivation on more nuanced subjects such as hacking that at the time were rudimentary. Back in 1989, when I was nine years old, I wrote my first program. When I was 12, I assembled my first computer by use of six broke computers. This was a monumental achievement for me, and one that would come to define my perspective in life and how I interacted within other people around me. I must admit at the time, with limited counsell, I used my knowledge to pursue extracurricular activities on the internet for fame and popularity among my friends. But as time went on, and through practical experiences, I gained a more informed perspective on how to better apply my knowledge in the area for a good course.
In this dynamic day and age, the role that networking and information security plays remains to be one that cannot be understated. From provision of a solid network security system, secure communication, sharing of sensitive information over larger distances, networking and information security has reinforced ideals of ethical virtual association, provided confidentiality, mitigated and prevented unauthorized access to sensitive information among a myriad of other important factors. This in return has been effective in controlling how people share information, and provision of data security a key institution that is valued within the socialization process. I became compelled in the subject and pursued it privately with immense interest.
In 2009, I had returned to Greenville, NC. On my return, I was blessed to meet my loving wife and subsequently daughter. Their presence in my life, worked as a wake up call to me, and I was determined to make them proud as they had made me. While I had worked very had in my life despite my lacking in academic knowledge and education, I did not wish for my daughter to grow up, seeing that I did well in life, without school education. In the twenty years that I had interacted with computer systems, I had always wondered what I could do to with the knowledge and passion I had amassed and be able to make the world a better place. It was not until I signed up for an ethical hacker course, with the help of my wife, that the importance of information security in practically all aspects of the virtual and physical space, effectively began to materialize.
The field of networking and information security was consistently presented as a solution to the myriad of challenges impacting our society in the digital age. During the course of this program, I was presented with the latest security threats, advanced attack vectors, and I got to participate in practicals with real time demonstrations of hacking methodologies, tools, techniques and security measures. Though the coverage of networking and information security in the course was bref, it opened up a gateway of inquisitiveness inside me that this is what I was destined to study. Around the same period I was had also been enlightened by my wife on the benefits of completing my GED from the Pitt Community College and my Associate Degree in Information and Computer Technology with a GPA of 3.98.
While my initial interest in renewing my educational qualifications were centered on impacting my daughter’s perspective on the need for acquiring academic success, I had increasingly become engrossed in the process. Also the achievements thus far worked to reinforce my spirits for knowledge. I was motivated to learn more and this is why I enrolled at the ECU in 2017. For me, my enrollment at the ECU was one of heavy emotional and mental meaning, but above all, it a dream come true. Coming from Greenville, this is an institution that I have from a young age, wanted to associate with and getting to enroll and participate within the ECU has been a toll order, but one that I am nonetheless proud of. My story and motivation from a young age is my justification to pursue Master of Science in Network Technology with a concentration in Information Security at East Carolina University.
Other than my story, I would reinstate that I have immense interest in Cyber security, great academic qualifications and certifications. I was inducted into the Hall of Fame for my Certified Ethical Hacker (C.E.H) program, I have participated in robot building at the Burring Summer and on a more personal level, I have been able to solve the Rubik’s Cube independently with only two arms and a camera that only read my input and relayed it to me. My love of education does not stop with the graduate program, as I am determined to pursue a doctorate program in the field. I trust that the ECU is capable of providing me with the adequate education, partnership and collaboration I need to achieve my dreams. I ultimately want to become a teacher in the field of technology with a concentration in cybersecurity.