1. Nmap and Nmap History
  2. Working In a High School As A Computer Instructor
  3. Penetration Testing Jobs in worldwide – A Valuable Online Resource
  4. Types of computer software
  5. Cross-site scripting (XSS) attack
  6. Five Best Cyber Security and Ethical Hacking Private Degrees in Sri Lanka
  7. Google’s open-source tsunami vulnerability scanner
  8. What is Google? (Tutorial)
  9. What is a SQL Injection Attack?
  10. Is WordPress Easy?
  11. How to find a perfect domain name for your website (10+ Tips and Tricks Tutorial)
  12. 6 new vulnerabilities with D-Link home routers allow hackers to launch remote attacks
  13. What is the YouTube and YouTube AdSense?
  14. C++ Lesson 6 – Storage of information through user interactions and VARIABLES
  15. How to get full root Access by Termux without Root?
  16. Trojan horse’s Story | who is this Trojan horse
  17. Don’t use these wallpapers in your mobile phone – System Crash wallpaper issue
  18. Burp Suite pro [Professional 2020.4.1]
  19. Website SEO checker tool
  20. What is DNS? (Domain Name System)
  21. C++ Lesson 5 – Get ready for the first program – Part 2
  22. Whatsapp Secrets Code List
  23. Python Lesson 1 – Python and Computer Programming
  24. C++ Lesson 4 – Get ready for the first program
  25. C++ Lesson 3 – Setting the background PROGRAMMING for LINUX.
  26. What is an Email? (Learn about Email)
  27. GoDaddy reveals a data breach, exposing the credentials of the web hosting account
  28. C++ Lesson 2: Setting the PROGRAMMING Background for WINDOWS
  29. C++ full tutorial | How to start C++ | Part 001
  30. What is the IP Address? – Full Tutorial
  31. How to install Kali Linux in windows Computer using virtualBox – 001
  32. Online YouTube Backlink Generator Tool
  33. How to use ShellPhish in mobile phone – Advance Phishing tool
  34. Remote Command Execution (R.C.E) vulnerability
  35. Mobile phone Ethical Hacking & Penetration Testing platform (Termux)
  36. Nmap network scanning (Basic Tutorial for Beginers) – 002
  37. Nmap Port Scanning tool (Basic Tutorial for Beginers) – 001
  38. Penetration Testing and Ethical Hacking Linux Distribute – Kali Linux
  1. Nmap and Nmap History
  2. Working In a High School As A Computer Instructor
  3. Penetration Testing Jobs in worldwide – A Valuable Online Resource
  4. Types of computer software
  5. Cross-site scripting (XSS) attack
  6. Five Best Cyber Security and Ethical Hacking Private Degrees in Sri Lanka
  7. Google’s open-source tsunami vulnerability scanner
  8. What is Google? (Tutorial)
  9. What is a SQL Injection Attack?
  10. Is WordPress Easy?
  11. How to find a perfect domain name for your website (10+ Tips and Tricks Tutorial)
  12. 6 new vulnerabilities with D-Link home routers allow hackers to launch remote attacks
  13. What is the YouTube and YouTube AdSense?
  14. C++ Lesson 6 – Storage of information through user interactions and VARIABLES
  15. How to get full root Access by Termux without Root?
  16. Trojan horse’s Story | who is this Trojan horse
  17. Don’t use these wallpapers in your mobile phone – System Crash wallpaper issue
  18. Burp Suite pro [Professional 2020.4.1]
  19. Website SEO checker tool
  20. What is DNS? (Domain Name System)
  21. C++ Lesson 5 – Get ready for the first program – Part 2
  22. Whatsapp Secrets Code List
  23. Python Lesson 1 – Python and Computer Programming
  24. C++ Lesson 4 – Get ready for the first program
  25. C++ Lesson 3 – Setting the background PROGRAMMING for LINUX.
  26. What is an Email? (Learn about Email)
  27. GoDaddy reveals a data breach, exposing the credentials of the web hosting account
  28. C++ Lesson 2: Setting the PROGRAMMING Background for WINDOWS
  29. C++ full tutorial | How to start C++ | Part 001
  30. What is the IP Address? – Full Tutorial
  31. How to install Kali Linux in windows Computer using virtualBox – 001
  32. Online YouTube Backlink Generator Tool
  33. How to use ShellPhish in mobile phone – Advance Phishing tool
  34. Remote Command Execution (R.C.E) vulnerability
  35. Mobile phone Ethical Hacking & Penetration Testing platform (Termux)
  36. Nmap network scanning (Basic Tutorial for Beginers) – 002
  37. Nmap Port Scanning tool (Basic Tutorial for Beginers) – 001
  38. Penetration Testing and Ethical Hacking Linux Distribute – Kali Linux
Working In a High School As A Computer Instructor
Working In a High School As A Computer Instructor

Most people dream of working in banks, software companies, universities, or even starting their own enterprise after graduating from college with a degree in IT (Information Technology) or Computer Science. Unfortunately, I did not realize this dream in spite of having graduated top of my class. During my applications for internship jobs, I’d requested for placement in several corporate organizations as well as small startup businesses. To the best of my knowledge, these were the only organizations that could help me launch my career.

So it came as a surprise when I was informed by the head of ICT (Information and Communication Technology) that I had to report to a local high school to start my internship program.

While I’d dreamt of several jobs, it never occurred to me that my first job would be a computer instructor in a high school. But as it turned out, working in high school during my formative years as an IT professional proved crucial. I learned several things which I might have not had I opted to work for a prestigious company.

For starters, the school was building its IT infrastructure and the knowledge that came with this project has stayed with me to-date. But it’s not just the knowledge that came with learning how to build a network infrastructure that proved crucial; I learned how to relate with children and how to work as a team. Listed below, are some of the experiences that I acquired while working in high school during my internship program.

1: Patience.

Instructing young students, especially learners aged between 12 and 16 on how to effectively use computer and internet technology to their benefit is not that easy. Teenagers are fascinated with what they see in movies and what to translate that same know-how to their classes. As a computer teacher, you need to know how to balance the theoretical and practical aspects of computer studies since most high school students who take computer lessons prefer lab sessions.

ALSO READ  What is the YouTube and YouTube AdSense?

Patience is also called for when it comes to assessing assignments given to students. Because students are encouraged to use the internet while completing their projects, most tend to come up with fascinating answers and approaches to a problem.

2: Team Work.

Working in an environment where everybody, including the staff, is just beginning to learn how to integrate computer technology into their work processes is not that simple. Being computer literate and computer savvy are two different things. This is one of the elements that I came to learn while working in high school as a computer instructor. You have to work with everybody so as to ensure that the system is running smoothly.

Since the school was aiming to shift to a paperless environment by the time my internship was complete, it was up to me to train the staff on how to effectively use a LAN (Local Area Network) as well as the internet to assess information that is relevant to their work. While I may have thought that working in high school was a demeaning job, I must admit that I learned a lot.

Tags: , , , , , , , ,
Thiwanga Sandaruwan is a professional blog writer. SecDevil.com is the main website of he managed. If you have any problem feel free and contact him.

Related Article

No Related Article

Leave a Reply

Your email address will not be published. Required fields are marked *

CommentLuv badge