“ As a technical trainer, Damara works effectively within a team of students to achieve specific tasks or projects such as completing a preparation test for an exam, taking an exam. Damara is willing to offer support and guidance to her students . Is proactive in sharing AWS knowledge, skills and expertise with students, she’s very professional. Damara is always punctual and is respectful of colleagues/students by arriving on time for meetings. Displays the ability to communicate at all levels, she’s emphatic to students needs and concerns. She contributes ideas and insights to her students and meets all required deadlines. I would recommend Damara 100% ! ”
About
Dynamic professional with robust expertise in artificial intelligence, including…
Contributions
-
You’ve landed a job interview. How can you make the most of it?
When landing an interview for a potential job, it is important to research the company itself- what is the mission statement, what are their values, and what is the vision. Use that to determine how you can add value to the company's strategic plans. Use LinkedIn! If you know who's interviewing you, research them- managers are looking at your qualifications, but they want to see how you fit in with the team. Understanding how they think can help you connect more easily. You can also use LinkedIn to generate potential interview questions- and then spend time answering all of them and PRACTICE! At the end of the interview, ask them questions about the company as well. Show them your interest in being a part of the company as well.
-
How can you protect TCP in a cloud environment?
TCP (Transmission Control Protocol) ensures a reliable connection is established by initiating a three-way handshake (SYN-SYN/ACK-ACK) between two hosts. This connection can be compromised by different attacks, such as SYN flooding, DoS, or Man-in-the-Middle attacks. The cloud environment offers several strategies to protect this process. The ability to leverage scalable security controls that respond to threats enhances resilience. Cloud security features, such as network access control lists, security groups, and VPCs can be utilized to limit access. Employ intrusion detection and intrusion prevention systems to analyze traffic. Together, all these strategies provide multiple layers of defense to protect TCP in a cloud environment.
Activity
-
Progress doesn't just happen, progress is made to happen. And the Moore-Miller cabinet is making it happen. From reducing violent crime to building…
Progress doesn't just happen, progress is made to happen. And the Moore-Miller cabinet is making it happen. From reducing violent crime to building…
Liked by Damara Ross
Experience
Education
-
CURTIN UNIVERSITY
One year study abroad studying in medical program and Aboriginal Studies
-
-
Activities and Societies: IT Society, Eastern Gateway Book Club
Current student studying for my Associates in Information Technology.
-
-
-
-
I received my Master of Public Health with a focus on Health Promotion, Administration and Health Information Technology.
-
-
-
Licenses & Certifications
-
-
-
-
-
-
-
-
-
Health Information Technology Graduate Certificate
The George Washington University- Milken Institute School of Public Health
Issued -
-
-
-
-
-
-
-
-
-
-
-
-
Honors & Awards
-
Honor Society Recipient
Phi Theta Kappa International Honor Society International
Inducted into the Phi Theta Kappa Honor Society International for achieving and maintaining a perfect 4.0 G.P.A. at Eastern Gateway Community College.
Recommendations received
-
LinkedIn User
4 people have recommended Damara
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More