Sample of CDR Report Writing for Engineers:
CAREER EPISODE 1
INTRODUCTION:
CE 1.1
This Career Episode 1 displayed the information of academic projects on” The development of a framework for security of higher education’s establishment” while pursuing a Bachelor’s degree in electrical engineering from the institute, XXX. It took place from (3/5/2016 -9/23/2016) under the directions and guidance of, Sir XXX.
BACKGROUND
CE 1.2
Security has become an essential administration issue for all advanced education foundations (HEIs). A safe system is obligatory if an association wants to run productively and shield itself from vindictive assaults. Attacks of cybercrime have affected almost all industries including advanced education in the United States 17% of every single announced datum ruptures. Here is no further place for powerless connections and gaps in the system. Now it’s time for measures taken to guarantee critical information. Keeping in mind the above scenario, we developed a structure for the security of an advanced education foundation in the United Arab Emirates.
OBJECTIVE
CE 1.3
The chief objective of this project was to present a framework on how to prevent cyber-attacks in the context of higher education institutions, using the United Arab Emirates as a case study.
CE1.4
Specifically, we had a few minor objectives which were following
- • To identify the ICT systems used by institutions of higher education that are commonly attacked
- • To identify the most common points of vulnerability for the various ICT Systems that are used by Institutions of Higher Education
- • To identify ways through which the institutions of higher education can minimize their vulnerability
CE 1.5
We endeavored to utilize an innovation apparatus (surveymonkey.com) to disseminate the polls everywhere. We were able together information from 60 out of 70 schools in one week. In this particular data collecting procedure, I wrote and set one envelope for each school and IT staff that contains one poll. Maximum two hours were given to finish the surveys for every foundation, and the specialist gathered the polls.
CE 1.6
I helped my team to answer a portion of the exploration inquiries of this examination at the time of data analysis procedures. I took my role in measurements such as implies, combined means, frequencies, and standard deviations for all things to dissect the reactions. With my support, the information was broken down just by utilizing different software for example, Excel was used where it was conceivable to compute rates and deliver outlines that represent the outcomes. I learned a significant number of hard and soft skills that could help me in the very next future.
CE 1.7
Organization Chart:
|
|
|
|
1.3 PERSONAL ENGINEERING ACTIVITY
CE 1.8
In this project, we found out that we have to utilize the current data security best practices in order to ensure advanced education frameworks. In my suggestions, I ensured that security policy, practices, and the usage of security innovation must be set up.
CE 1.9
After completing this project, I understand that institutions should have clear policies on cyber security that will ensure important data assets are officially managed throughout the enterprise through suitable data and IT governance.
CE 1.10
Through this project, I was able to realize the institutions should have formal procedures and structures; and there should be the use of advanced technology. Its use should not be done in an ad-hoc way, but security and privacy should be given cautious consideration before implementation.
CE 1.11
In this particular project, I came to know that higher education institutions in the UAE must act proactively to secure their surroundings because being compliant does not necessarily mean you are secure. I let them realize the moment when something will have gone wrong, then it will be too late for putting security in place, and waiting till then can cause irreversible damage and substantial unexpected costs.
CE 1.12
I learned from this particular project that most of the victims do not effectively back up their data. We recognized that they should make sure the institution has measures in place to back up all of their information and files. Further, The School IT staff or Network Manager should safeguard that the backup storage is satisfactory and has enough room for growth.
CE 1.12
After analyzing all cases carefully, we came to the point that they would be more secure if they organize a cybersecurity management team in place who will be responsible for security applications at the school. By ensuring that they have security strategies in place which everyone observes, discuss these frequently with other participants such as governors and parents, so that everyone knows there are actions in place, and what to do in the event of something serious happening.
SUMMARY
CE 1.13
In this particular research, I with my team able to present a framework on how to prevent cyber-attacks in the context of higher education institutions, using the United Arab Emirates as a case study. Collecting data, and analyzing it, we are able to identify the ICT systems used by institutions of higher education that are commonly attacked. Further, we identified the most common points of vulnerability for the various ICT Systems that are used by Institutions of Higher Education.
CE 1.14
I have learned practically the role of information technology systems in institutions of higher education. Through this research, I was able to find out some major security threats faced by the institutions of higher education that use information communication technology systems. At the end of this research, we look forward that further research should be done on a network design framework for higher education institutions which helps in proper network management as most vulnerabilities lie in the school’s network.
CE 1.15
This undertaking helped me improve my knowledge of security systems which is a field where I am interested. This project was a good starting in learning the cybersecurity issues. Before creating a framework for the security of higher education’s establishment, it was a different experience than now. During this project, significant numbers of meetings were held with experts and teachers where I always ensured to submit my report before deadlines. Overall, I had played an active role as a managerial person amongst my peers in the project.
CAREER EPISODE 2
INTRODUCTION:C
CE 1.1
This career episode displayed the information academic projects on”
Secured Design of Wireless LAN” while pursuing a Bachelor’s degree in electrical engineering from the institute, Preston University. It took place from, date? Under the directions of and guidance of,
Background
I had undertaken this project with the intent to exceed further my understanding of Secured Design of Wireless LAN from just textbook to practical use. Wireless LAN is a form of local area network which is implemented whenever more than one computer are connected with each other in order to generate a network with using any sort of wires. This local Area Network gives the facility of mobility to its user where they can move around with in the coverage area and will not be disconnected. Usually, this network uses of OFDM 802.1 la modulation or spread spectrum modulation technology to provide communication among devices which is enabled by using radio waves as modulation technologies. In this project i have designed and install services of wireless local area network for a small campus. The main objective was achieved to provide data rate with higher speed using authentication of high level. In this project we had use IEEE 802.lX standard for implementing security over both wired and wireless local area network authentication.
The projects were put into practice by me and with a couple of my colleagues under the guidance of our teachers. We divided this project into three phases: The project was done in three phases. In the first phase, we had made a vast literature review and research through different sources. In the next phase all ideas were shared and an effective working plan was settled upon. Finally a full report was submitted at the end of the project.
Objective
In this era of technology, a computer network plays a critical role in our lifestyle. Effective network able us to retrieve important data from the various computers in the network to the main location that we can modify according to our need.
The main objectives of this project were following
- To Secured troubleshooting of Wireless LAN
- To provide data rate with higher speed using authentication of high level.
- To know what security system is best for wireless Network
- To exceed further understanding of Secured Design of Wireless LAN from just textbook to practical use.
During the troubleshoot of Secured Design of Wireless LAN, we had attached a few required Wireless Network Component which were 1) Wireless Router, 2) Wireless NIC, 3) Access Point and 4) User devices. The use of Wireless Router was to transmitted data over physical cables in a series of Ethernet packets such as it allows it to receive information from — and transmit information to — the internet. On the other side, to communicate with the wireless router systems we needed wireless NIC.
2.3 PERSONAL ENGINEERING ACTIVITY
During this project, I took my part to make a survey of literature that was available on existing technology and another different platform. I have cited correctly and credits where they were due for the all information and data which I had diligently found for my project. I have taken the role of managerial and able to organize the work to be done stipulated timeframe. After assessing the literature and gathered information, we able to proceed phase.
In this project, I actualized from my textbook concept to practical experience that wireless needs to be secured to prevent access from unauthorized users as wireless security is the basic and becoming the need of the wireless network. We had tried the different types of wireless security which are WEP, WAP, WAP2, and WAP3.
After evaluating and assessing the all different types of wireless security systems, we recommended WAP2 for Campus as we have found it provides more security than WEP, WAP, and WAP3.
I have explained the profoundly Secured Design of Wireless LAN with this diagram. The center of the grounds arranges is the system focus. The switch is associated with the outside system and firewall. There are various types of servers interface with the switch. I utilized one center change associated with the wired organize and the remote controller associated with the center switch. At that point, we have a few PoE changes associated with the center switch and passageway interface to the PoE switches. PoE alludes to Power over Ethernet and it is an innovation that let's organize links convey electrical power. It implies that just one link is enough for the PoE change to give system and power association at the same time. At that point, the APS will spread out the remote flag with the goal that all the customers in the inclusion region can get to the WLAN.
So, this is how I proposed Secured Design of Wireless LAN that fulfills the requirements of Campus and also uses the latest technology according to their needs and security requirements.
So, this undertaking academic project helped me improve my knowledge of wireless LAN which is a field I am interested in. It has proved to be a good starting point in computer networking. The point of the venture was to make a WLAN for grounds in principle part I increased profound learning of the highlights of WLANs Including the points of interest and confinements of WLANs, specialized gauges of WLANs Security and confirmations of WLANs. After that, I effectively manufactured a topology for the WLAN in the pragmatic part by utilizing the VISIO apparatus likewise overseen channels and APs by utilizing Hive Manager NG. At that point, I chose the appropriate security techniques and equipment for the Wireless LAN. There were still a few challenges left amid the usage of this undertaking. For instance How to send APs in a genuine domain How to ascertain the constriction control as indicated by the material of the boundary and u what sorts of programming ought to be introduced in the WLAN. Besides, In this undertaking, I just characterized a dynamic idea for WLAN. If you need to manufacture WLANs, you need an IT gathering to examine and think about progressively about the task. It’s anything but simple employment in genuine condition. You need to consider pretty much all the equipment and programming in the meantime with the advancement and consistent development of system innovation. So, Overall, I played an effective part in the Secured troubleshooting of Wireless LAN. In addition to this role, I able to implementation of my idea for the computer network, I learned and able to implement the use of different Wireless Network Components such as Wireless Router, Wireless NIC, and Access Point. So, As an aspiring electrical engineer, I was able to assemble a big capital of good experience and knowledge which may prove very useful in the future.
CAREER EPISODE 3
INTRODUCTION:
[CE 3.1]
This career episode is related to a job titled “ Power plants controller”. This job was carried out during my tenure at FRONTER WORK ORGANIZATIONS as an electrical engineer between Aug 2017 to May 2018.
Background:
[CE 3.2]
The front work organization in Pakistan needed a Power Plant controller to control, maintain and operate machinery to generate electric power. The project aim was to hire a person who can Control generator output to match the phase, frequency, and voltage of electricity supplied to panels.
[CE 3.3]
They required a person who knows operation Monitoring such as watching deals, gauges, and other indicators to make sure a machine is working properly. Except for these technical skills, they were also looking for a person with soft skills such as active listening—giving full attention to what other people are saying and getting the gist, doing critical thinking such as the use of logic and reasoning to identify the solutions and approach to the problem.
PERSONAL ENGINEERING ACTIVITY
[CE 3.4]
As a power plant controller, I divided the project into multiple phases so that I could perform my duties effectively and for being completed in stipulated time; first of all, I tried to understand my all responsibilities and all the basic scenarios of the project. After that, I drafted the phase completion sheet for proper project execution and in the final stage, I applied my skills and learned strategies to effectively accomplish my all duties.
My Roles & Responsibilities
[CE 3.5]
- It was included in my responsibility to Adjust controls plants to maintain the flow of power between different sources.
- I performed to Monitor and inspect power plant equipment to detect clues of operating problems.
- I was supposed to make minors repair such as condensers, pumps, fans, heaters, compressors, filters, feed water, and chlorinators in the whole system in need.
- It was included in my responsibility to Control generator output so that there is the same phase, voltage of electricity and frequency, supplied to panels.
- I was used to taking readings from gauges, meters, and charts at established intervals, and later I do corrective steps.
Practical personal activities
[CE 3.5]
In this job I was supposed to obtain information from different sources to evaluating and determine Compliance with Standards and keep Updating and Using Relevant Knowledge. I used relevant information and correct judgment to check whether the whole system is regulating standards.
[CE 3.6]
It was included in my duty to Documenting and Recording critical Information. I do data entry, transcribing, and maintaining information in written form, later Analyzing Data or Information underlying principles, facts, and reason by breaking down information into separate parts and then figured out the best solutions to the technical problem.
[CE 3.6]
It happened several times during the job we had problems in our working system; I detect the problem by categorizing, and estimating the changes in circumstances or events. I had also much time to consult and communicate with supervisors and peers to provide critical information.
[CE 3.7]
I interacted with computers and Maintaining Mechanical Equipment. I did servicing, adjusting, repairing, and testing machines, moving parts, and other mechanical equipment. In the same way, I also do interact with Computers. I used computer systems including its software and hardware to write programs, set up functions, and process information.
[CE 3.8]
I had established and cooperative working Interpersonal Relationships with others over time which shows my team making skills. On the other side, I had also performed general Physical Activities that require considerable use of the whole body such as climbing and lifting, walking and balance, and handling of materials. I did use my hands and arms in handling, positioning, and installing materials.
[CE 3.9]
During these projects, I have also training and teaching a few of my junior others. I identified the educational needs of others. I believe we should teach others whatever skills we have acquired. So, I helped others by transforming my knowledge to others.
[CE 3.10]
During this job, I have also done Processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information. Add to this, I also did the Interpreting the Meaning of Information for Others. I did translate and explaining what some coding information means and how it can be used.
[CE 3.11]
I took the responsibility of judging the Qualities of Things and Services. During that job several times, I was supposed to assessing the value and quality of things that were, directly and indirectly, relevant to my expertise.
[CE 3.12]
I interacted with computers and Maintaining Mechanical Equipment. I did servicing, adjusting, repairing, and testing machines, moving parts, and other mechanical equipment. In the same way, I also do interact with Computers. I used computer systems including its software and hardware to write programs, set up functions, and process information.
[CE 3.12]
I did Collaborations in the Work and Activities with Others. I was used to working with the different members of a group to accomplish tasks; those activities have helped me to develop and Building Teams. Further as encouraging and building mutual trust, respect for each other, and most importantly the cooperation among team members.
Summary
[CE 3.13]
This job frolicked a significant role in my professional career as it has raised my project development, preparation, and administration skills. I learned theoretically in the class that how to do minor repairing such as condensers, pumps, fans, heaters, compressors, filters, feed water, and chlorinators in the system in need but in this job I had transformed my all theoretical knowledge, which I acquired in classroom into practical knowledge.
[CE 3.11]
I learned the theoretical concept processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information but I become able to experiment through this job. So, overall, this job played a part of edifice block in my upcoming future activities relevant to electrical engineering.
CONTINUING PROFESSIONAL DEVELOPMENT (CPD)
Serial No. |
Title |
Topic |
Start Date |
Ending DATE |
Location |
1 |
Workshop |
National Rural support program |
1/25/2O14 |
3/20/2014 |
Johor Town Lahore |
2 |
Conference |
4th International Electrical Engineering Conference |
1/25/2019 |
1/26/2019 |
at IEP Karachi |
3 |
Short course |
Telecom Technician |
3/7/2015 |
6/10/2015 |
www.pist.edu.pk |
4 |
Seminars |
3/21/2017 |
3/21/2017 |
at Dha Suffa University |
|
5 |
Books |
Basic electricity, Dover book on electrical engineering |
7/9/2018 |
12/21/2018 |
Online |
6 |
Journals |
IEEE Transactions on Power Systems |
8/7/2019 |
2/3/2020 |
Online |
-
These are the competency Units and Elements. These elements must be addressed in the Summary Statement (see Section C). If you are applying for assessment as a Professional Engineer, you will need to download this page, complete it and lodge it with your application.
Competency Element |
A brief summary of how you have applied the element |
Paragraph number in the career episode(s) where the element is addressed |
PE1 KNOWLEDGE AND SKILL BASE |
||
PE1.1 Comprehensive, theory-based understanding of the underpinning natural and physical sciences and the engineering fundamentals applicable to the engineering discipline |
|
CE 1.2, CE 1.6 CE 2.2, CE 2.4 CE 3.2, CE 3.13 |
PE1.2 Conceptual understanding of the mathematics, numerical analysis, statistics and computer and information sciences which underpin the engineering discipline |
I learned the theoretical concept processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information |
CE 1.6 CE 2.7 CE 3.11 |
PE1.3 In-depth understanding of specialist bodies of knowledge within the engineering discipline |
|
CE 1.2, CE1.4 CE 2.2 |
PE1.4 Discernment of knowledge development and research directions within the engineering discipline |
|
CE 1.5 CE 2.6 CE 3.6 |
PE1.5 Knowledge of contextual factors impacting the engineering discipline |
|
CE 1.9 CE 2.4 CE 3.6 |
PE1.6 Understanding of the scope, principles, norms, accountabilities and bounds of contemporary engineering practice in the specific discipline |
|
CE 1.10 CE 2.4 CE 3.7 |
PE2 ENGINEERING APPLICATION ABILITY |
||
PE2.1 Application of established engineering methods to complex engineering problem solving |
|
CE 1.5 CE 1.6 CE 3.10 |
PE2.2 Fluent application of engineering techniques, tools and resources |
|
CE 1.5 CE 2.2 CE 2.3 |
PE2.3 Application of systematic engineering synthesis and design processes |
|
CE 1.2 CE 2.3 |
PE2.4 Application of systematic approaches to the conduct and management of engineering projects |
|
CE1.15 CE1.13 CE2.3 |
PE3 PROFESSIONAL AND PERSONAL ATTRIBUTES |
||
PE3.1 Ethical conduct and professional accountability |
|
CE 1.15 CE 3.12 CE 3.9 |
PE3.2 Effective oral and written communication in professional and lay domains |
|
CE 1.5 CE 1.6 CE 2.2 |
PE3.3 Creative innovative and proactive demeanor |
|
CE 1.11 CE 1.5 CE 1.12 |
PE3.4 Professional use and management of information |
|
CE 3.5 CE 2.3 |
PE3.5 Orderly management of self, and professional conduct |
|
CE 1.12 CE 2.10 |
PE3.6 Effective team membership and team leadership |
|
CE 1.15 CE 3.6 CE 3.8 |