Develop Poster from Presentation Content

  • Durum: Closed
  • Ödül: $50
  • Alınan Girdiler: 4
  • Kazanan: d3stin

Yarışma Özeti

I am transitioning a presentation into a poster for an upcoming conference--I would like to divide the poster's content into 4 sections: 3 sections for material in presentation divided into concept, execution and management. The 4th section would be the text that provides background information like the abstract, introduction, references...etc (you'll get more details based upon the requirements below). I am also attaching portions of the presentation that include the content--this needs to be condensed so your creativity will be much appreciated--please feel free to ask as many clarifying questions as needed.

Poster Styles
● The layout of your poster is entirely up to you. Although all posters usually contain the
same research elements, there is not a standard way of creating the poster design.
● You can create printed 1-sheet posters or create a poster layout using individual pieces.
Both options are common and appropriate.

Poster Content
Posters should be easy to read and should not be crowded. Only essential information should be included. Be concise. Text should be legible and in dark print. Include graphs, tables, illustrations and photos. You are limited by the 60” by 40” poster space (the physical poster will be attached to a foam board that is 60x40--so the poster needs to be just a bit smaller).

TITLE: Your title announces you and your work from a distance and should be printed in letters
that are 1-2 inches high. It should be followed by the name(s) of the student author(s), faculty
sponsor(s) and the academic institution.

Title = "Reverse Engineering Cybersecurity Professionals"
Name = Jim Smith III
Institution = University of Maryland University College

HEADINGS: Main headings can be used to carry essential information and provide a “take home” message.

Step 1 = Community Stakeholder Model: This is the process model that has the customer, educator/service provider, employer, funder, individual/affinity groups--with KP in the middle. I would like a more appealing depiction of this model and this graphic will be presented under this heading (I may add a small amount of text below the title--just a teaser line to provide more context for the title)

Step 2: Service Delivery Network (Talent Pipeline) - This is the pipeline picture that shows the actors from the community stakeholder model above--I would like a more graphically appealing depiction of a pipeline to showcase the actors by phase

Step 3: KP Professional Maturity Model: This is the graphic that provides the structure for how we track an individual's development for a particular skill (the example includes communication)--step 2 and step 3 can be combined if you can do it in a creative way to save space and to be efficient--slide 7 is a rough example of how this can be combined in theory--please improve upon this design)

Step 4: Defining Requirements for Cybersecurity Career (slide 9): Vulnerability Assessment and Mgmt was the occupation selected--the right side shows the actual KSAs for this specific career

Step 5: Executing and Monitoring: We want to show that we work with partners to develop a development plan for our students and monitor their ongoing development.

The following sections should all be contained in the same area of the poster--I will provide text for Introductions, Abstract, Methods, Discussions and Conclusions and references shortly--but for now please use mock data to get the layout structured. You can find the info of what will be included below:

INTRODUCTIONS: A succinct synopsis of the relevant theoretical background should be
provided.
ABSTRACT: A brief summary of your study should be included in your poster.
METHODS: Describe subjects, design, tasks and procedures. Your variables should be clearly
defined.
DISCUSSIONS AND CONCLUSIONS: Provide a concise explanation of the significance of your
results in the context of the theoretical background developed in the introduction.

Tavsiye Edilen Beceriler

İşveren Geribildirimi

“She did an amazing job with complicated content with aggressive deadline--was a true professional. Highly recommend and look forward to working with her again!”

Profil Görüntüsü dngvw, United States.

Bu yarışmadan başlıca girdiler

Daha Fazla Katılım Görüntüle

Genel Açıklama Panosu

  • awaisahmedkarni
    awaisahmedkarni
    • 4 ay önce

    working

    • 4 ay önce
  • dngvw
    Yarışma Sahibi
    • 4 ay önce

    For those considering submitting a response to the contest--please submit by today as I would like to make a decision soon and work with the selected designer on the final details to have the final product prior to the final deadline so that it can go to production- and be produced by Sun

    • 4 ay önce
    1. areverence
      areverence
      • 4 ay önce

      Kindly wait for my submission, I am on it.

      • 4 ay önce
  • edichoska
    edichoska
    • 4 ay önce

    I would greatly appreciate if you give me feedback on my last entry.

    • 4 ay önce
  • ankurrpipaliya
    ankurrpipaliya
    • 4 ay önce

    working...

    • 4 ay önce
  • dngvw
    Yarışma Sahibi
    • 4 ay önce

    INTRODUCTIONS:
    While K12 has the mission of college and career ready students the shortage of cybersecurity professionals continues to increase and is expected to surpass 3.5 million unfilled positions by the year 2021.

    ABSTRACT:
    The objective is to develop a scalable workforce development solution implemented with K12 / University partners as an after-school program that significantly increases the supply and quality of cybersecurity professionals for employers.

    METHODS:
    A community stakeholder model that clearly defines the role and responsibilities of each actor in conjunction with KP’s professional maturity model provides a framework for reverse engineering cybersecurity professionals beginning in K12.

    DISCUSSIONS AND CONCLUSIONS:
    A pilot program is planned for 2019 in Washington, DC / Prince George’s County, MD—the program will be expanded to other geographies in 2020 with a goal of 10,000 cybersecurity professionals by 2025.

    • 4 ay önce
  • dngvw
    Yarışma Sahibi
    • 4 ay önce

    I have uploaded the draft content for the intro / abstract / methods...please see the attached file--I'm also copying here for quick reference:

    • 4 ay önce
  • guillermourbin
    guillermourbin
    • 4 ay önce

    Can you contact me in private please?

    • 4 ay önce
    1. dngvw
      Yarışma Sahibi
      • 4 ay önce

      sure but I don't know how to initiate a private chat--my apologies. But if you message me I'll respond--thank you.

      • 4 ay önce
  • dngvw
    Yarışma Sahibi
    • 4 ay önce

    sorry...the file is now uploaded.

    • 4 ay önce
    1. d3stin
      d3stin
      • 4 ay önce

      Hi, could you advise the content for these parts? We need it to design a proper layout of the poster. Thanks>>>> INTRODUCTIONS: A succinct synopsis of the relevant theoretical background should be
      provided.
      ABSTRACT: A brief summary of your study should be included in your poster.
      METHODS: Describe subjects, design, tasks and procedures. Your variables should be clearly
      defined.
      DISCUSSIONS AND CONCLUSIONS: Provide a concise explanation of the significance of your
      results in the context of the theoretical background developed in the introduction.

      • 4 ay önce
  • RasheedEqbal
    RasheedEqbal
    • 4 ay önce

    No files attached. attach please

    • 4 ay önce

Daha fazla yorum göster

Yarışmalara nasıl başlanır

  • Projenizi ilan edin

    Yarışmanızı İlan Edin Hızlı ve kolay

  • Tonlarca girdi alın

    Tonlarca Girdi Alın Bütün dünyadan

  • En iyi girdiyi seçin

    En iyi girdiyi seçin Dosyaları indirin - Kolay!

Şimdi bir Yarışma İlan Et ya da Bugün Bize Katılın!