fbpx

Mentoring Programme Testimonial – Lik Ken Chen

0
0

Mentee: Lik Ken Chen
University: Asia Pacific University of Technology & Innovation (APU)

ABOUT ME

Hi, I’m Lik Ken Chen from Asia Pacific University of Technology & Innovation (APU). I ventured into the realm of cyber security because I wish to grow my skills and knowledge in the field so that I can have the power to protect myself and the people that I care about from cyber criminals.

PROGRAMME EXPECTATIONS

I expect that with this programme I can have a clearer image and expand my skills and knowledge of cyber security beyond academia. With this, I hope that I can join in and help bridge the cyber security skills gap by sharing my experience and new knowledge with my peers and community.

PROGRAMME SIGNIFICANCE

For me, this ambassador mentoring programme is very well-rounded, which makes it perfect for amateurs in the cyber security field.

Not only that I get a chance to get trained to sit for CompTIA Security+ certification, I also get to network with professionals in the industry and like-minded individuals. Other than that, it also provides a platform for me to execute cyber security-related event ideas that I have at my university.

CONCLUSION

In short, I believe that being an ambassador is a key to bring changes, be it big or small, to the cyber world and its users. Together, we can make the cyber world a better and safer place. Thank you.

Lik Ken Chen

Lik Ken Chen - Testimonial

Created by Lik Ken Chen as part of the Mentoring Training Programme

This document is strictly private, confidential and personal to its recipients and is the sole property of Lateral Connect and should not be copied, distributed or reproduced in whole or in part, nor passed to any third party without prior permission from Lateral Connect.

0
0

Subscribe now for first access and updates

Related Blogs

Top 5 Cybersecurity Skills Every Graduate Needs in 2025 and How We Teach Them at Lateral Connect

The Future of Cybersecurity: How Lateral Connect Prepares Graduates for Real-World Challenges in 2025

Common Passwords Black Hat Hackers Exploit and How to Avoid Them

Responses

Subscribe to our newsletter

Join our subscribers list to get the latest news, updates and special offers delivered directly to your inbox