Develop Poster from Presentation Content

  • Estado: Closed
  • Premio: $50
  • Propuestas recibidas: 4
  • Ganador: d3stin

Resumen del concurso

I am transitioning a presentation into a poster for an upcoming conference--I would like to divide the poster's content into 4 sections: 3 sections for material in presentation divided into concept, execution and management. The 4th section would be the text that provides background information like the abstract, introduction, references...etc (you'll get more details based upon the requirements below). I am also attaching portions of the presentation that include the content--this needs to be condensed so your creativity will be much appreciated--please feel free to ask as many clarifying questions as needed.

Poster Styles
● The layout of your poster is entirely up to you. Although all posters usually contain the
same research elements, there is not a standard way of creating the poster design.
● You can create printed 1-sheet posters or create a poster layout using individual pieces.
Both options are common and appropriate.

Poster Content
Posters should be easy to read and should not be crowded. Only essential information should be included. Be concise. Text should be legible and in dark print. Include graphs, tables, illustrations and photos. You are limited by the 60” by 40” poster space (the physical poster will be attached to a foam board that is 60x40--so the poster needs to be just a bit smaller).

TITLE: Your title announces you and your work from a distance and should be printed in letters
that are 1-2 inches high. It should be followed by the name(s) of the student author(s), faculty
sponsor(s) and the academic institution.

Title = "Reverse Engineering Cybersecurity Professionals"
Name = Jim Smith III
Institution = University of Maryland University College

HEADINGS: Main headings can be used to carry essential information and provide a “take home” message.

Step 1 = Community Stakeholder Model: This is the process model that has the customer, educator/service provider, employer, funder, individual/affinity groups--with KP in the middle. I would like a more appealing depiction of this model and this graphic will be presented under this heading (I may add a small amount of text below the title--just a teaser line to provide more context for the title)

Step 2: Service Delivery Network (Talent Pipeline) - This is the pipeline picture that shows the actors from the community stakeholder model above--I would like a more graphically appealing depiction of a pipeline to showcase the actors by phase

Step 3: KP Professional Maturity Model: This is the graphic that provides the structure for how we track an individual's development for a particular skill (the example includes communication)--step 2 and step 3 can be combined if you can do it in a creative way to save space and to be efficient--slide 7 is a rough example of how this can be combined in theory--please improve upon this design)

Step 4: Defining Requirements for Cybersecurity Career (slide 9): Vulnerability Assessment and Mgmt was the occupation selected--the right side shows the actual KSAs for this specific career

Step 5: Executing and Monitoring: We want to show that we work with partners to develop a development plan for our students and monitor their ongoing development.

The following sections should all be contained in the same area of the poster--I will provide text for Introductions, Abstract, Methods, Discussions and Conclusions and references shortly--but for now please use mock data to get the layout structured. You can find the info of what will be included below:

INTRODUCTIONS: A succinct synopsis of the relevant theoretical background should be
provided.
ABSTRACT: A brief summary of your study should be included in your poster.
METHODS: Describe subjects, design, tasks and procedures. Your variables should be clearly
defined.
DISCUSSIONS AND CONCLUSIONS: Provide a concise explanation of the significance of your
results in the context of the theoretical background developed in the introduction.

Habilidades recomendadas

Comentarios del empleador

“She did an amazing job with complicated content with aggressive deadline--was a true professional. Highly recommend and look forward to working with her again!”

Imagen del perfil dngvw, United States.

Principales propuestas de este concurso

Ver más participaciones

Tablero de aclaración pública

  • awaisahmedkarni
    awaisahmedkarni
    • 5 años atrás

    working

    • 5 años atrás
  • dngvw
    Organizador del concurso
    • 5 años atrás

    For those considering submitting a response to the contest--please submit by today as I would like to make a decision soon and work with the selected designer on the final details to have the final product prior to the final deadline so that it can go to production- and be produced by Sun

    • 5 años atrás
    1. areverence
      areverence
      • 5 años atrás

      Kindly wait for my submission, I am on it.

      • 5 años atrás
  • edichoska
    edichoska
    • 5 años atrás

    I would greatly appreciate if you give me feedback on my last entry.

    • 5 años atrás
  • ankurrpipaliya
    ankurrpipaliya
    • 5 años atrás

    working...

    • 5 años atrás
  • dngvw
    Organizador del concurso
    • 5 años atrás

    INTRODUCTIONS:
    While K12 has the mission of college and career ready students the shortage of cybersecurity professionals continues to increase and is expected to surpass 3.5 million unfilled positions by the year 2021.

    ABSTRACT:
    The objective is to develop a scalable workforce development solution implemented with K12 / University partners as an after-school program that significantly increases the supply and quality of cybersecurity professionals for employers.

    METHODS:
    A community stakeholder model that clearly defines the role and responsibilities of each actor in conjunction with KP’s professional maturity model provides a framework for reverse engineering cybersecurity professionals beginning in K12.

    DISCUSSIONS AND CONCLUSIONS:
    A pilot program is planned for 2019 in Washington, DC / Prince George’s County, MD—the program will be expanded to other geographies in 2020 with a goal of 10,000 cybersecurity professionals by 2025.

    • 5 años atrás
  • dngvw
    Organizador del concurso
    • 5 años atrás

    I have uploaded the draft content for the intro / abstract / methods...please see the attached file--I'm also copying here for quick reference:

    • 5 años atrás
  • guillermourbin
    guillermourbin
    • 5 años atrás

    Can you contact me in private please?

    • 5 años atrás
    1. dngvw
      Organizador del concurso
      • 5 años atrás

      sure but I don't know how to initiate a private chat--my apologies. But if you message me I'll respond--thank you.

      • 5 años atrás
  • dngvw
    Organizador del concurso
    • 5 años atrás

    sorry...the file is now uploaded.

    • 5 años atrás
    1. d3stin
      d3stin
      • 5 años atrás

      Hi, could you advise the content for these parts? We need it to design a proper layout of the poster. Thanks>>>> INTRODUCTIONS: A succinct synopsis of the relevant theoretical background should be
      provided.
      ABSTRACT: A brief summary of your study should be included in your poster.
      METHODS: Describe subjects, design, tasks and procedures. Your variables should be clearly
      defined.
      DISCUSSIONS AND CONCLUSIONS: Provide a concise explanation of the significance of your
      results in the context of the theoretical background developed in the introduction.

      • 5 años atrás
  • RasheedEqbal
    RasheedEqbal
    • 5 años atrás

    No files attached. attach please

    • 5 años atrás

Mostrar más comentarios

Cómo comenzar con los concursos

  • Publica tu concurso

    Publica tu concurso Fácil y rápido

  • Recibe montones de propuestas

    Consigue toneladas de propuestas De todo el mundo

  • Elige la mejor propuesta

    Elige la mejor propuesta ¡Descarga fácilmente los archivos!

Publica un concurso ahora o únete a nosotros hoy