SlideShare a Scribd company logo
1 of 1
Download to read offline
Information Technology
12/7/2015
I was Nate Mello’s professor for his eight week capstone class in the Cybersecurity
management program for Bay Path University. In this course students experienced a capture the flag
exercise, taking turns attacking and defending a server. I am pleased to recommend Nate for the
cybersecurity profession.
Nate was engaged early and often in the class. He demonstrated a good work ethic and
attention to detail. Nate was a good team member, and helped his fellow students get up to speed.
Nate also played a very important role in the class. When on the defending team, Nate identified the
source of an intrusion before any other student. When on the attacking team, Nate correctly found a
vulnerability and successfully exploited that vulnerability to gain access into the target server.
I am recommending Nate because I think he has a strong desire to learn and grow in the cyber
security profession. I think he has some of the communication skills necessary to be a good team
player, and the attention to detail to help him be successful in the cybersecurity field.
Regards,
Brian Basgen
Executive Director of IT
Bay Path University
413-565-6833
bbasgen@baypath.edu
 
Page 1 of 1

More Related Content

Viewers also liked

B299088김혜원 midterm
B299088김혜원 midtermB299088김혜원 midterm
B299088김혜원 midterm혜원 김
 
Word Play in Roald Dahl's The BFG: A Study in Schemes and Tropes
Word Play in Roald Dahl's The BFG: A Study in Schemes and TropesWord Play in Roald Dahl's The BFG: A Study in Schemes and Tropes
Word Play in Roald Dahl's The BFG: A Study in Schemes and TropesBernie DeKoven
 
Hernia Treatment In Chennai | Hernia Surgeon In India
Hernia Treatment In Chennai | Hernia Surgeon In IndiaHernia Treatment In Chennai | Hernia Surgeon In India
Hernia Treatment In Chennai | Hernia Surgeon In Indiavikrams clinic
 
оцінка якості криничної води, овочевої продукції та ґрунтового покриву
оцінка якості криничної води, овочевої продукції та ґрунтового покривуоцінка якості криничної води, овочевої продукції та ґрунтового покриву
оцінка якості криничної води, овочевої продукції та ґрунтового покривуВасиль Прескуре
 
Organizador grafico que identifique las caractersticas de las estrategias did...
Organizador grafico que identifique las caractersticas de las estrategias did...Organizador grafico que identifique las caractersticas de las estrategias did...
Organizador grafico que identifique las caractersticas de las estrategias did...Fernando Alvarado
 
10 healthy foods to fight vitamin d deficiency
10 healthy foods to fight vitamin d deficiency10 healthy foods to fight vitamin d deficiency
10 healthy foods to fight vitamin d deficiencyMediFee
 
Acuerdo Pedagógico Costos Standar
Acuerdo Pedagógico Costos StandarAcuerdo Pedagógico Costos Standar
Acuerdo Pedagógico Costos StandarAVH AVH
 

Viewers also liked (10)

B299088김혜원 midterm
B299088김혜원 midtermB299088김혜원 midterm
B299088김혜원 midterm
 
Inima
InimaInima
Inima
 
13th Sunday C
13th Sunday C13th Sunday C
13th Sunday C
 
Word Play in Roald Dahl's The BFG: A Study in Schemes and Tropes
Word Play in Roald Dahl's The BFG: A Study in Schemes and TropesWord Play in Roald Dahl's The BFG: A Study in Schemes and Tropes
Word Play in Roald Dahl's The BFG: A Study in Schemes and Tropes
 
Hernia Treatment In Chennai | Hernia Surgeon In India
Hernia Treatment In Chennai | Hernia Surgeon In IndiaHernia Treatment In Chennai | Hernia Surgeon In India
Hernia Treatment In Chennai | Hernia Surgeon In India
 
оцінка якості криничної води, овочевої продукції та ґрунтового покриву
оцінка якості криничної води, овочевої продукції та ґрунтового покривуоцінка якості криничної води, овочевої продукції та ґрунтового покриву
оцінка якості криничної води, овочевої продукції та ґрунтового покриву
 
Organizador grafico que identifique las caractersticas de las estrategias did...
Organizador grafico que identifique las caractersticas de las estrategias did...Organizador grafico que identifique las caractersticas de las estrategias did...
Organizador grafico que identifique las caractersticas de las estrategias did...
 
10 healthy foods to fight vitamin d deficiency
10 healthy foods to fight vitamin d deficiency10 healthy foods to fight vitamin d deficiency
10 healthy foods to fight vitamin d deficiency
 
Pufa
PufaPufa
Pufa
 
Acuerdo Pedagógico Costos Standar
Acuerdo Pedagógico Costos StandarAcuerdo Pedagógico Costos Standar
Acuerdo Pedagógico Costos Standar
 

Similar to LetterforNate

Singh Navjot Recommendation Letter
Singh Navjot Recommendation LetterSingh Navjot Recommendation Letter
Singh Navjot Recommendation LetterNavjot Singh
 
Jamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder
 
IT Network Support
IT Network Support IT Network Support
IT Network Support DrPanetto
 
Andraie Lewis Resume
Andraie Lewis ResumeAndraie Lewis Resume
Andraie Lewis Resumeandraie lewis
 
Trevan reese-resume-fall2020-lo rs
Trevan reese-resume-fall2020-lo rsTrevan reese-resume-fall2020-lo rs
Trevan reese-resume-fall2020-lo rsTrevanReese
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Letter of Recommendation
Letter of RecommendationLetter of Recommendation
Letter of RecommendationNathaniel Mello
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
ProfessorLetterofRec
ProfessorLetterofRecProfessorLetterofRec
ProfessorLetterofRecEffie McEntee
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele
 
Information Security Manager
Information Security ManagerInformation Security Manager
Information Security ManagerSharon Smorenburg
 
Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Fan Liang
 
Swoolsey-LetterOfReq
Swoolsey-LetterOfReqSwoolsey-LetterOfReq
Swoolsey-LetterOfReqSean Woolsey
 
School Technology Services Overview - Consultation and Information Sessions
School Technology Services Overview - Consultation and Information SessionsSchool Technology Services Overview - Consultation and Information Sessions
School Technology Services Overview - Consultation and Information SessionsAngie Tarasoff
 
Internet Engineer cv 1
Internet Engineer cv 1Internet Engineer cv 1
Internet Engineer cv 1Jonathan CJ
 

Similar to LetterforNate (20)

Singh Navjot Recommendation Letter
Singh Navjot Recommendation LetterSingh Navjot Recommendation Letter
Singh Navjot Recommendation Letter
 
Portfolio
Portfolio Portfolio
Portfolio
 
Resume2016
Resume2016Resume2016
Resume2016
 
Jamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder's Resume
Jamie Schroeder's Resume
 
IT Network Support
IT Network Support IT Network Support
IT Network Support
 
recommendationYejiaWu
recommendationYejiaWurecommendationYejiaWu
recommendationYejiaWu
 
Andraie Lewis Resume
Andraie Lewis ResumeAndraie Lewis Resume
Andraie Lewis Resume
 
Trevan reese-resume-fall2020-lo rs
Trevan reese-resume-fall2020-lo rsTrevan reese-resume-fall2020-lo rs
Trevan reese-resume-fall2020-lo rs
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Letter of Recommendation
Letter of RecommendationLetter of Recommendation
Letter of Recommendation
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
ProfessorLetterofRec
ProfessorLetterofRecProfessorLetterofRec
ProfessorLetterofRec
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security Expert
 
Information Security Manager
Information Security ManagerInformation Security Manager
Information Security Manager
 
Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014
 
Manal MubarakCV
Manal MubarakCVManal MubarakCV
Manal MubarakCV
 
Swoolsey-LetterOfReq
Swoolsey-LetterOfReqSwoolsey-LetterOfReq
Swoolsey-LetterOfReq
 
School Technology Services Overview - Consultation and Information Sessions
School Technology Services Overview - Consultation and Information SessionsSchool Technology Services Overview - Consultation and Information Sessions
School Technology Services Overview - Consultation and Information Sessions
 
Internet Engineer cv 1
Internet Engineer cv 1Internet Engineer cv 1
Internet Engineer cv 1
 
It resume
It resumeIt resume
It resume
 

LetterforNate

  • 1. Information Technology 12/7/2015 I was Nate Mello’s professor for his eight week capstone class in the Cybersecurity management program for Bay Path University. In this course students experienced a capture the flag exercise, taking turns attacking and defending a server. I am pleased to recommend Nate for the cybersecurity profession. Nate was engaged early and often in the class. He demonstrated a good work ethic and attention to detail. Nate was a good team member, and helped his fellow students get up to speed. Nate also played a very important role in the class. When on the defending team, Nate identified the source of an intrusion before any other student. When on the attacking team, Nate correctly found a vulnerability and successfully exploited that vulnerability to gain access into the target server. I am recommending Nate because I think he has a strong desire to learn and grow in the cyber security profession. I think he has some of the communication skills necessary to be a good team player, and the attention to detail to help him be successful in the cybersecurity field. Regards, Brian Basgen Executive Director of IT Bay Path University 413-565-6833 bbasgen@baypath.edu   Page 1 of 1