![[Featured image] Coursera learner Donald Collins poses in a gray suit with a purple tie.](https://images.ctfassets.net/wp1lcwdav1p1/5bTkLIfVw0gios0STw5ixI/517c887bc7e0cb9b640bb8861af0f240/BC-4011_Donald-Collins_1500x680.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
Meet the IT Support Tech Advancing Toward a Cybersecurity Career
Deskside support tech Donald Collins arrived in the US from Jamaica just as the pandemic began. He chose to invest his time on Coursera and learn as much as he could.
December 7, 2024
Article

![[Featured Image] A group of cybersecurity professionals meet in a conference room to discuss creating a new penetration testing plan.](https://images.ctfassets.net/wp1lcwdav1p1/4W5OJp7Jg42SbCw2FAIfwi/1022d7667d3a69af16a24e0756f4b348/GettyImages-1626156976.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A college student uses different types of encryption on a laptop in a library.](https://images.ctfassets.net/wp1lcwdav1p1/7yzUitmzQUVJomZT3zEwOG/0917564dd191deeb25ff6167174302f7/GettyImages-143071328.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured Image] A computer networking professional is editing a program on the network server with edge computing.](https://images.ctfassets.net/wp1lcwdav1p1/7fS3BpxbLHCxeqsGb7TCZO/b51f9919ba7ec21d244e7253281ae0f7/GettyImages-597257862.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A man receiving a network technician salary is on a phone call while in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/3kuUjXSm7hlA8yjGi0qRe/91f2494b50cc07e6d09dfd58149ccee1/GettyImages-1334004080.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network analyst sits at a desk and uses a laptop to oversee their company's network operations.](https://images.ctfassets.net/wp1lcwdav1p1/7qGlLsEt2jUKBiE2v5101X/1f38d15c7fe5b2989cac78577db434a2/GettyImages-529793821.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network technician is holding a laptop to troubleshoot a problem in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/14vkez8hD7lVlmH3aiw57b/a519fb731a6d08eb79bdaa7de6c6d6cc/GettyImages-1334003865.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network engineer explains Border Gateway Protocol to a new hire who will be working with the company’s internet data management team.](https://images.ctfassets.net/wp1lcwdav1p1/2OqCfKyjK2VSgnA3Gmlwrr/02f46a44d5e132f8b2dd36ece3c7503a/GettyImages-498573129.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A biologist holds a molecular model as he studies complex networks.](https://images.ctfassets.net/wp1lcwdav1p1/6SvyCYRyYD997CfPbUejnv/87f27911229b06bd1e6d599ec06f42cb/GettyImages-168166241.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] Two cybersecurity analysts sit in front of a computer monitor with code on the screen in a bright office.](https://images.ctfassets.net/wp1lcwdav1p1/17kv9Gt5hsV5GyPmTqJjix/c8085f74105e6fc4a6b362e34865ba2b/GettyImages-2028997753.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network manager is at a computer in an office updating new software.](https://images.ctfassets.net/wp1lcwdav1p1/p6otI6BU33KaNZzuZOMUY/dd56f5a89990b86d24003d47a5e5a416/GettyImages-514408465.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Two people work on computers, one on a laptop sitting on a couch in the background and the other on a desktop in the foreground, transmitting data online thanks in part to the transport layer.](https://images.ctfassets.net/wp1lcwdav1p1/6oGZd3R1jHRAHjwnYePlud/694551b5771fff6406c295429178d738/GettyImages-1313131469__1_.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
