SlideShare a Scribd company logo
1 of 16
Cyber Security
A Beginner's Guide
By RR Group & Kolte Training Center
Index Cyber Security Introduction
 Overview & Introduction
 Industry Applications & Trends
 Key Terminologies
Key Points
 Is Cyber Security a Good Career Option.
 Key Skills Needed to be in Cyber Security
 Types of Cyber Security Roles
Depth Guide
 Salary Per Role In Industry
 Certifications Needed For Each Role
 Our Guidance
O v e r v i e w
 Cybersecurity is the protection of
internet-connected systems such as
hardware, software and data from
cyberthreats. The practice is used by
individuals and enterprises to
protect against unauthorized access
to data centers and other
computerized systems.
 It sounds like something out of a
movie, but unfortunately, it’s a
common occurrence in today’s online
landscape. This is why Cyber
Security has become such a vital
part of any business strategy—and
Cyber Security specialists are in
demand now more than ever.
Introduction
 Cybersecurity is the protection of
internet-connected systems such as
hardware, software and data from
cyberthreats. The practice is used by
individuals and enterprises to protect
against unauthorized access to data
centers and other computerized systems.
 With an increasing number of users,
devices and programs in the modern
enterprise, combined with the increased
deluge of data -- much of which is
sensitive or confidential -- the
importance of cybersecurity continues to
grow. The growing volume and
sophistication of cyber attackers and
attack techniques compound the
problem even further.
Key Applications
The important applications of cyber security
are as follows:
 Access Control: In this application,
authentication, authorization, and
monitoring are focused
 Telecommunications and Network
Security: Information and
communication confidentially are
protected.
 Information Security Governance and
Risk Management: This application of
cyber security deals with risk
management, security governance, data
integrity, security education, and risk
analysis.
Key Applications
The important applications of cyber security
are as follows:
 Software Development Security:
Identification of software defects during
development and ensuring that policies
are addressed and regulatory
requirements are maintained.
 Cryptography: Encryption of sensitive
information and decryption of this
information for the authorized people.
 Legal, Regulations, Investigations, and
Compliance: The investigation of
suspicious events and legal protocols.
Regulation maintenance and compliance.
Key Trends in
I n d u s t r y
 The global cyber security market size
was valued at $197.36 billion in 2020,
and is projected to reach $478.68 billion
by 2030, growing at a CAGR of 9.5%
from 2021 to 2030.
Trends In Cyber Security
 Rise of Automotive Hacking.
 Potential of Artificial Intelligence (AI)
 Mobile is the New Target.
 Cloud is Also Potentially Vulnerable.
 Data Breaches
Is Cybersecurity a
G o o d C a r e e r ?
 The U.S. Bureau of Labor Statistics
estimates that the employment of
information security analysts will
grow 310 percent from 2021 to
2029. In comparison, the average
growth rate for all other occupations
is nearly 160 percent higher .
 The field of cybersecurity offers
plenty of variety. Businesses across
all industries – from healthcare and
finance to entertainment and retail
– face cybersecurity challenges, so
there are opportunities in countless
fields and disciplines.
C y b e r s e c u r i t y
C a r e e r P a t h
 Depending on your experience level,
you may consider the following
cybersecurity jobs:
 Entry-level: Systems Administrator,
Network Engineer, Network
Administrator, Security
Administrator
 Mid-level: Cybersecurity Analyst,
Penetration Tester, Security
Technician, IT Auditor
 Senior-level: Cybersecurity Manager,
Cybersecurity Engineer, Chief
Information Security Officer
Key Skills Needed
to be in Industry
 A bachelor's degree in engineering
or CS or A master's degree
 Proven skills in security testing and
auditing and security risk
management
 Cybersecurity leadership
 Cryptology
 Knowledge of government and
national security Network security
 Privacy engineering
 Problem-solving skills
 Analytical skill
 Technical writing skills
 Coding
 Expertise in law
Cybersecurity
Job Titles
Position one can get in Industry
 Cybersecurity Analyst
 Cybersecurity Specialist
 Security Systems Administrator
 Chief Information Security Officer
 Forensic Computer Analyst
 Penetration Tester
 Security Architect
 Security Manager
 Information Security Analysts
 Security Engineer
 Cryptographer
 Security Consultant
Salary Per Job
Titles in Industry
 Systems Administrator - $79,990
 Programmer Analyst - $81,334
 Systems Analyst - $81,970
 Security Analyst - $92,552
 Network Engineer - $100,000
 Security Engineer - $119,981
 Chief Information Security Officer -
$230,801
Top Certifications
in the Industry
 Certifications needed in the Industry
 Certified Information Systems Security
Professional (CISSP)
 Certified Information Systems
Auditor (CISA)
 Certified Information Security Manager
(CISM)
 Certified Ethical Hacker (CEH)
 GIAC Security Essentials Certification
(GSEC)
 Systems Security Certified Practitioner
(SSCP)
 Offensive Security Certified
Professional (OSCP)
Top Certifications
in the Industry
EC Council Certifications
 CSCU - Certified Secure Computer User
 ECSS - EC-Council Certified Security
Specialist
 ECES - EC-Council Certified
Encryption Specialist
 CND - Certified Network Defender
 CPENT – Certified Penetration
Testing Professional
 CTIA - Certified Threat Intelligence
Analyst
 ECIH - EC-Council Certified Incident
Handler
 CHFI - Computer Hacking Forensic
Investigator
Top Certifications
in the Industry
EC Council Certifications
 CSA - EC-Council Certified SOC
Analyst
 EDRP - EC-Council Disaster
Recovery Professional
 CASE Java - Certified Application
Security Engineer Java
 CASE .Net - Certified Application
Security Engineer .Net
 LPT - Licensed Penetration Tester
 CEH Master
Thank You

More Related Content

What's hot

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

What's hot (20)

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information security
Information securityInformation security
Information security
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Similar to Cyber Security Seminar.pptx

02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 

Similar to Cyber Security Seminar.pptx (20)

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontier
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Cyber Security Seminar.pptx

  • 1. Cyber Security A Beginner's Guide By RR Group & Kolte Training Center
  • 2. Index Cyber Security Introduction  Overview & Introduction  Industry Applications & Trends  Key Terminologies Key Points  Is Cyber Security a Good Career Option.  Key Skills Needed to be in Cyber Security  Types of Cyber Security Roles Depth Guide  Salary Per Role In Industry  Certifications Needed For Each Role  Our Guidance
  • 3. O v e r v i e w  Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  It sounds like something out of a movie, but unfortunately, it’s a common occurrence in today’s online landscape. This is why Cyber Security has become such a vital part of any business strategy—and Cyber Security specialists are in demand now more than ever.
  • 4. Introduction  Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  With an increasing number of users, devices and programs in the modern enterprise, combined with the increased deluge of data -- much of which is sensitive or confidential -- the importance of cybersecurity continues to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.
  • 5. Key Applications The important applications of cyber security are as follows:  Access Control: In this application, authentication, authorization, and monitoring are focused  Telecommunications and Network Security: Information and communication confidentially are protected.  Information Security Governance and Risk Management: This application of cyber security deals with risk management, security governance, data integrity, security education, and risk analysis.
  • 6. Key Applications The important applications of cyber security are as follows:  Software Development Security: Identification of software defects during development and ensuring that policies are addressed and regulatory requirements are maintained.  Cryptography: Encryption of sensitive information and decryption of this information for the authorized people.  Legal, Regulations, Investigations, and Compliance: The investigation of suspicious events and legal protocols. Regulation maintenance and compliance.
  • 7. Key Trends in I n d u s t r y  The global cyber security market size was valued at $197.36 billion in 2020, and is projected to reach $478.68 billion by 2030, growing at a CAGR of 9.5% from 2021 to 2030. Trends In Cyber Security  Rise of Automotive Hacking.  Potential of Artificial Intelligence (AI)  Mobile is the New Target.  Cloud is Also Potentially Vulnerable.  Data Breaches
  • 8. Is Cybersecurity a G o o d C a r e e r ?  The U.S. Bureau of Labor Statistics estimates that the employment of information security analysts will grow 310 percent from 2021 to 2029. In comparison, the average growth rate for all other occupations is nearly 160 percent higher .  The field of cybersecurity offers plenty of variety. Businesses across all industries – from healthcare and finance to entertainment and retail – face cybersecurity challenges, so there are opportunities in countless fields and disciplines.
  • 9. C y b e r s e c u r i t y C a r e e r P a t h  Depending on your experience level, you may consider the following cybersecurity jobs:  Entry-level: Systems Administrator, Network Engineer, Network Administrator, Security Administrator  Mid-level: Cybersecurity Analyst, Penetration Tester, Security Technician, IT Auditor  Senior-level: Cybersecurity Manager, Cybersecurity Engineer, Chief Information Security Officer
  • 10. Key Skills Needed to be in Industry  A bachelor's degree in engineering or CS or A master's degree  Proven skills in security testing and auditing and security risk management  Cybersecurity leadership  Cryptology  Knowledge of government and national security Network security  Privacy engineering  Problem-solving skills  Analytical skill  Technical writing skills  Coding  Expertise in law
  • 11. Cybersecurity Job Titles Position one can get in Industry  Cybersecurity Analyst  Cybersecurity Specialist  Security Systems Administrator  Chief Information Security Officer  Forensic Computer Analyst  Penetration Tester  Security Architect  Security Manager  Information Security Analysts  Security Engineer  Cryptographer  Security Consultant
  • 12. Salary Per Job Titles in Industry  Systems Administrator - $79,990  Programmer Analyst - $81,334  Systems Analyst - $81,970  Security Analyst - $92,552  Network Engineer - $100,000  Security Engineer - $119,981  Chief Information Security Officer - $230,801
  • 13. Top Certifications in the Industry  Certifications needed in the Industry  Certified Information Systems Security Professional (CISSP)  Certified Information Systems Auditor (CISA)  Certified Information Security Manager (CISM)  Certified Ethical Hacker (CEH)  GIAC Security Essentials Certification (GSEC)  Systems Security Certified Practitioner (SSCP)  Offensive Security Certified Professional (OSCP)
  • 14. Top Certifications in the Industry EC Council Certifications  CSCU - Certified Secure Computer User  ECSS - EC-Council Certified Security Specialist  ECES - EC-Council Certified Encryption Specialist  CND - Certified Network Defender  CPENT – Certified Penetration Testing Professional  CTIA - Certified Threat Intelligence Analyst  ECIH - EC-Council Certified Incident Handler  CHFI - Computer Hacking Forensic Investigator
  • 15. Top Certifications in the Industry EC Council Certifications  CSA - EC-Council Certified SOC Analyst  EDRP - EC-Council Disaster Recovery Professional  CASE Java - Certified Application Security Engineer Java  CASE .Net - Certified Application Security Engineer .Net  LPT - Licensed Penetration Tester  CEH Master