SlideShare a Scribd company logo
CAREER
GUIDANCE ON
CYBER
SECURITY
ADAM
#WHOAMI
2
4+ Experience in cyber security
Worked for 150+ projects in
various aspects of cyber security
Have 50+ hall of fames
Independent Consultant
Foss Activist in VGLUG
Bike rider
TOPICS
3
• Define Cybersecurity
• Define Pivoting
• Demand for Cybersecurity Professionals
• Cybersecurity Fields & Careers
• Technical, Physical, and Administrative Controls
• You May Already Be Involved in Cybersecurity
• Training Resources
• Certifications
• Networking
• Professional Reading
• Resumes & Applicant Tracking Systems
WHAT IS
CYBERSECURITY?
4
• Cybersecurity encompasses a broad range of practices, tools and
concepts related closely to those of information and operational
technology security. Cybersecurity is distinctive in its inclusion of the
offensive use of information technology to attack adversaries.“
Gartner “Definition: Cybersecurity”, 07 June 2013
• "Measures taken to protect a computer or computer system (as on
the Internet) against unauthorized access or attack.“
Merriam-Webster
https://www.merriam-webster.com/dictionary/cybersecurity
WHAT IS
PIVOTING?
5
• Pivoting is the exclusive method of using an instance also known by
‘foothold’ to be able to “move” from place to place inside the
compromised network. It uses the first compromised system
foothold to allow us to compromise other devices and servers that
are otherwise inaccessible directly.
https://resources.infosecinstitute.com/pivoting-exploit-system-
another-network/
DEMAND FOR
CYBERSECURITY PROFESSIONALS
6
• Demand for Cybersecurity Talent Soars, Study Finds
– 25 percent gap between demands for cyber talent and qualified workforce
– Predicts a shortfall of 3.5 million cybersecurity professionals by2021
– Using existing talent
–Closing the gap with “new collar workers”
https://securityintelligence.com/news/demand-for-cybersecurity-talent-soars-study-finds/
• Demand for Cybersecurity Jobs Doubles Over Five Years, But Talent Gap
Remains
https://www.prnewswire.com/news-releases/demand-for-cybersecurity-jobs-
doubles-over-five-years-but-talent-gap-remains-300874877.html
• The 10 highest-paying cybersecurity jobs
https://www.techrepublic.com/article/the-10-highest-paying-cybersecurity-jobs/
CYBERSECURITY FIELDS
7
CYBERSECURITY FIELDS
8
CAREERS IN
CYBERSECURITY
9
• SecurityAnalyst
• SecurityArchitect
• Security Software Developer
• Security Systems Engineer
• SecurityAdministrator
• Security Consultant
• Forensics Examiner
• Penetration Tester
• Cryptographer
• Cryptanalyst
• Information System Security
Manager
• Sales
• QualityAssurance
• Law
• Insurance
References:
“Learn How to Become”
https://www.learnhowtobecome.org/computer-careers/cyber-security/
“Cyber Security Jobs: Opportunities for Non-Technical Professionals”
https://onlinedegrees.sandiego.edu/non-technical-cyber-security-jobs/
“Getting Started in Cybersecurity with a Non-Technical Background”
https://www.sans.org/security-awareness-training/blog/getting-
started-cybersecurity-non-technical-background
TECHNICAL, ADMINISTRATIVE, AND
PHYSICAL CONTROLS
• Technical - Hardware or Software Solutions
– Firewalls
– Intrusion Detection or Prevention Systems (IDS / IPS)
– BiometricAuthentication
– Permissions
– Auditing
• Administrative – implemented with policies and procedures
– Fulfill legal requirements
• Customer Privacy
– Password Policy
• Length, Complexity, Frequency of Change
– UserAgreement
• Physical – protect assets from both hackers and traditional
threats https://www.asisonline.org
10
– Guards
– Locks
– Cameras
– Fire Protection
Oriyano, S. (2014) Hacker Techniques,
Tools, and Incident Handling, 2nd Edition,
Burlington, MA: Jones & Bartlett Learning
YOU MAY ALREADY BE
INVOLVED IN CYBERSECURITY!
11
• Most computer vulnerabilities can be traced to:
– Poorly implemented software
• Failure to sanitize inputs
– Incorrectly administered systems
• Failure to disable inactive user accounts
– Poorly designed systems
• Meltdown and Spectre
– Poor “cyber hygiene”
• Lack of patch updates
If your job involves designing or administering information systems
or developing software, you are effectively supporting cybersecurity
efforts.
CYBERSECURITY
TRAINING
12
• College Degree versus Technical Certification
• Many, but not all, positions require a four year degree
• However, an additional degree may not be the best route to transition to cybersecurity
– Depends on your original degree
– Video: Success in the New Economy
https://vimeo.com/67277269
• National Centers of Academic Excellence in Cyber Defense 2-Year Education
(CAE-2Y)
https://www.iad.gov/NIETP/reports/cae_designated_institutions.cfm#C
• There are three community colleges in Southern California with this designation
– Coastline, Cypress, and Long Beach City College
• There are also four 4-year colleges in the area with the CAE designation
– Cal Poly Pomona, CSUSB, UCI , Webster University
• Many positions also require specific certifications
– e.g. Personnel administering DoD systems require the CompTIA Security+
certification at a minimum
Technical training & certifications can provide you with the needed skills faster
TRAINING RESOURCES
FOR VETERANS
13
• FedVTE
The Federal Virtual Training Environment (FedVTE) provides free online
cybersecurity training to U.S. government employees, Federal contractors,
and veterans.
https://fedvte.usalearning.gov/
• Splunk Pledge (Veterans and other groups)
https://workplus.splunk.com/
• AWS Educate (Veterans)
https://aws.amazon.com/education/awseducate/veterans/
• LinkedIn for Veterans
– Free one year Premium Careers subscription, including access to
LinkedIn Learning
https://www.linkedin.com/help/linkedin/answer/14803/linkedin-for-
veterans-free-premium-career-subscription-and-eligibility?lang=en
CYBERSECURITY
CERTIFICATIONS
14
• Purpose is to demonstrate a minimum set of skills
• Many positions also require specific certifications
– e.g. Personnel administering DoD systems require at a minimum the CompTIASecurity+
certification
• Search career websites for the certifications
– Dice
– Indeed
– Monster
CYBER WORKFORCE
MANAGEMENT PROGRAM
15
• Cyber Workforce Management Program
DoDD 8140.01 & DoD 8570.01-m for DoD related programs
• Applies to DoD and Contractors
• Positions dictate which certifications are required
https://public.cyber.mil/cwmp/dod-approved-8570-baseline-certifications/
https://public.cyber.mil/cwmp/
COMPTIA
CERTIFICATIONS
16
• Security+
• Network+
• Cybersecurity Analyst (CySA+)
• Advanced Security Practitioner
• Pentest
• Linux+
• Cloud+
https://certification.comptia.org/certifications
https://www.businessnewsdaily.com/10718-comptia-certification-
guide.html
Note: Many of these certifications can be obtained at low cost
through your local community college
INTERNATIONAL INFORMATION
SYSTEMS SECURITY CERTIFICATION
CONSORTIUM (ISC2)
17
• Certified Information Systems Security Professional (CISSP)
– One of the most widely recognized cybersecurity certifications
– Tests security-related managerial skills
• Usually more concerned with policies and procedures
– Requires that you demonstrate five years of professional experience
• Reduced to 4 years if you have a Bachelor’s degree
• Can receive the CISSA if you pass the CISSP exam but do not have
sufficient experience
• Certified Secure Software Lifecycle Professional (CSSLP)
• Several other certifications also offered
• Web site:
– https://www.isc2.org/
– https://www.isc2.org/credentials/default.aspx
SANS
INSTITUTE
18
• Highly technical and hands-on training
– Learn today and apply tomorrow philosophy
• SysAdmin, Audit, Network, Security (SANS) Institute
– Offers training and over 20 certifications through Global Information
Assurance Certification (GIAC)
http://www.giac.org/certifications/get-certified/roadmap
– Also offers Master’s Degrees and Certificates in Cyber Security
http://www.sans.edu/
• Top 20 Critical Controls
– One of the most popular SANS Institute documents
– Details most common network exploits
– Suggests ways of correcting vulnerabilities
http://www.sans.org/security-resources/
• Join the SANS.org community to subscribe to NewsBites & receive
free posters https://www.sans.org/account/create
SANS CYBERTALENT
IMMERSION ACADEMIES
19
• An intensive, accelerated training program that provides SANS world class training
and GIAC certifications to quickly and effectively launch careers in cybersecurity
• 100% scholarship-based and no cost to participants
• VetSuccess - open to transitioning veterans and those transitioned in the last five
years and not currently working in cybersecurity in a civilian role.
• Women's Academy - this Academy is open to career-changers and college seniors
with a background in IT, but not currently working in cybersecurity roles.
• Cyber Workforce Academy - these Academies are made possible by grants,
sponsors and organizations looking to hire cybersecurity talent or help advance the
field by bringing in new talent. Academy eligibility requirements and curricula will be
based on the specific focus and needs of the sponsors.
• Diversity Cyber Academy - SANS and International Consortium of Minority
Cybersecurity Professionals (ICMCP) are partnering to create the SANS - ICMCP:
Diversity Cyber Academy - DCA, combining efforts to increase the career
opportunities for minorities and women in the cybersecurity field.
https://www.sans.org/cybertalent/seekers
EC-COUNCIL
20
• International Council of Electronic Commerce Consultants
(EC-Council)
• Organization’s most recognized certification is the
Certified Ethical Hacker (CEH)
– Current certification is CEH v10
– Based on 20 domains (subject areas)
• Also offers other certifications
– Forensic Investigator, Application Security Engineer
• BS and MS in Cyber Security
https://www.eccouncil.org/
OFFENSIVE
SECURITY
21
• Creators of Kali Linux
• Penetration Testing and IT Security Training & Certifications
• Offensive Security Certified Professional (OSCP)
• Offensive Security Certified Expert (OSCE)
• Offensive Security Certified Web Expert (OSWE)
• Offensive Security Certified Exploitation Expert (OSEE)
• Offensive Security Certified Wireless Professional (OSWP)
https://www.offensive-security.com/
EMPLOYER TRAINING & COLLABORATION
RESOURCES
22
• If you are currently employed, utilize available educational benefits and
training resources.
– Not just educational reimbursement programs
– Some companies offer access to resources such as lynda.com or degreed.com
• Collaborate – many companies have an internal version of LinkedIn
– Post your skills internally
– Join groups that are related to cybersecurity
• Find the cybersecurity personnel at your employer and ask them for advice
– They’re typically really friendly people!
Pivot to a cyber security position with your current employer
OTHER TRAINING
RESOURCES
23
• LinkedIn Learning (formerly Lynda.com)
– Paid subscription
https://www.linkedin.com/learning/
– How to Access LinkedIn Learning for free through public libraries
– Possibly available through your school
• Cybrary - Free cybersecurity and IT training
https://www.cybrary.it/
• Splunk Pledge (Veterans and other groups)
https://workplus.splunk.com/
• Public Libraries
– LinkedIn Learning
– Access to online books
FOR THE MORE “EXPERIENCED”
WORKERS AMONG US…
24
• Stop throwing away those letters from AARP!
• How Older Workers Can Learn New Job Skills
https://www.aarp.org/work/job-search/info-2018/work-skills-resume-fd.html
• Learn@50+
https://learn.aarp.org/
• Poor Training, Lack of Skills Leave Older Workers Behind: Study
https://insights.dice.com/2019/07/02/skills-older-tech-professionals/
NETWORKING
25
• Invest in & market yourself
– Information System Security Association (ISSA) https://www.issa.org
– Open WebApplication Security Project (OWASP) https://www.owasp.org
– Women’s Society of Cyberjutsu (WSC) https://womenscyberjutsu.org/
– Women in Cyber Security https://www.wicys.org/
– Reverse Shell Corporation https://www.revshellcorp.org/
– Null Space Labs https://032.la/
– Search for local groups on http://meetup.com
• LETHAL, Null Space Labs
• Attend conferences
– DEF CON https://defcon.org
– BSides http://www.securitybsides.com
– Grace Hopper Celebration https://ghc.anitab.org/
– ShellCon https://shellcon.io
– LayerOne https://www.layerone.org/
– AppSec California https://2020.appseccalifornia.org/
PROFESSIONAL READING &
PODCASTS
26
• 7 Must-Read Blogs for Information Security Professionals
(Capella University)
https://www.capella.edu/blogs/cublog/top-blogs-for-infosec-
professionals/
• The Top Cyber Security Blogs and Websites of 2019
https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/
• SANS Internet Storm Center
https://isc.sans.edu/
• SANS Newsbites
https://www.sans.org/newsletters/newsbites/
• DoD Cyber Exchange – Public
https://public.cyber.mil/
A QUICK WORD ON RESUMES AND
APPLICANT TRACKING SYSTEMS
27
• Resumes
– An art form
– Everyone who reviews your resume will have a different opinion
– You should always have one ready
– Update it on a regular basis
• You should maintain your resume in two different formats
– Human readable for individuals and smaller companies
– Longer, more detailed resume for larger companies which utilize…
• Applicant Tracking Systems
– Resume is scanned and placed in a database
– Interviewers rarely see your original resume
– Database is searched on key words to find qualified applicants
• Use a website such as Jobscan (www.jobscan.co) to evaluate your resume
against a position description
– You will be surprised how poorly your resume scores
– Plural forms of words is a common problem (e.g. firewalls vs firewall)
TWITTER, READ,
AND WATCH
28
THANK YOU
@iam_amdadam
mohammedadam24

More Related Content

What's hot

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
Ben Boyd
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Splunk
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
Jorge Orchilles
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
Chandan Singh Ghodela
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
 

What's hot (20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 

Similar to Career Guidance on Cybersecurity by Mohammed Adam

Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
99X Technology
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
Nirosh Jayaratnam
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
Mercury Solutions Limited
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
APNIC
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
Rochester Security Summit
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
Pace IT at Edmonds Community College
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
Kushantha Gunawardana
 
EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career path
Kushantha Gunawardana
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
Joseph Holbrook, Chief Learning Officer (CLO)
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
infosecTrain
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
Infosec train
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
priyanshamadhwal2
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
priyanshamadhwal2
 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
InfosecTrain Education
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
Infosec train
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 

Similar to Career Guidance on Cybersecurity by Mohammed Adam (20)

Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career path
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
CompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training CourseCompTIA Security+ (Plus) Certification Training Course
CompTIA Security+ (Plus) Certification Training Course
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 

More from Mohammed Adam

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
Mohammed Adam
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
Mohammed Adam
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1
Mohammed Adam
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
Mohammed Adam
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
Mohammed Adam
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
Mohammed Adam
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
Mohammed Adam
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network Fundamentals
Mohammed Adam
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
Mohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
Mohammed Adam
 
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Mohammed Adam
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Mohammed Adam
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
Network Security
Network SecurityNetwork Security
Network Security
Mohammed Adam
 
Networking in Windows Operating System
Networking in Windows Operating SystemNetworking in Windows Operating System
Networking in Windows Operating System
Mohammed Adam
 

More from Mohammed Adam (20)

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network Fundamentals
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Internet security
Internet securityInternet security
Internet security
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Network Security
Network SecurityNetwork Security
Network Security
 
Networking in Windows Operating System
Networking in Windows Operating SystemNetworking in Windows Operating System
Networking in Windows Operating System
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Career Guidance on Cybersecurity by Mohammed Adam

  • 2. #WHOAMI 2 4+ Experience in cyber security Worked for 150+ projects in various aspects of cyber security Have 50+ hall of fames Independent Consultant Foss Activist in VGLUG Bike rider
  • 3. TOPICS 3 • Define Cybersecurity • Define Pivoting • Demand for Cybersecurity Professionals • Cybersecurity Fields & Careers • Technical, Physical, and Administrative Controls • You May Already Be Involved in Cybersecurity • Training Resources • Certifications • Networking • Professional Reading • Resumes & Applicant Tracking Systems
  • 4. WHAT IS CYBERSECURITY? 4 • Cybersecurity encompasses a broad range of practices, tools and concepts related closely to those of information and operational technology security. Cybersecurity is distinctive in its inclusion of the offensive use of information technology to attack adversaries.“ Gartner “Definition: Cybersecurity”, 07 June 2013 • "Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.“ Merriam-Webster https://www.merriam-webster.com/dictionary/cybersecurity
  • 5. WHAT IS PIVOTING? 5 • Pivoting is the exclusive method of using an instance also known by ‘foothold’ to be able to “move” from place to place inside the compromised network. It uses the first compromised system foothold to allow us to compromise other devices and servers that are otherwise inaccessible directly. https://resources.infosecinstitute.com/pivoting-exploit-system- another-network/
  • 6. DEMAND FOR CYBERSECURITY PROFESSIONALS 6 • Demand for Cybersecurity Talent Soars, Study Finds – 25 percent gap between demands for cyber talent and qualified workforce – Predicts a shortfall of 3.5 million cybersecurity professionals by2021 – Using existing talent –Closing the gap with “new collar workers” https://securityintelligence.com/news/demand-for-cybersecurity-talent-soars-study-finds/ • Demand for Cybersecurity Jobs Doubles Over Five Years, But Talent Gap Remains https://www.prnewswire.com/news-releases/demand-for-cybersecurity-jobs- doubles-over-five-years-but-talent-gap-remains-300874877.html • The 10 highest-paying cybersecurity jobs https://www.techrepublic.com/article/the-10-highest-paying-cybersecurity-jobs/
  • 9. CAREERS IN CYBERSECURITY 9 • SecurityAnalyst • SecurityArchitect • Security Software Developer • Security Systems Engineer • SecurityAdministrator • Security Consultant • Forensics Examiner • Penetration Tester • Cryptographer • Cryptanalyst • Information System Security Manager • Sales • QualityAssurance • Law • Insurance References: “Learn How to Become” https://www.learnhowtobecome.org/computer-careers/cyber-security/ “Cyber Security Jobs: Opportunities for Non-Technical Professionals” https://onlinedegrees.sandiego.edu/non-technical-cyber-security-jobs/ “Getting Started in Cybersecurity with a Non-Technical Background” https://www.sans.org/security-awareness-training/blog/getting- started-cybersecurity-non-technical-background
  • 10. TECHNICAL, ADMINISTRATIVE, AND PHYSICAL CONTROLS • Technical - Hardware or Software Solutions – Firewalls – Intrusion Detection or Prevention Systems (IDS / IPS) – BiometricAuthentication – Permissions – Auditing • Administrative – implemented with policies and procedures – Fulfill legal requirements • Customer Privacy – Password Policy • Length, Complexity, Frequency of Change – UserAgreement • Physical – protect assets from both hackers and traditional threats https://www.asisonline.org 10 – Guards – Locks – Cameras – Fire Protection Oriyano, S. (2014) Hacker Techniques, Tools, and Incident Handling, 2nd Edition, Burlington, MA: Jones & Bartlett Learning
  • 11. YOU MAY ALREADY BE INVOLVED IN CYBERSECURITY! 11 • Most computer vulnerabilities can be traced to: – Poorly implemented software • Failure to sanitize inputs – Incorrectly administered systems • Failure to disable inactive user accounts – Poorly designed systems • Meltdown and Spectre – Poor “cyber hygiene” • Lack of patch updates If your job involves designing or administering information systems or developing software, you are effectively supporting cybersecurity efforts.
  • 12. CYBERSECURITY TRAINING 12 • College Degree versus Technical Certification • Many, but not all, positions require a four year degree • However, an additional degree may not be the best route to transition to cybersecurity – Depends on your original degree – Video: Success in the New Economy https://vimeo.com/67277269 • National Centers of Academic Excellence in Cyber Defense 2-Year Education (CAE-2Y) https://www.iad.gov/NIETP/reports/cae_designated_institutions.cfm#C • There are three community colleges in Southern California with this designation – Coastline, Cypress, and Long Beach City College • There are also four 4-year colleges in the area with the CAE designation – Cal Poly Pomona, CSUSB, UCI , Webster University • Many positions also require specific certifications – e.g. Personnel administering DoD systems require the CompTIA Security+ certification at a minimum Technical training & certifications can provide you with the needed skills faster
  • 13. TRAINING RESOURCES FOR VETERANS 13 • FedVTE The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to U.S. government employees, Federal contractors, and veterans. https://fedvte.usalearning.gov/ • Splunk Pledge (Veterans and other groups) https://workplus.splunk.com/ • AWS Educate (Veterans) https://aws.amazon.com/education/awseducate/veterans/ • LinkedIn for Veterans – Free one year Premium Careers subscription, including access to LinkedIn Learning https://www.linkedin.com/help/linkedin/answer/14803/linkedin-for- veterans-free-premium-career-subscription-and-eligibility?lang=en
  • 14. CYBERSECURITY CERTIFICATIONS 14 • Purpose is to demonstrate a minimum set of skills • Many positions also require specific certifications – e.g. Personnel administering DoD systems require at a minimum the CompTIASecurity+ certification • Search career websites for the certifications – Dice – Indeed – Monster
  • 15. CYBER WORKFORCE MANAGEMENT PROGRAM 15 • Cyber Workforce Management Program DoDD 8140.01 & DoD 8570.01-m for DoD related programs • Applies to DoD and Contractors • Positions dictate which certifications are required https://public.cyber.mil/cwmp/dod-approved-8570-baseline-certifications/ https://public.cyber.mil/cwmp/
  • 16. COMPTIA CERTIFICATIONS 16 • Security+ • Network+ • Cybersecurity Analyst (CySA+) • Advanced Security Practitioner • Pentest • Linux+ • Cloud+ https://certification.comptia.org/certifications https://www.businessnewsdaily.com/10718-comptia-certification- guide.html Note: Many of these certifications can be obtained at low cost through your local community college
  • 17. INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM (ISC2) 17 • Certified Information Systems Security Professional (CISSP) – One of the most widely recognized cybersecurity certifications – Tests security-related managerial skills • Usually more concerned with policies and procedures – Requires that you demonstrate five years of professional experience • Reduced to 4 years if you have a Bachelor’s degree • Can receive the CISSA if you pass the CISSP exam but do not have sufficient experience • Certified Secure Software Lifecycle Professional (CSSLP) • Several other certifications also offered • Web site: – https://www.isc2.org/ – https://www.isc2.org/credentials/default.aspx
  • 18. SANS INSTITUTE 18 • Highly technical and hands-on training – Learn today and apply tomorrow philosophy • SysAdmin, Audit, Network, Security (SANS) Institute – Offers training and over 20 certifications through Global Information Assurance Certification (GIAC) http://www.giac.org/certifications/get-certified/roadmap – Also offers Master’s Degrees and Certificates in Cyber Security http://www.sans.edu/ • Top 20 Critical Controls – One of the most popular SANS Institute documents – Details most common network exploits – Suggests ways of correcting vulnerabilities http://www.sans.org/security-resources/ • Join the SANS.org community to subscribe to NewsBites & receive free posters https://www.sans.org/account/create
  • 19. SANS CYBERTALENT IMMERSION ACADEMIES 19 • An intensive, accelerated training program that provides SANS world class training and GIAC certifications to quickly and effectively launch careers in cybersecurity • 100% scholarship-based and no cost to participants • VetSuccess - open to transitioning veterans and those transitioned in the last five years and not currently working in cybersecurity in a civilian role. • Women's Academy - this Academy is open to career-changers and college seniors with a background in IT, but not currently working in cybersecurity roles. • Cyber Workforce Academy - these Academies are made possible by grants, sponsors and organizations looking to hire cybersecurity talent or help advance the field by bringing in new talent. Academy eligibility requirements and curricula will be based on the specific focus and needs of the sponsors. • Diversity Cyber Academy - SANS and International Consortium of Minority Cybersecurity Professionals (ICMCP) are partnering to create the SANS - ICMCP: Diversity Cyber Academy - DCA, combining efforts to increase the career opportunities for minorities and women in the cybersecurity field. https://www.sans.org/cybertalent/seekers
  • 20. EC-COUNCIL 20 • International Council of Electronic Commerce Consultants (EC-Council) • Organization’s most recognized certification is the Certified Ethical Hacker (CEH) – Current certification is CEH v10 – Based on 20 domains (subject areas) • Also offers other certifications – Forensic Investigator, Application Security Engineer • BS and MS in Cyber Security https://www.eccouncil.org/
  • 21. OFFENSIVE SECURITY 21 • Creators of Kali Linux • Penetration Testing and IT Security Training & Certifications • Offensive Security Certified Professional (OSCP) • Offensive Security Certified Expert (OSCE) • Offensive Security Certified Web Expert (OSWE) • Offensive Security Certified Exploitation Expert (OSEE) • Offensive Security Certified Wireless Professional (OSWP) https://www.offensive-security.com/
  • 22. EMPLOYER TRAINING & COLLABORATION RESOURCES 22 • If you are currently employed, utilize available educational benefits and training resources. – Not just educational reimbursement programs – Some companies offer access to resources such as lynda.com or degreed.com • Collaborate – many companies have an internal version of LinkedIn – Post your skills internally – Join groups that are related to cybersecurity • Find the cybersecurity personnel at your employer and ask them for advice – They’re typically really friendly people! Pivot to a cyber security position with your current employer
  • 23. OTHER TRAINING RESOURCES 23 • LinkedIn Learning (formerly Lynda.com) – Paid subscription https://www.linkedin.com/learning/ – How to Access LinkedIn Learning for free through public libraries – Possibly available through your school • Cybrary - Free cybersecurity and IT training https://www.cybrary.it/ • Splunk Pledge (Veterans and other groups) https://workplus.splunk.com/ • Public Libraries – LinkedIn Learning – Access to online books
  • 24. FOR THE MORE “EXPERIENCED” WORKERS AMONG US… 24 • Stop throwing away those letters from AARP! • How Older Workers Can Learn New Job Skills https://www.aarp.org/work/job-search/info-2018/work-skills-resume-fd.html • Learn@50+ https://learn.aarp.org/ • Poor Training, Lack of Skills Leave Older Workers Behind: Study https://insights.dice.com/2019/07/02/skills-older-tech-professionals/
  • 25. NETWORKING 25 • Invest in & market yourself – Information System Security Association (ISSA) https://www.issa.org – Open WebApplication Security Project (OWASP) https://www.owasp.org – Women’s Society of Cyberjutsu (WSC) https://womenscyberjutsu.org/ – Women in Cyber Security https://www.wicys.org/ – Reverse Shell Corporation https://www.revshellcorp.org/ – Null Space Labs https://032.la/ – Search for local groups on http://meetup.com • LETHAL, Null Space Labs • Attend conferences – DEF CON https://defcon.org – BSides http://www.securitybsides.com – Grace Hopper Celebration https://ghc.anitab.org/ – ShellCon https://shellcon.io – LayerOne https://www.layerone.org/ – AppSec California https://2020.appseccalifornia.org/
  • 26. PROFESSIONAL READING & PODCASTS 26 • 7 Must-Read Blogs for Information Security Professionals (Capella University) https://www.capella.edu/blogs/cublog/top-blogs-for-infosec- professionals/ • The Top Cyber Security Blogs and Websites of 2019 https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/ • SANS Internet Storm Center https://isc.sans.edu/ • SANS Newsbites https://www.sans.org/newsletters/newsbites/ • DoD Cyber Exchange – Public https://public.cyber.mil/
  • 27. A QUICK WORD ON RESUMES AND APPLICANT TRACKING SYSTEMS 27 • Resumes – An art form – Everyone who reviews your resume will have a different opinion – You should always have one ready – Update it on a regular basis • You should maintain your resume in two different formats – Human readable for individuals and smaller companies – Longer, more detailed resume for larger companies which utilize… • Applicant Tracking Systems – Resume is scanned and placed in a database – Interviewers rarely see your original resume – Database is searched on key words to find qualified applicants • Use a website such as Jobscan (www.jobscan.co) to evaluate your resume against a position description – You will be surprised how poorly your resume scores – Plural forms of words is a common problem (e.g. firewalls vs firewall)