SlideShare a Scribd company logo
1 of 16
Cyber Security
A Beginner's Guide
By RR Group & Kolte Training Center
Index Cyber Security Introduction
 Overview & Introduction
 Industry Applications & Trends
 Key Terminologies
Key Points
 Is Cyber Security a Good Career Option.
 Key Skills Needed to be in Cyber Security
 Types of Cyber Security Roles
Depth Guide
 Salary Per Role In Industry
 Certifications Needed For Each Role
 Our Guidance
O v e r v i e w
 Cybersecurity is the protection of
internet-connected systems such as
hardware, software and data from
cyberthreats. The practice is used by
individuals and enterprises to
protect against unauthorized access
to data centers and other
computerized systems.
 It sounds like something out of a
movie, but unfortunately, it’s a
common occurrence in today’s online
landscape. This is why Cyber
Security has become such a vital
part of any business strategy—and
Cyber Security specialists are in
demand now more than ever.
Introduction
 Cybersecurity is the protection of
internet-connected systems such as
hardware, software and data from
cyberthreats. The practice is used by
individuals and enterprises to protect
against unauthorized access to data
centers and other computerized systems.
 With an increasing number of users,
devices and programs in the modern
enterprise, combined with the increased
deluge of data -- much of which is
sensitive or confidential -- the
importance of cybersecurity continues to
grow. The growing volume and
sophistication of cyber attackers and
attack techniques compound the
problem even further.
Key Applications
The important applications of cyber security
are as follows:
 Access Control: In this application,
authentication, authorization, and
monitoring are focused
 Telecommunications and Network
Security: Information and
communication confidentially are
protected.
 Information Security Governance and
Risk Management: This application of
cyber security deals with risk
management, security governance, data
integrity, security education, and risk
analysis.
Key Applications
The important applications of cyber security
are as follows:
 Software Development Security:
Identification of software defects during
development and ensuring that policies
are addressed and regulatory
requirements are maintained.
 Cryptography: Encryption of sensitive
information and decryption of this
information for the authorized people.
 Legal, Regulations, Investigations, and
Compliance: The investigation of
suspicious events and legal protocols.
Regulation maintenance and compliance.
Key Trends in
I n d u s t r y
 The global cyber security market size
was valued at $197.36 billion in 2020,
and is projected to reach $478.68 billion
by 2030, growing at a CAGR of 9.5%
from 2021 to 2030.
Trends In Cyber Security
 Rise of Automotive Hacking.
 Potential of Artificial Intelligence (AI)
 Mobile is the New Target.
 Cloud is Also Potentially Vulnerable.
 Data Breaches
Is Cybersecurity a
G o o d C a r e e r ?
 The U.S. Bureau of Labor Statistics
estimates that the employment of
information security analysts will
grow 310 percent from 2021 to
2029. In comparison, the average
growth rate for all other occupations
is nearly 160 percent higher .
 The field of cybersecurity offers
plenty of variety. Businesses across
all industries – from healthcare and
finance to entertainment and retail
– face cybersecurity challenges, so
there are opportunities in countless
fields and disciplines.
C y b e r s e c u r i t y
C a r e e r P a t h
 Depending on your experience level,
you may consider the following
cybersecurity jobs:
 Entry-level: Systems Administrator,
Network Engineer, Network
Administrator, Security
Administrator
 Mid-level: Cybersecurity Analyst,
Penetration Tester, Security
Technician, IT Auditor
 Senior-level: Cybersecurity Manager,
Cybersecurity Engineer, Chief
Information Security Officer
Key Skills Needed
to be in Industry
 A bachelor's degree in engineering
or CS or A master's degree
 Proven skills in security testing and
auditing and security risk
management
 Cybersecurity leadership
 Cryptology
 Knowledge of government and
national security Network security
 Privacy engineering
 Problem-solving skills
 Analytical skill
 Technical writing skills
 Coding
 Expertise in law
Cybersecurity
Job Titles
Position one can get in Industry
 Cybersecurity Analyst
 Cybersecurity Specialist
 Security Systems Administrator
 Chief Information Security Officer
 Forensic Computer Analyst
 Penetration Tester
 Security Architect
 Security Manager
 Information Security Analysts
 Security Engineer
 Cryptographer
 Security Consultant
Salary Per Job
Titles in Industry
 Systems Administrator - $79,990
 Programmer Analyst - $81,334
 Systems Analyst - $81,970
 Security Analyst - $92,552
 Network Engineer - $100,000
 Security Engineer - $119,981
 Chief Information Security Officer -
$230,801
Top Certifications
in the Industry
 Certifications needed in the Industry
 Certified Information Systems Security
Professional (CISSP)
 Certified Information Systems
Auditor (CISA)
 Certified Information Security Manager
(CISM)
 Certified Ethical Hacker (CEH)
 GIAC Security Essentials Certification
(GSEC)
 Systems Security Certified Practitioner
(SSCP)
 Offensive Security Certified
Professional (OSCP)
Top Certifications
in the Industry
EC Council Certifications
 CSCU - Certified Secure Computer User
 ECSS - EC-Council Certified Security
Specialist
 ECES - EC-Council Certified
Encryption Specialist
 CND - Certified Network Defender
 CPENT – Certified Penetration
Testing Professional
 CTIA - Certified Threat Intelligence
Analyst
 ECIH - EC-Council Certified Incident
Handler
 CHFI - Computer Hacking Forensic
Investigator
Top Certifications
in the Industry
EC Council Certifications
 CSA - EC-Council Certified SOC
Analyst
 EDRP - EC-Council Disaster
Recovery Professional
 CASE Java - Certified Application
Security Engineer Java
 CASE .Net - Certified Application
Security Engineer .Net
 LPT - Licensed Penetration Tester
 CEH Master
Thank You

More Related Content

What's hot

Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereouslySirris
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 

What's hot (20)

Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Application Security
Application SecurityApplication Security
Application Security
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
cyber security
cyber security cyber security
cyber security
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 

Similar to Cyber Security Seminar.pptx

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfsphinx Worldbiz
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfMax Secure Ltd
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 

Similar to Cyber Security Seminar.pptx (20)

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontier
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Cyber Security Seminar.pptx

  • 1. Cyber Security A Beginner's Guide By RR Group & Kolte Training Center
  • 2. Index Cyber Security Introduction  Overview & Introduction  Industry Applications & Trends  Key Terminologies Key Points  Is Cyber Security a Good Career Option.  Key Skills Needed to be in Cyber Security  Types of Cyber Security Roles Depth Guide  Salary Per Role In Industry  Certifications Needed For Each Role  Our Guidance
  • 3. O v e r v i e w  Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  It sounds like something out of a movie, but unfortunately, it’s a common occurrence in today’s online landscape. This is why Cyber Security has become such a vital part of any business strategy—and Cyber Security specialists are in demand now more than ever.
  • 4. Introduction  Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  With an increasing number of users, devices and programs in the modern enterprise, combined with the increased deluge of data -- much of which is sensitive or confidential -- the importance of cybersecurity continues to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.
  • 5. Key Applications The important applications of cyber security are as follows:  Access Control: In this application, authentication, authorization, and monitoring are focused  Telecommunications and Network Security: Information and communication confidentially are protected.  Information Security Governance and Risk Management: This application of cyber security deals with risk management, security governance, data integrity, security education, and risk analysis.
  • 6. Key Applications The important applications of cyber security are as follows:  Software Development Security: Identification of software defects during development and ensuring that policies are addressed and regulatory requirements are maintained.  Cryptography: Encryption of sensitive information and decryption of this information for the authorized people.  Legal, Regulations, Investigations, and Compliance: The investigation of suspicious events and legal protocols. Regulation maintenance and compliance.
  • 7. Key Trends in I n d u s t r y  The global cyber security market size was valued at $197.36 billion in 2020, and is projected to reach $478.68 billion by 2030, growing at a CAGR of 9.5% from 2021 to 2030. Trends In Cyber Security  Rise of Automotive Hacking.  Potential of Artificial Intelligence (AI)  Mobile is the New Target.  Cloud is Also Potentially Vulnerable.  Data Breaches
  • 8. Is Cybersecurity a G o o d C a r e e r ?  The U.S. Bureau of Labor Statistics estimates that the employment of information security analysts will grow 310 percent from 2021 to 2029. In comparison, the average growth rate for all other occupations is nearly 160 percent higher .  The field of cybersecurity offers plenty of variety. Businesses across all industries – from healthcare and finance to entertainment and retail – face cybersecurity challenges, so there are opportunities in countless fields and disciplines.
  • 9. C y b e r s e c u r i t y C a r e e r P a t h  Depending on your experience level, you may consider the following cybersecurity jobs:  Entry-level: Systems Administrator, Network Engineer, Network Administrator, Security Administrator  Mid-level: Cybersecurity Analyst, Penetration Tester, Security Technician, IT Auditor  Senior-level: Cybersecurity Manager, Cybersecurity Engineer, Chief Information Security Officer
  • 10. Key Skills Needed to be in Industry  A bachelor's degree in engineering or CS or A master's degree  Proven skills in security testing and auditing and security risk management  Cybersecurity leadership  Cryptology  Knowledge of government and national security Network security  Privacy engineering  Problem-solving skills  Analytical skill  Technical writing skills  Coding  Expertise in law
  • 11. Cybersecurity Job Titles Position one can get in Industry  Cybersecurity Analyst  Cybersecurity Specialist  Security Systems Administrator  Chief Information Security Officer  Forensic Computer Analyst  Penetration Tester  Security Architect  Security Manager  Information Security Analysts  Security Engineer  Cryptographer  Security Consultant
  • 12. Salary Per Job Titles in Industry  Systems Administrator - $79,990  Programmer Analyst - $81,334  Systems Analyst - $81,970  Security Analyst - $92,552  Network Engineer - $100,000  Security Engineer - $119,981  Chief Information Security Officer - $230,801
  • 13. Top Certifications in the Industry  Certifications needed in the Industry  Certified Information Systems Security Professional (CISSP)  Certified Information Systems Auditor (CISA)  Certified Information Security Manager (CISM)  Certified Ethical Hacker (CEH)  GIAC Security Essentials Certification (GSEC)  Systems Security Certified Practitioner (SSCP)  Offensive Security Certified Professional (OSCP)
  • 14. Top Certifications in the Industry EC Council Certifications  CSCU - Certified Secure Computer User  ECSS - EC-Council Certified Security Specialist  ECES - EC-Council Certified Encryption Specialist  CND - Certified Network Defender  CPENT – Certified Penetration Testing Professional  CTIA - Certified Threat Intelligence Analyst  ECIH - EC-Council Certified Incident Handler  CHFI - Computer Hacking Forensic Investigator
  • 15. Top Certifications in the Industry EC Council Certifications  CSA - EC-Council Certified SOC Analyst  EDRP - EC-Council Disaster Recovery Professional  CASE Java - Certified Application Security Engineer Java  CASE .Net - Certified Application Security Engineer .Net  LPT - Licensed Penetration Tester  CEH Master