SlideShare a Scribd company logo
How to
become a
cybersecurity
Analyst
Boni Yeamin
Agenda
• Introductions
• Become a Cybersecurity
Analyst
• Cybersecurity Other
Roles
• Cyber Security Analyst
salary
• The End
$ Who I am ?
• Work in defensive Security
• Cyber Security Analyst
• CTF Player
• Lover
• Quick learner
• boniyeamin.cse@gmail.com
• linkedin.com/in/boniyeamin/
Introduction
• The Cybersecurity Analyst career guide is intended
to help you take the first steps toward a lucrative
career in cybersecurity. The guide provides an in-
depth overview of the skills you should learn, the
best training options, career paths in cybersecurity,
how to become a Cybersecurity Analyst, and more
What is a Cybersecurity
Analyst?
• A Cybersecurity Analyst enacts cybersecurity
measures designed to protect and secure IT
infrastructure including networks, hardware, and
software from threats, attacks, and malicious
actors.
Cybersecurity Analyst
• To become a Cybersecurity Analyst, you need to understand
information systems and networks, gain hands-on technical
experience, and stay up-to-date in cybersecurity training.
• Cybersecurity is a relatively new field compared to other
technology careers. This means that there are a variety of paths
you can take to become a Cybersecurity Analyst. Many
Cybersecurity Analyst jobs require a bachelor’s degree in computer
science, programming, or a similar field.
• However, as the demand for cybersecurity increases, companies
are more focused on hiring people with the right skills and technical
experience, which can be gained through training and practice.
A cybersecurity analyst will help
protect a company and its
infrastructure from:
• Phishing, which often takes the form of fraudulent emails,
calls, and other communications that aim to steal
information including bank accounts, login information,
and credit card numbers.
• Malware or other malicious computer software can take
forms including viruses, Trojans, or spyware.
• Denial-of-service attacks where criminals try to
overwhelm servers and a network with bogus traffic that
locks out legitimate users.
• SQL injections into an application’s database that give
criminal actors access to sensitive data
Why Is Cybersecurity
Important?
• Cybersecurity is important because it protects all categories
of data from theft and damage. This includes sensitive data,
personally identifiable information (PII), protected health
information (PHI), personal information, intellectual property,
data, and governmental and industry information systems.
• Cyber-attacks are among the world’s fastest-growing crimes
and are becoming more innovative each year
• Sensitive online information stored such as personal data,
intellectual property, and government infrastructure is
vulnerable and need to be protected
• Cyber-attacks can affect any entity, from personal identity theft
to enterprise-level data breaches
Cybersecurity
Analyst Benefits
• There are many benefits to
seriously investing in
cybersecurity, including
protecting company data
against unauthorized
access, improving business
performance, and building
customer confidence. There
is also a steep potential cost
if cybersecurity isn’t taken
seriously enough.
Career growth
opportunities
cyber security
• The global cyber security
market size was valued at
USD 167.13 billion in 2020
and is expected to register
a CAGR of 10.9% from
2021 to 2028.
Here are just a few of the
benefits that cybersecurity can
bring to a business:
• Protects cyber attacks
• Saves time and money
• Improves employee productivity
• Boosts customer confidence
• Prevents PR disasters
• Helps companies recover from a breach
• Risk management.
Cybersecurity
Analyst roles and
responsibilities
• A cybersecurity analyst is a
trained cyber professional
who specializes in network
and IT infrastructure
security. The cybersecurity
analyst thoroughly
understands cyberattacks,
malware, and the behavior
of cybercriminals, and
actively seeks to anticipate
and prevent these attacks.
As a Cyber Security Analyst, you need to perform
various responsibilities while working in an
organization. Some of the significant and general
responsibilities that you will have as a professional in
this domain are mentioned below:
 Network monitoring
 Access monitoring
 Software management
 Reporting
 Development of security plans
 Avoiding breaches
 Ensuring compliance
 Dealing with disaster recovery and incident
response
 Research advancements and renewing skills
How to Become a
Cybersecurity Analyst in
Five Steps
I. Learn cybersecurity
fundamentals.
II. Practice technical
cybersecurity skills.
III. Earn a cybersecurity
certificate.
IV. Research the industry.
V. Apply to relevant
cybersecurity jobs.
1. Learn Cybersecurity
Fundamentals
• When thinking about how to become a Cybersecurity Analyst, your first
step should be to learn about the current threat landscape. As
technologies change and evolve, it’s important to know how to identify
vulnerabilities and threats.
• It’s also important to learn cybersecurity fundamentals, including how
information systems may be threatened, and how to anticipate and
detect threats. You should also get familiar with key elements important
to cybersecurity, such as network architecture and protocol, routing and
switching, firewalls, and more.
Cybersecurity Fundamentals
• Information system vulnerabilities
• Anticipating and detecting threats
• Network architecture and protocol
• Routing and switching
• Firewalls
• Networking.
• Programming and scripting.
• Testing.
• Threat detection.
• Hacking skills.
• Threat intelligence.
2. Practice Cybersecurity
Technical Skills
• After learning cybersecurity fundamentals, it’s
important to apply your knowledge and practice
common cybersecurity tasks, like performing
security audits, analyzing network traffic, and
securing information through encryption.
Cybersecurity Technical Skill
A FUNCTIONAL
UNDERSTANDING
HOW OPERATING
SYSTEMS ARE
BUILT AND
MANAGED.
A FIRM
UNDERSTANDING
THE
FUNDAMENTALS OF
COMPUTER
NETWORKING &
CLOUD
COMPUTING.
AN ABILITY TO
BEING ABLE TO
BUILD AND
EVALUATE
NETWORK
ARCHITECTURE
PERFORMING
SECURITY AUDITS
ANALYZING
NETWORK TRAFFIC
SECURING
INFORMATION
THROUGH
ENCRYPTION
Fews soft skills
• Apart from a college degree and
a training certificate, a few soft
skills will help one grow in a
cybersecurity career. To shine in
the cybersecurity career, I
recommend you get some
practical training during
internships and follow these key
steps ( and add on as per your
need ).
Skills
• Problem Solving
• Fail Fast, Learn &
Repeat
• Professor
• Enthusiasm
• Be an Avenger
3. Earn a Cybersecurity Certificate
• Taking a cybersecurity certificate course is a great way to learn about
cybersecurity, the current threat landscape, and the related technology
and tools used to detect and protect against threats.
• The best of these courses will allow you to earn a cybersecurity
certificate, which can help you stand out on the job market when applying
for a Cybersecurity Analyst job. This is particularly helpful if you don’t
have an extensive technical background.
Top
certifications
• Certified Information Systems
Security Professional (CISSP) ...
• Certified Information Systems Auditor
(CISA) ...
• Certified Information Security
Manager (CISM) ...
• CompTIA Security+ ...
• Certified Ethical Hacker (CEH) ...
• GIAC Security Essentials Certification
(GSEC) ...
• Systems Security Certified
Practitioner (SSCP)
4. Research the Cybersecurity
Industry
• Cybersecurity has to constantly evolve. Technology is always innovating
and, in turn, cyber attackers are coming up with new tactics and
workarounds.
• To be a successful Cybersecurity Analyst, it is important to stay on top
of new developments in the cybersecurity and cybercrime world.
• By understanding new trends in security and information technology, you
can ensure your knowledge and skills match current needs.
5. Apply to
Cybersecurity
Jobs
• Cybersecurity professionals are in
high demand. Cybersecurity
Ventures reports that there are up
to 3.5 million unfulfilled
cybersecurity jobs globally.
• Here are some of the most in-
demand roles in cybersecurity:
• As you can imagine, there are
many other positions and job
titles in cybersecurity, and they
will likely evolve and grow as
technology and the threat
landscape change.
Cybersecurity
Other Roles
• Security Manager or
Administrator
• Vulnerability Analyst
• Penetration Tester
• Cybersecurity
Consultant
• Forensic Computer
Analyst
• Chief Information
Security Officer
• Cybersecurity Analyst
• Cybersecurity Engineer
• Systems Analyst
• Systems Engineer
• Systems Administrator
• Network Engineer or
Architect
Cyber Security
Analyst salary
internationally
• The salary trajectory of a
Cyber Security Analyst
ranges between locations
and employers. The
salary starts at $75,994
per year and goes up to
$145,135 per year for the
highest level of seniority.
Salary to cybersecurity professionals
Bangladesh
cybersecurity analyst.pptx
The End

More Related Content

What's hot

NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
ShivamSharma909
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
Ankita Ganguly
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
SandeshUprety4
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
 
Threat Modelling
Threat ModellingThreat Modelling
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 

What's hot (20)

NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network security
Network security Network security
Network security
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Application Security
Application SecurityApplication Security
Application Security
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 

Similar to cybersecurity analyst.pptx

Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
Ben Rothke
 
ITIL Basic introduction for the beginners
ITIL Basic introduction for the beginnersITIL Basic introduction for the beginners
ITIL Basic introduction for the beginners
zamankhanbd23
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
InfosecTrain
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
 
Ppt information security
Ppt information securityPpt information security
Ppt information security
Multisoft Virtual Academy
 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptx
CS50Bootcamp
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvoTechnologies
 
Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!
Mercury Solutions Limited
 
CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?
Mercury Solutions Limited
 
What type of training is required for cyber security.pdf
What type of training is required for cyber security.pdfWhat type of training is required for cyber security.pdf
What type of training is required for cyber security.pdf
Bytecode Security
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
Anant Shrivastava
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Harry McLaren
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
Sprintzeal
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 

Similar to cybersecurity analyst.pptx (20)

Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
ITIL Basic introduction for the beginners
ITIL Basic introduction for the beginnersITIL Basic introduction for the beginners
ITIL Basic introduction for the beginners
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Ppt information security
Ppt information securityPpt information security
Ppt information security
 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptx
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!
 
CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?
 
What type of training is required for cyber security.pdf
What type of training is required for cyber security.pdfWhat type of training is required for cyber security.pdf
What type of training is required for cyber security.pdf
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 

More from Boni Yeamin

Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
Boni Yeamin
 
Mastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessMastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking Success
Boni Yeamin
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Boni Yeamin
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-Lab
Boni Yeamin
 
security onion
security onionsecurity onion
security onion
Boni Yeamin
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
Boni Yeamin
 
Structures in C.pptx
Structures in C.pptxStructures in C.pptx
Structures in C.pptx
Boni Yeamin
 
Effective note keeping
Effective note keepingEffective note keeping
Effective note keeping
Boni Yeamin
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)
Boni Yeamin
 
Open Source Cybersecurity Tools
Open Source Cybersecurity ToolsOpen Source Cybersecurity Tools
Open Source Cybersecurity Tools
Boni Yeamin
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware Workstation
Boni Yeamin
 
How to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxHow to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptx
Boni Yeamin
 
Boni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdf
Boni Yeamin
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
Boni Yeamin
 

More from Boni Yeamin (14)

Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Mastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessMastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking Success
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-Lab
 
security onion
security onionsecurity onion
security onion
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
 
Structures in C.pptx
Structures in C.pptxStructures in C.pptx
Structures in C.pptx
 
Effective note keeping
Effective note keepingEffective note keeping
Effective note keeping
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)
 
Open Source Cybersecurity Tools
Open Source Cybersecurity ToolsOpen Source Cybersecurity Tools
Open Source Cybersecurity Tools
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware Workstation
 
How to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxHow to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptx
 
Boni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdf
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
 

Recently uploaded

Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
gargj3720
 
140. Reviewer Certificate in BP International
140. Reviewer Certificate in BP International140. Reviewer Certificate in BP International
140. Reviewer Certificate in BP International
Manu Mitra
 
Building Your First AI Program in Python ashokveda.com.pdf
Building Your First AI Program in Python ashokveda.com.pdfBuilding Your First AI Program in Python ashokveda.com.pdf
Building Your First AI Program in Python ashokveda.com.pdf
df2608021
 
Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...
Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...
Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...
norina2645
 
HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...
HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...
HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...
manjugarg389
 
VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...
VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...
VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...
sizukagarg9
 
How to Plan and Scope Facility Management Projects?.PREVIEW.pdf
How to Plan and Scope Facility Management Projects?.PREVIEW.pdfHow to Plan and Scope Facility Management Projects?.PREVIEW.pdf
How to Plan and Scope Facility Management Projects?.PREVIEW.pdf
GAFM ACADEMY
 
Success in the Academic Job Market for Management Scholars
Success in the Academic Job Market for Management ScholarsSuccess in the Academic Job Market for Management Scholars
Success in the Academic Job Market for Management Scholars
MagdalenaPlesa1
 
VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...
VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...
VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...
sizukagarg9
 
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
gargj3720
 
More professionals in Singapore looking to change jobs
More professionals in Singapore looking to change jobsMore professionals in Singapore looking to change jobs
More professionals in Singapore looking to change jobs
Karis Liow
 
Overview of Tourism and Hospitality Organizations
Overview of Tourism and Hospitality OrganizationsOverview of Tourism and Hospitality Organizations
Overview of Tourism and Hospitality Organizations
Md Shaifullar Rabbi
 
List of District Employment Exchanges.pdf
List of District Employment Exchanges.pdfList of District Employment Exchanges.pdf
List of District Employment Exchanges.pdf
rahul boruah
 
addtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptx
addtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptxaddtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptx
addtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptx
Sheldon Byron
 
SHAPING PAPER .pptx
SHAPING PAPER                      .pptxSHAPING PAPER                      .pptx
SHAPING PAPER .pptx
jonalynlabalanbasc
 
Comparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.com
Comparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.comComparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.com
Comparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.com
df2608021
 
Girls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in CityGirls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in City
margaretblush
 
New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...
New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...
New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...
ailynolive
 
High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...
High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...
High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...
susmagarg02
 
A Brief Introduction About Melinda Phommachanh.pdf
A Brief Introduction About Melinda Phommachanh.pdfA Brief Introduction About Melinda Phommachanh.pdf
A Brief Introduction About Melinda Phommachanh.pdf
Melinda Phommachanh
 

Recently uploaded (20)

Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
 
140. Reviewer Certificate in BP International
140. Reviewer Certificate in BP International140. Reviewer Certificate in BP International
140. Reviewer Certificate in BP International
 
Building Your First AI Program in Python ashokveda.com.pdf
Building Your First AI Program in Python ashokveda.com.pdfBuilding Your First AI Program in Python ashokveda.com.pdf
Building Your First AI Program in Python ashokveda.com.pdf
 
Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...
Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...
Busty Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And N...
 
HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...
HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...
HiFi Girls Call Kolkata 000XX00000 Provide Best And Top Girl Service And No1 ...
 
VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...
VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...
VVIP Girls Call Hyderabad 000XX00000 Provide Best And Top Girl Service And No...
 
How to Plan and Scope Facility Management Projects?.PREVIEW.pdf
How to Plan and Scope Facility Management Projects?.PREVIEW.pdfHow to Plan and Scope Facility Management Projects?.PREVIEW.pdf
How to Plan and Scope Facility Management Projects?.PREVIEW.pdf
 
Success in the Academic Job Market for Management Scholars
Success in the Academic Job Market for Management ScholarsSuccess in the Academic Job Market for Management Scholars
Success in the Academic Job Market for Management Scholars
 
VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...
VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...
VVIP Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No1 in ...
 
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahmedabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
 
More professionals in Singapore looking to change jobs
More professionals in Singapore looking to change jobsMore professionals in Singapore looking to change jobs
More professionals in Singapore looking to change jobs
 
Overview of Tourism and Hospitality Organizations
Overview of Tourism and Hospitality OrganizationsOverview of Tourism and Hospitality Organizations
Overview of Tourism and Hospitality Organizations
 
List of District Employment Exchanges.pdf
List of District Employment Exchanges.pdfList of District Employment Exchanges.pdf
List of District Employment Exchanges.pdf
 
addtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptx
addtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptxaddtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptx
addtionalinventorylecture-part 2.pptx addtionalinventorylecture-part 2.pptx
 
SHAPING PAPER .pptx
SHAPING PAPER                      .pptxSHAPING PAPER                      .pptx
SHAPING PAPER .pptx
 
Comparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.com
Comparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.comComparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.com
Comparing ChatGPT 3.5 vs 4 vs 4o_ What's New and Improved-ashokveda.com
 
Girls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in CityGirls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Oshiwara 9910780858 Provide Best And Top Girl Service And No1 in City
 
New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...
New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...
New Girls Call Mumbai 🎈🔥9930687706 🔥💋🎈 Provide Best And Top Girl Service And ...
 
High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...
High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...
High Girls Call Chennai 000XX00000 Provide Best And Top Girl Service And No1 ...
 
A Brief Introduction About Melinda Phommachanh.pdf
A Brief Introduction About Melinda Phommachanh.pdfA Brief Introduction About Melinda Phommachanh.pdf
A Brief Introduction About Melinda Phommachanh.pdf
 

cybersecurity analyst.pptx

  • 3. • Introductions • Become a Cybersecurity Analyst • Cybersecurity Other Roles • Cyber Security Analyst salary • The End
  • 4. $ Who I am ? • Work in defensive Security • Cyber Security Analyst • CTF Player • Lover • Quick learner • boniyeamin.cse@gmail.com • linkedin.com/in/boniyeamin/
  • 5. Introduction • The Cybersecurity Analyst career guide is intended to help you take the first steps toward a lucrative career in cybersecurity. The guide provides an in- depth overview of the skills you should learn, the best training options, career paths in cybersecurity, how to become a Cybersecurity Analyst, and more
  • 6. What is a Cybersecurity Analyst? • A Cybersecurity Analyst enacts cybersecurity measures designed to protect and secure IT infrastructure including networks, hardware, and software from threats, attacks, and malicious actors.
  • 7. Cybersecurity Analyst • To become a Cybersecurity Analyst, you need to understand information systems and networks, gain hands-on technical experience, and stay up-to-date in cybersecurity training. • Cybersecurity is a relatively new field compared to other technology careers. This means that there are a variety of paths you can take to become a Cybersecurity Analyst. Many Cybersecurity Analyst jobs require a bachelor’s degree in computer science, programming, or a similar field. • However, as the demand for cybersecurity increases, companies are more focused on hiring people with the right skills and technical experience, which can be gained through training and practice.
  • 8. A cybersecurity analyst will help protect a company and its infrastructure from: • Phishing, which often takes the form of fraudulent emails, calls, and other communications that aim to steal information including bank accounts, login information, and credit card numbers. • Malware or other malicious computer software can take forms including viruses, Trojans, or spyware. • Denial-of-service attacks where criminals try to overwhelm servers and a network with bogus traffic that locks out legitimate users. • SQL injections into an application’s database that give criminal actors access to sensitive data
  • 9. Why Is Cybersecurity Important? • Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems. • Cyber-attacks are among the world’s fastest-growing crimes and are becoming more innovative each year • Sensitive online information stored such as personal data, intellectual property, and government infrastructure is vulnerable and need to be protected • Cyber-attacks can affect any entity, from personal identity theft to enterprise-level data breaches
  • 10. Cybersecurity Analyst Benefits • There are many benefits to seriously investing in cybersecurity, including protecting company data against unauthorized access, improving business performance, and building customer confidence. There is also a steep potential cost if cybersecurity isn’t taken seriously enough.
  • 11. Career growth opportunities cyber security • The global cyber security market size was valued at USD 167.13 billion in 2020 and is expected to register a CAGR of 10.9% from 2021 to 2028.
  • 12. Here are just a few of the benefits that cybersecurity can bring to a business: • Protects cyber attacks • Saves time and money • Improves employee productivity • Boosts customer confidence • Prevents PR disasters • Helps companies recover from a breach • Risk management.
  • 13. Cybersecurity Analyst roles and responsibilities • A cybersecurity analyst is a trained cyber professional who specializes in network and IT infrastructure security. The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks.
  • 14. As a Cyber Security Analyst, you need to perform various responsibilities while working in an organization. Some of the significant and general responsibilities that you will have as a professional in this domain are mentioned below:  Network monitoring  Access monitoring  Software management  Reporting  Development of security plans  Avoiding breaches  Ensuring compliance  Dealing with disaster recovery and incident response  Research advancements and renewing skills
  • 15. How to Become a Cybersecurity Analyst in Five Steps I. Learn cybersecurity fundamentals. II. Practice technical cybersecurity skills. III. Earn a cybersecurity certificate. IV. Research the industry. V. Apply to relevant cybersecurity jobs.
  • 16. 1. Learn Cybersecurity Fundamentals • When thinking about how to become a Cybersecurity Analyst, your first step should be to learn about the current threat landscape. As technologies change and evolve, it’s important to know how to identify vulnerabilities and threats. • It’s also important to learn cybersecurity fundamentals, including how information systems may be threatened, and how to anticipate and detect threats. You should also get familiar with key elements important to cybersecurity, such as network architecture and protocol, routing and switching, firewalls, and more.
  • 17. Cybersecurity Fundamentals • Information system vulnerabilities • Anticipating and detecting threats • Network architecture and protocol • Routing and switching • Firewalls • Networking. • Programming and scripting. • Testing. • Threat detection. • Hacking skills. • Threat intelligence.
  • 18. 2. Practice Cybersecurity Technical Skills • After learning cybersecurity fundamentals, it’s important to apply your knowledge and practice common cybersecurity tasks, like performing security audits, analyzing network traffic, and securing information through encryption.
  • 19. Cybersecurity Technical Skill A FUNCTIONAL UNDERSTANDING HOW OPERATING SYSTEMS ARE BUILT AND MANAGED. A FIRM UNDERSTANDING THE FUNDAMENTALS OF COMPUTER NETWORKING & CLOUD COMPUTING. AN ABILITY TO BEING ABLE TO BUILD AND EVALUATE NETWORK ARCHITECTURE PERFORMING SECURITY AUDITS ANALYZING NETWORK TRAFFIC SECURING INFORMATION THROUGH ENCRYPTION
  • 20. Fews soft skills • Apart from a college degree and a training certificate, a few soft skills will help one grow in a cybersecurity career. To shine in the cybersecurity career, I recommend you get some practical training during internships and follow these key steps ( and add on as per your need ).
  • 21. Skills • Problem Solving • Fail Fast, Learn & Repeat • Professor • Enthusiasm • Be an Avenger
  • 22. 3. Earn a Cybersecurity Certificate • Taking a cybersecurity certificate course is a great way to learn about cybersecurity, the current threat landscape, and the related technology and tools used to detect and protect against threats. • The best of these courses will allow you to earn a cybersecurity certificate, which can help you stand out on the job market when applying for a Cybersecurity Analyst job. This is particularly helpful if you don’t have an extensive technical background.
  • 23. Top certifications • Certified Information Systems Security Professional (CISSP) ... • Certified Information Systems Auditor (CISA) ... • Certified Information Security Manager (CISM) ... • CompTIA Security+ ... • Certified Ethical Hacker (CEH) ... • GIAC Security Essentials Certification (GSEC) ... • Systems Security Certified Practitioner (SSCP)
  • 24. 4. Research the Cybersecurity Industry • Cybersecurity has to constantly evolve. Technology is always innovating and, in turn, cyber attackers are coming up with new tactics and workarounds. • To be a successful Cybersecurity Analyst, it is important to stay on top of new developments in the cybersecurity and cybercrime world. • By understanding new trends in security and information technology, you can ensure your knowledge and skills match current needs.
  • 25. 5. Apply to Cybersecurity Jobs • Cybersecurity professionals are in high demand. Cybersecurity Ventures reports that there are up to 3.5 million unfulfilled cybersecurity jobs globally. • Here are some of the most in- demand roles in cybersecurity: • As you can imagine, there are many other positions and job titles in cybersecurity, and they will likely evolve and grow as technology and the threat landscape change.
  • 26. Cybersecurity Other Roles • Security Manager or Administrator • Vulnerability Analyst • Penetration Tester • Cybersecurity Consultant • Forensic Computer Analyst • Chief Information Security Officer • Cybersecurity Analyst • Cybersecurity Engineer • Systems Analyst • Systems Engineer • Systems Administrator • Network Engineer or Architect
  • 27. Cyber Security Analyst salary internationally • The salary trajectory of a Cyber Security Analyst ranges between locations and employers. The salary starts at $75,994 per year and goes up to $145,135 per year for the highest level of seniority.
  • 28. Salary to cybersecurity professionals Bangladesh