Are you interested in a career as penetration tester? If you have “a thorough understanding of pentesting methodologies and vulnerability assessments, as well as the ability to exploit systems and effectively communicate findings,” then this might be the right field for you.
How does an IT professional become a penetration tester? There is no single answer; in fact, pentesters come from different walks of life. They might be network administrators or engineers, system or software developers, graduates with IT security degrees or even self-taught hackers. Regardless of what skills and knowledge the professional already has, all pentesters need to acquire the right mix of formal knowledge and hands-on, practical experience that allows them to be successful in the profession. To do this, they need training, the drive to always stay current with the latest technologies and the ability to stay a step ahead of hackers.
Pentesters are in high demand, as there is a shortage of real talents in this field. If interested, then you will find information in this article that provides a clear picture of possible career paths and learning opportunities.
Penetration testing career paths and certifications
One of the most common career paths for penetration testers is fairly standard: a formal degree in an information technology discipline or cybersecurity, a job as a systems or network administrator, specialized training in ethical hacking and a transfer to a position in security. As mentioned, however, penetration testers can also follow unorthodox paths; some do not even have formal degrees and start their career thanks to personal knowledge and skills, augmented by specialized training courses and certifications.
Many credentials are available for professionals. It is normally a good idea to start with a more general option like the CompTIA Security+, then progress to more specific programs like (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Daniel Brecht. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/NyRzk7g4J3I/