
Getting into cybersecurity in less than a year
Introduction
Getting started in any new field can be difficult, even for those in an adjacent field. I personally switched from a career doing something completely different to cybersecurity in about a year, so I know it is possible for you, too.
This article will detail essential training, certifications and tips for those looking to get started working in cybersecurity in the short term (one year or less). Keep in mind that the cybersecurity universe is bigger than you may think, and by reading this article, you will be better positioned to stake out your own little part of the cybersecurity universe.
Essential training
There are four entry-level roles in cybersecurity you can get involved with. These are the most realistic places to get your start. These roles are:
- Cybersecurity specialist/technician
- Cybercrime analyst/investigator
- IT auditor
- Incident analyst/responder
Each of these roles is mapped to the National Initiative for Cybersecurity Education’s CyberSeek model for the cybersecurity workforce. Below are paths of essential training you can take to each of these roles.
Cybersecurity specialist/technician
For this position, you will want to take information security fundamentals training. This learning path teaches fundamental hardware, software and network security knowledge and explores widely used technologies, concepts and controls. There is also an overview of incident response, risk management and disaster recovery.
Cybercrime analyst/investigator
Computer forensics training is the recommended learning path for this role. This training will arm you with the base of computer forensics knowledge needed to work in this role by teaching how to conduct forensics on multiple devices and platforms, including operating systems, networks and files.
IT auditor
The training for this role is information security auditing. Infosec is a leader in cybersecurity training and this course will help put you in your IT auditing shoes faster than (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/MypQyCjSM10/