Getting into cybersecurity in less than a year


Getting started in any new field can be difficult, even for those in an adjacent field. I personally switched from a career doing something completely different to cybersecurity in about a year, so I know it is possible for you, too. 

This article will detail essential training, certifications and tips for those looking to get started working in cybersecurity in the short term (one year or less). Keep in mind that the cybersecurity universe is bigger than you may think, and by reading this article, you will be better positioned to stake out your own little part of the cybersecurity universe. 

Essential training

There are four entry-level roles in cybersecurity you can get involved with. These are the most realistic places to get your start. These roles are:

  • Cybersecurity specialist/technician
  • Cybercrime analyst/investigator
  • IT auditor
  • Incident analyst/responder

Each of these roles is mapped to the National Initiative for Cybersecurity Education’s CyberSeek model for the cybersecurity workforce. Below are paths of essential training you can take to each of these roles.

Cybersecurity specialist/technician

For this position, you will want to take information security fundamentals training. This learning path teaches fundamental hardware, software and network security knowledge and explores widely used technologies, concepts and controls. There is also an overview of incident response, risk management and disaster recovery. 

Cybercrime analyst/investigator

Computer forensics training is the recommended learning path for this role. This training will arm you with the base of computer forensics knowledge needed to work in this role by teaching how to conduct forensics on multiple devices and platforms, including operating systems, networks and files. 

IT auditor

The training for this role is information security auditing. Infosec is a leader in cybersecurity training and this course will help put you in your IT auditing shoes faster than (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: