Degree vs. certification: Entry-level penetration tester

Introduction

Have you ever wanted to use your cybersecurity know-how and skills to help organizations improve their information security and stamp out vulnerabilities? If so, the role of penetration tester is for you. 

For those looking to obtain their first penetration tester role within an organization, do you know how to get to this role in the shortest amount of time possible? This article will detail the two different paths one can take to the role of penetration tester — the degree path and the certification path. We will conclude with a solid recommendation for which path you should take. 

A little about the role

Penetration testing is a type of ethical hacking that tries to break into or find exploitable vulnerabilities in an organization’s network, computers and systems. 

Penetration testers, or pentesters, run predetermined penetration tests or tests they designed themselves and then fill out assessments explaining the test’s findings. Those findings are communicated/presented to the organization. You can think of it as a sort of tune-up to the organization’s information security by filling in weaknesses in security and then periodically retesting to continually improve.

Some career path authorities hold that the role of pentester is not an entry-level role, but this assertion is inaccurate. According to a career path survey of current pentesters, it was found that nearly 10% of pentesters identify as being entry-level. This is a significant enough percentage to establish that while fewer pentesters may be entry-level than other cybersecurity disciplines, those with the right knowledge and skills can, in fact, reach this role right out of the proverbial gate.

Degree path

The first path many think of for a cybersecurity role is the degree path. Think of it as the traditional route to a role: after all, isn’t getting a job (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/gOtgPHovf-I/