Cyber Work Podcast: Teach yourself cybersecurity with skills-based education with John Wagnon

Introduction

In this episode of Infosec’s Cyber Work Podcast series, host Chris Sienko speaks with John Wagnon, Senior Solution Developer at F5 Networks. They discuss skills-based education, in-demand job skills, learning programming on your own and, of course, the OWASP Top 10.

John is a senior solution developer for F5 Network’s DevCentral technical community and a course creator for Infosec Skills. As a solution developer, he helps analyze and solve complex problems for F5 users all over the world. He frequently writes articles and records videos that are featured on the DevCentral website. 

Prior to his work at F5, John was a communications officer in the US Air Force where he specialized in ground and satellite networks. After leaving the Air Force, he worked for a technology consulting firm, analyzing cyber-attacks against U.S. Department of Defense computer systems and networks. John holds a Bachelor of Science in computer engineering and a Master of Science in computer networks.

Tell us where you first got interested in computers and tech. When did security enter the mix?

John’s interest in computers and technology started in college. Back then, he thought that computers were going to be around for a while so he should get involved with them. After college, John joined the Air Force, where he worked with computer networking; later, he carried on with it, whether it was consulting for the Air Force and the DoD or working with F5 Networks. 

In terms of security, he really dug into it after he got out of the Air Force, with the last 12 years being very security-focused. As you get involved with security, you catch the fever — security is fascinating and fast-moving, and there is always something to learn. If you stop learning, the world leaves you behind. He (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/wqZv_WCs4Qw/