How to build hands-on cybersecurity skills on a budget

Introduction

Cybersecurity is a constantly changing field, so a passion for lifelong learning is a must for infosec professionals. Staying ahead of the bad guys means keeping up with the changing threat landscape and the tools necessary to stop malicious actors in their tracks. 

Fortunately, there are a ton of affordable cybersecurity training resources for you to choose from. From free classes by Ivy League universities to down-to-earth podcasts by infosec’s greatest minds, you have a wealth of resources right at your fingertips.

We put together a list of websites and resources you can use to build cybersecurity skills on a budget. Take a look! 

Online classes/MOOCS

MOOCs (Massive Open Online Courses) are a popular alternative to traditional college classes because they’re cheaper and more flexible. Most MOOCs are free, but some charge a small fee if you want to earn a verified credential to show your employer. Some of the biggest players in the education world are offering cybersecurity coursework, including Harvard, MIT and UC Berkeley. 

MOOCs are a great option for both cybersecurity newcomers and mid-career pros looking to enhance their skills. Since MOOCs don’t require prerequisites of any kind, you can jump right into coursework you need to advance your cybersecurity career. 

Check out these platforms to see their course offerings for information security: 

  • Open University
  • Future Learn
  • MIT OpenCourseWare
  • EdX

Professional groups 

Professional groups are a great, affordable way to deepen your knowledge of information security as well as network with pros in your field. There are a ton of cybersecurity professional groups to choose from depending on what you’re looking to get out of your membership. You’ll find that some groups focus on specific niches within cybersecurity, like penetration testing or incident response, while others have a more broad-reaching focus. 

(Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Christine McKenzie. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/xW2rANp3Bdk/