{"id":13559,"date":"2018-10-11T07:00:02","date_gmt":"2018-10-11T15:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/11\/news-7326\/"},"modified":"2018-10-11T07:00:02","modified_gmt":"2018-10-11T15:00:02","slug":"news-7326","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/11\/news-7326\/","title":{"rendered":"The Many Paths To A Cybersecurity Education"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 11 Oct 2018 14:02:18 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Ask a room full of cybersecurity professionals about their educational background and how they got started on their career path and you\u2019re going to get a myriad of different answers.<\/p>\n<p>From one perspective, that\u2019s frustrating. It\u2019s hard to confidently recommend a path for people starting out when almost any path can end up at your desired destination: a long, sustainable career in cybersecurity.<\/p>\n<p>The good news? Cybersecurity is a career path where your hard work and efforts will have a dramatic effect on your success. The lack of a degree, certification, or other credential won\u2019t necessarily hold you back\u2026but they definitely can help you.<\/p>\n<h2>Mindset<\/h2>\n<p>Before we dive into specific education options, let\u2019s look at the type of thinking and personality that leads to a successful cybersecurity professional, regardless of the cybersecurity role.<\/p>\n<p>If you are:<\/p>\n<p>\u25cf Excited about learning constantly<br \/> \u25cf Eager to seek out different points of view<br \/> \u25cf Persistent and doggedly determined<\/p>\n<p>Then a career in cybersecurity will probably be a great fit. I can\u2019t stress how important this mindset is. The technology aspects will come and go at a rapid pace. These areas can be learned and will need to be re-learned time and time again.<\/p>\n<p>These personality traits will help ensure that you\u2019re not only successful but have a fulfilling career in the field. Cybersecurity presents a unique challenge in that it covers all aspects of technology. There\u2019s a near endless opportunity to learn and apply that learning to drive real-world outcomes.<\/p>\n<p>But if you\u2019re not excited about the constant learning required to deal with an ever-changing landscape, not eager to evaluate multiple viewpoints, and give up when the going gets tough, cybersecurity is not a good fit.<\/p>\n<p>If you\u2019re still reading, then let\u2019s move on to the more direct aspects of getting ready for a career in cybersecurity: education.<\/p>\n<h2>Undergraduate Degree<\/h2>\n<p>Over the past few years, a number of cybersecurity-focused undergraduate programs have been rolled out around the world. The challenge here is availability.<\/p>\n<p>Cybersecurity-focused programs are not yet widely available. That limits this option for most people. However, an undergraduate degree in computer science, computer engineering, math, finance, or business will all serve you well. Basically any degree that helps you better understand how technology works, how technology is used, or how business runs is going to help\u2026significantly.<\/p>\n<h2>Certifications<\/h2>\n<p>While their value if often debated, certifications can provide a huge boost to the start of your cybersecurity career. The number one pushback against certifications is that they usually are not hands-on.<\/p>\n<p>Hands-on experience is absolutely critical, but third party validation of your knowledge is probably more important early in your career. Certifications from reputable organizations can help give you a leg up and make that first step on your career path a little bit easier.<\/p>\n<p>Your first certification(s) should focus on broad cybersecurity topics. Avoid technology-specific certifications at first. This will keep your options open instead of tying yourself to a specific technology.<\/p>\n<h2>Experience<\/h2>\n<p>The most valuable \u2013 and most difficult \u2013 type of education is hands-on experience. You typically have to get in the door somewhere\u2026anywhere\u2026 before you can start to get hands-on experience.<\/p>\n<p>There are other ways to demonstrate that you can apply what you\u2019ve learned. Here are a few ideas to help get you started;<\/p>\n<p>\u25cf Review some code or an architecture for an open source project. Write up the results and share them<br \/> \u25cf Analyze a cybersecurity headline and provide a risk assessment on the related technologies\/services<br \/> \u25cf Attend a local meetup where they are hosting an activity or a local (or online) <a href=\"https:\/\/en.wikipedia.org\/wiki\/Capture_the_flag#Computer_security\">CTF<\/a><\/p>\n<p>All of these options are free, give you a chance to apply some of your knowledge, and are perfect for sharing with others in the community.<\/p>\n<h2>No Wrong Path<\/h2>\n<p>The only wrong step on the path toward a career in cybersecurity is not taking that first step.<\/p>\n<p>Cybersecurity is an exciting career choice that contains a multitude of roles covering almost everything you can imagine. If you enjoy tackling complex problems from a number of different angles, it\u2019s hard to ask for a more compelling career choice. The fact that it\u2019s one of <a href=\"https:\/\/blog.trendmicro.com\/lets-continue-the-skills-gap-conversation\/\">the hottest areas in tech<\/a> is just icing on the cake!<\/p>\n<p>What is your inspiration for a pursuing a career in cybersecurity? What steps have to you taken towards that goal? Let me know in the comments below or on Twitter where <a href=\"https:\/\/twitter.com\/marknca\">I\u2019m @marknca<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-many-paths-to-a-cybersecurity-education\/\">The Many Paths To A Cybersecurity Education<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-many-paths-to-a-cybersecurity-education\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 11 Oct 2018 14:02:18 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/pupils-running-through-school-corridor-picture-id862753318.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Ask a room full of cybersecurity professionals about their educational background and how they got started on their career path and you\u2019re going to get a myriad of different answers. From one perspective, that\u2019s frustrating. It\u2019s hard to confidently recommend a path for people starting out when almost any path can end up at your&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-many-paths-to-a-cybersecurity-education\/\">The Many Paths To A Cybersecurity Education<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,4500,11231,15497,714],"class_list":["post-13559","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-cybersecurity","tag-internet-safety","tag-ncsam","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13559"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13559\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}