Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

What are the certificates to do for a cyber security job?


  • Please log in to reply
24 replies to this topic

#1 DeepakSabu

DeepakSabu

  •  Avatar image
  • Members
  • 68 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:20 PM

Posted 29 November 2019 - 11:05 PM

Could someone assist me here with a list of certifications that I can do to make me a certified cyber security analyst or ethical hacker? I would like to purse that field and as the demand for this type of job is on the rise.



BC AdBot (Login to Remove)

 


#2 ET_Explorer

ET_Explorer

    Bleepin' Forum Reporter


  •  Avatar image
  • Banned Spammer
  • Member rank image
  • 5,495 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:20 AM

Posted 30 November 2019 - 12:57 AM

EC-Council (Certified Ethical Hacker) https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/



#3 DeepakSabu

DeepakSabu
  • Topic Starter

  •  Avatar image
  • Members
  • 68 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:20 PM

Posted 30 November 2019 - 07:09 PM

Thank you @CyberSec_ET for this information.



#4 Kilroy

Kilroy

  •  Avatar image
  • BC Advisor
  • 4,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:09:20 AM

Posted 30 November 2019 - 07:10 PM

I'd suggest looking at job ads to see what they are requiring.  We can tell you anything, but you should be concerned with what they want in the real world.



#5 Kilroy

Kilroy

  •  Avatar image
  • BC Advisor
  • 4,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:09:20 AM

Posted 30 November 2019 - 07:10 PM

Duplicate post


Edited by Kilroy, 30 November 2019 - 07:10 PM.


#6 DeepakSabu

DeepakSabu
  • Topic Starter

  •  Avatar image
  • Members
  • 68 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:20 PM

Posted 30 November 2019 - 07:40 PM

Duplicate post

 

I really didn't get what you meant by this.



#7 DeepakSabu

DeepakSabu
  • Topic Starter

  •  Avatar image
  • Members
  • 68 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:20 PM

Posted 30 November 2019 - 07:44 PM

I'd suggest looking at job ads to see what they are requiring.  We can tell you anything, but you should be concerned with what they want in the real world.

 

Thank you Kilroy for the reply. I don't really know what are the industry accepted exams for Cyber Security or Ethical Hacking. So it would be nice to know and which could help me pursue such exams based on the cost and the demand for it. I am just a newbie in the field of Cyber Security and would really like to gain any sorts of knowledge possible.  :)


Edited by DeepakSabu, 30 November 2019 - 07:45 PM.


#8 RolandJS

RolandJS

  •  Avatar image
  • Members
  • 6,606 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Austin metro area, TX USA
  • Local time:09:20 AM

Posted 30 November 2019 - 08:55 PM

Also check with local and nearby colleges and universities, some may have a few real good education paths to some certifications.

Edited by RolandJS, 30 November 2019 - 08:56 PM.

"Take care of thy backups and thy restores shall take care of thee." Ben Franklin revisited.


#9 DeepakSabu

DeepakSabu
  • Topic Starter

  •  Avatar image
  • Members
  • 68 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:20 PM

Posted 01 December 2019 - 02:59 PM

Also check with local and nearby colleges and universities, some may have a few real good education paths to some certifications.

I am currently studying in a university in Lithuania for Bachelors in Cyber Security. But i feel that extra certification will help me add more value to my portfolio in future for job aspects. Therefore I am have asked this question.



#10 Kilroy

Kilroy

  •  Avatar image
  • BC Advisor
  • 4,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:09:20 AM

Posted 01 December 2019 - 08:55 PM

Went to Dice and search for Cyber Security.

 

As the Junior Cyber Security Engineer your experience will include:

  • 2 or more years of experience on a SIEM Implementation like Splunk/Arcsight/Qradar.
  • Active threat hunting and adversary tracking experience
  • Strong knowledge of various Endpoint/Network/OS devices.
  • Big Data or Java experience needed.
  • Experience working in a start-up would be preferred.
  • Strong presentation skills.
  • Strong customer interaction, written & verbal communication, and troubleshooting skills.

 

Preferred Skills and Certifications

  • CISSP: Certified Information Systems Security Professional
  • Security +
  • Firewall Technologies (Cisco Meraki, Palo Alto, Check Point),
  • Endpoint Security (Crowdstrike, Symantec, CarbonBlack, BitDefender),
  • Analytics (Splunk, LogRythm),
  • Vulnerability Management (Tenable, Qualys, Rapid7),
  • Cloud Security (Azure, GCP, AWS),
  • Identity Management technologies include, CyberArk, Okta, Office 365
  • Preferred experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with Security Information and Event Monitoring (SIEM) platforms such as Splunk, LogRhythm that perform log collection, analysis, correlation, and alerting.

Penetration Testing specific experience may include: performing red team assessments (physical, social engineering, and network exploitation); conducting penetration testing on applications, network, web, databases; performing controlled vulnerability exploitation; conducting network reconnaissance, OSINT, and physical security reviews; evaluating technology risks; familiar with OWASP Top 10;



#11 RolandJS

RolandJS

  •  Avatar image
  • Members
  • 6,606 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Austin metro area, TX USA
  • Local time:09:20 AM

Posted 01 December 2019 - 09:53 PM

 

Duplicate post

 

I really didn't get what you meant by this.

 

It means a post was accidentally made twice, hitting submit when it seemed like the first submit did not "take".


"Take care of thy backups and thy restores shall take care of thee." Ben Franklin revisited.


#12 DeepakSabu

DeepakSabu
  • Topic Starter

  •  Avatar image
  • Members
  • 68 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:20 PM

Posted 02 December 2019 - 05:59 PM

Went to Dice and search for Cyber Security.

 

As the Junior Cyber Security Engineer your experience will include:

  • 2 or more years of experience on a SIEM Implementation like Splunk/Arcsight/Qradar.
  • Active threat hunting and adversary tracking experience
  • Strong knowledge of various Endpoint/Network/OS devices.
  • Big Data or Java experience needed.
  • Experience working in a start-up would be preferred.
  • Strong presentation skills.
  • Strong customer interaction, written & verbal communication, and troubleshooting skills.

 

Preferred Skills and Certifications

  • CISSP: Certified Information Systems Security Professional
  • Security +
  • Firewall Technologies (Cisco Meraki, Palo Alto, Check Point),
  • Endpoint Security (Crowdstrike, Symantec, CarbonBlack, BitDefender),
  • Analytics (Splunk, LogRythm),
  • Vulnerability Management (Tenable, Qualys, Rapid7),
  • Cloud Security (Azure, GCP, AWS),
  • Identity Management technologies include, CyberArk, Okta, Office 365
  • Preferred experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with Security Information and Event Monitoring (SIEM) platforms such as Splunk, LogRhythm that perform log collection, analysis, correlation, and alerting.

Penetration Testing specific experience may include: performing red team assessments (physical, social engineering, and network exploitation); conducting penetration testing on applications, network, web, databases; performing controlled vulnerability exploitation; conducting network reconnaissance, OSINT, and physical security reviews; evaluating technology risks; familiar with OWASP Top 10;

 

Thanks a lot Kilroy for taking the time and finding this details for me. It would surely help me. Thanks again


 

 

Duplicate post

 

I really didn't get what you meant by this.

 

It means a post was accidentally made twice, hitting submit when it seemed like the first submit did not "take".

 

 

Oh thanks Roland for the info. I am a newbie here, so just getting used to the environment here.



#13 Viper_Security

Viper_Security

  •  Avatar image
  • Banned
  • Member rank image
  • 907 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:20 AM

Posted 03 December 2019 - 11:53 PM

Check out My Profile for a list of a few of them. CISA, CHFI, CISSP, CysA+ there's a bunch. :)

 

Also When did we stop using "Tiger Team" and start using " Red Team"???? o.0


Edited by Viper_Security, 03 December 2019 - 11:56 PM.


#14 Kilroy

Kilroy

  •  Avatar image
  • BC Advisor
  • 4,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Launderdale, MN
  • Local time:09:20 AM

Posted 04 December 2019 - 10:55 AM

Also When did we stop using "Tiger Team" and start using " Red Team"???? o.0

 

A long time ago, according to Wikipedia, but it seems that there is a difference between Tiger Team and Red Team as the Wiki starts off with Not to be confused with tiger team.



#15 Viper_Security

Viper_Security

  •  Avatar image
  • Banned
  • Member rank image
  • 907 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:20 AM

Posted 04 December 2019 - 07:45 PM

 

Also When did we stop using "Tiger Team" and start using " Red Team"???? o.0

 

A long time ago, according to Wikipedia, but it seems that there is a difference between Tiger Team and Red Team as the Wiki starts off with Not to be confused with tiger team.

 

I Don't Use wikipedia as a legitimate source, but that's just me, and I'm NOT referring to the military Tiger Team. "Tiger Team" Is an individual or group of hackers trying to break into something then reporting how they did it so it can be patched. I've only heard the term "Red Team" in the passed 3 weeks and as someone that's an IT Auditor, these names are getting ridiculous , imo.

 

Apologies to OP for Straying Off Topic






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users