Could someone assist me here with a list of certifications that I can do to make me a certified cyber security analyst or ethical hacker? I would like to purse that field and as the demand for this type of job is on the rise.
Posted 29 November 2019 - 11:05 PM
Could someone assist me here with a list of certifications that I can do to make me a certified cyber security analyst or ethical hacker? I would like to purse that field and as the demand for this type of job is on the rise.
Posted 30 November 2019 - 12:57 AM
EC-Council (Certified Ethical Hacker) https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
Posted 30 November 2019 - 07:09 PM
Thank you @CyberSec_ET for this information.
Posted 30 November 2019 - 07:10 PM
I'd suggest looking at job ads to see what they are requiring. We can tell you anything, but you should be concerned with what they want in the real world.
Posted 30 November 2019 - 07:10 PM
Duplicate post
Edited by Kilroy, 30 November 2019 - 07:10 PM.
Posted 30 November 2019 - 07:40 PM
Duplicate post
I really didn't get what you meant by this.
Posted 30 November 2019 - 07:44 PM
I'd suggest looking at job ads to see what they are requiring. We can tell you anything, but you should be concerned with what they want in the real world.
Thank you Kilroy for the reply. I don't really know what are the industry accepted exams for Cyber Security or Ethical Hacking. So it would be nice to know and which could help me pursue such exams based on the cost and the demand for it. I am just a newbie in the field of Cyber Security and would really like to gain any sorts of knowledge possible.
Edited by DeepakSabu, 30 November 2019 - 07:45 PM.
Posted 30 November 2019 - 08:55 PM
Edited by RolandJS, 30 November 2019 - 08:56 PM.
"Take care of thy backups and thy restores shall take care of thee." Ben Franklin revisited.
Posted 01 December 2019 - 02:59 PM
Also check with local and nearby colleges and universities, some may have a few real good education paths to some certifications.
I am currently studying in a university in Lithuania for Bachelors in Cyber Security. But i feel that extra certification will help me add more value to my portfolio in future for job aspects. Therefore I am have asked this question.
Posted 01 December 2019 - 08:55 PM
Went to Dice and search for Cyber Security.
As the Junior Cyber Security Engineer your experience will include:
Preferred Skills and Certifications
Penetration Testing specific experience may include: performing red team assessments (physical, social engineering, and network exploitation); conducting penetration testing on applications, network, web, databases; performing controlled vulnerability exploitation; conducting network reconnaissance, OSINT, and physical security reviews; evaluating technology risks; familiar with OWASP Top 10;
Posted 01 December 2019 - 09:53 PM
Duplicate post
I really didn't get what you meant by this.
It means a post was accidentally made twice, hitting submit when it seemed like the first submit did not "take".
"Take care of thy backups and thy restores shall take care of thee." Ben Franklin revisited.
Posted 02 December 2019 - 05:59 PM
Went to Dice and search for Cyber Security.
As the Junior Cyber Security Engineer your experience will include:
- 2 or more years of experience on a SIEM Implementation like Splunk/Arcsight/Qradar.
- Active threat hunting and adversary tracking experience
- Strong knowledge of various Endpoint/Network/OS devices.
- Big Data or Java experience needed.
- Experience working in a start-up would be preferred.
- Strong presentation skills.
- Strong customer interaction, written & verbal communication, and troubleshooting skills.
Preferred Skills and Certifications
- CISSP: Certified Information Systems Security Professional
- Security +
- Firewall Technologies (Cisco Meraki, Palo Alto, Check Point),
- Endpoint Security (Crowdstrike, Symantec, CarbonBlack, BitDefender),
- Analytics (Splunk, LogRythm),
- Vulnerability Management (Tenable, Qualys, Rapid7),
- Cloud Security (Azure, GCP, AWS),
- Identity Management technologies include, CyberArk, Okta, Office 365
- Preferred experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with Security Information and Event Monitoring (SIEM) platforms such as Splunk, LogRhythm that perform log collection, analysis, correlation, and alerting.
Penetration Testing specific experience may include: performing red team assessments (physical, social engineering, and network exploitation); conducting penetration testing on applications, network, web, databases; performing controlled vulnerability exploitation; conducting network reconnaissance, OSINT, and physical security reviews; evaluating technology risks; familiar with OWASP Top 10;
Thanks a lot Kilroy for taking the time and finding this details for me. It would surely help me. Thanks again
Duplicate post
I really didn't get what you meant by this.
It means a post was accidentally made twice, hitting submit when it seemed like the first submit did not "take".
Oh thanks Roland for the info. I am a newbie here, so just getting used to the environment here.
Posted 03 December 2019 - 11:53 PM
Check out My Profile for a list of a few of them. CISA, CHFI, CISSP, CysA+ there's a bunch.
Also When did we stop using "Tiger Team" and start using " Red Team"???? o.0
Edited by Viper_Security, 03 December 2019 - 11:56 PM.
Posted 04 December 2019 - 10:55 AM
Also When did we stop using "Tiger Team" and start using " Red Team"???? o.0
A long time ago, according to Wikipedia, but it seems that there is a difference between Tiger Team and Red Team as the Wiki starts off with Not to be confused with tiger team.
Posted 04 December 2019 - 07:45 PM
Also When did we stop using "Tiger Team" and start using " Red Team"???? o.0
A long time ago, according to Wikipedia, but it seems that there is a difference between Tiger Team and Red Team as the Wiki starts off with Not to be confused with tiger team.
I Don't Use wikipedia as a legitimate source, but that's just me, and I'm NOT referring to the military Tiger Team. "Tiger Team" Is an individual or group of hackers trying to break into something then reporting how they did it so it can be patched. I've only heard the term "Red Team" in the passed 3 weeks and as someone that's an IT Auditor, these names are getting ridiculous , imo.
Apologies to OP for Straying Off Topic
0 members, 1 guests, 0 anonymous users