One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 782874
Date de publication 2018-08-20 13:00:00 (vue: 2018-08-28 19:01:03)
Titre How to Get into InfoSec: InfoSec Career Path Hacking (Recyclage)
Texte Maybe you've always dreamt of getting into the InfoSec field, and have been thinking about getting into information security for a while, or it's just coming to mind now. Regardless of where you are in your journey, welcome to the InfoSec community! In the words of the great Kung Fu Master, Shifu, “There is no level zero.” If you’ve seen Kung Fu Panda, you may recall that Po is a panda who eats, sleeps, and breathes Kung Fu, yet finds himself outside that community. He dreams of being a warrior. One day, he sees an opportunity to witness a significant moment in Kung Fu history and so he sets out on his journey.  But first, he must climb to the temple. It would have been easy for him to zig-zag his way to the top of the mountain, though it might have taken longer. Instead, he started with the logical place... the stairs - a much shorter path. You too will have to choose your path to awesomeness. Allow me to illuminate the way. “There is no level zero.” Find Your Why Po wanted to be great at Kung Fu purely for the sake of being great. Unfortunately, that probably won’t be enough to sustain you in the InfoSec field.  We all have selfish motivations, but they should pale in comparison to the greater good of our community, industry, and humanity. You will meet many who have forgotten that we are doing this for people, not to serve technology. Find your "why", and let it be outside yourself. That motivation will carry you through the many challenges, twists and turns along the way. “You will meet many who have forgotten we are doing this for people…” Take the Shortest Path The circuitous route is to acquire the necessary skills along whatever path you are on now. Even so, you will at some point have to focus on the particulars of those skill areas and invest in them. The alternative is the more direct route of certification and/or education. Although it may be more difficult, it will give you a more immediate opportunity. Certifications offer concentrated, focused training in a specific set of topics to support your goals. For example, the SANS Institute and CompTIA have well-planned certification roadmaps. Simply take a look at them, consider your current ability level and pick a certification as a starting point. Another resource is the free site Cybrary.it which hosts training courses in the certification area of your choosing. Don't forget to schedule your exam to give you motivation. Just taking an exam is a learning experience. Here’s a blog on the value of certifications you might want to look at. A wise mentor once told me that in order to be successful in InfoSec you need strong bases in at least one but preferably two of three areas: development, system administration, or networking. You may, perhaps, choose certifications such as Python and Powershell, A+, NET+, CCNA, Windows, Linux, and others. These may be vendor specific or vendor-agnostic. Employers will prefer a mix of both, depending on their alliances, partnerships, and the technologies that they leverage to deliver their business. Security job postings are an excellent source of this business intelligence. Regardless of how you choose to invest your time and ene
Envoyé Oui
Condensat #infosec “host “the “there “you  but  we *ahem* @j4vv4d ability able about abreast accepted account acquire administration advance agnostic alienvault’s all alliances allow along also alternative although always analysis and/or another apologize appetite architecture are area areas areas: astride attackers author’s awesomeness bases become been beginner’s begins being bemoaned blog boarding both breathes business businesses but call can career carry ccna certain certification certifications challenges changes changing check choose choosing circuitous classic climb colleagues come coming commentary commentators community companies comparison comptia concentrated concepts connect consider consuming continual courses create current cybrary day defined deliver depending details determination develop development did difficult direct document documentation doing dojo don't dreams dreamt easy eats ebook education employers encounter energy enough environment even ever exam example excellent expect experience experiences exploit express falls fear field find finds first flavor focus focused forget forgotten form forum free fundamentals gathered get getting give goals good great greater guide hacking hand has have here’s him himself his history holding home hope hosts how humanity ignore illuminate immediate important include increasing increasingly individuals industry information infosec infosec: instead institute integrity intelligence interviews invest involved it's it’s job join journey just keep know kung lab landscape learning least legends let level leverage like linkedin linux logical longer look looking make many master masters may maybe meet mentee mentor mentors might miles mind mitigate mix moment more motivation motivations mountain much must nations necessary need needing net+ networking new not now occasionally offer often once one ones opinion opportunity order others out outside over own pale panda part particulars partnerships path peerlyst’s people people…” perhaps pick place planned point post postings potentially powershell practice practitioners prefer preferably presents: probably professionals profile project purely python rapidly rather ready real realm recall recognize refinement regardless relevant research resource resumé risk risks roadmaps route said sake sans satirical say scenarios schedule secure security security” see seek seen sees selfish serve set sets shifu shorter shortest should shoulders significant silent simply single site skeptical skill skills sleeps some source specialized specific stairs stand started starting stay step strong successful such support sustain system take taken taking talk talking technologies technology temple them them; then these thinking those though thoughts thousand threat three thriving through time told too tools top topics toward training trends troubleshooting turns twists twitter two unfortunately unknown unplanned upon valuable value vendor very video vlog want wanted warrior warriors way welcome well whatever when where whether which white who whom why will willing windows wise within witness woes won’t words work world would write years yet you've you’re you’ve your yourself zag zero zig
Tags Threat
Stories
Notes
Move


Les reprises de l'article (1):
Source AlienVault.webp AlienVault Blog
Identifiant 782152
Date de publication 2018-08-20 13:00:00 (vue: 2018-08-20 16:00:32)
Titre How to Get into Infosec: InfoSec Career Path Hacking (Recyclage)
Texte Maybe you've always dreamt of getting into the InfoSec field, and have been thinking about getting into information security for a while, or it's just coming to mind now. Regardless of where you are in your journey, welcome to the InfoSec community! In the words of the great Kung Fu Master, Shifu, “There is no level zero.” If you’ve seen Kung Fu Panda, you may recall that Po is a panda who eats, sleeps, and breathes Kung Fu, yet finds himself outside that community. He dreams of being a warrior. One day, he sees an opportunity to witness a significant moment in Kung Fu history and so he sets out on his journey.  But first, he must climb to the temple. It would have been easy for him to zig-zag his way to the top of the mountain, though it might have taken longer. Instead, he started with the logical place... the stairs - a much shorter path. You too will have to choose your path to awesomeness. Allow me to illuminate the way. “There is no level zero.” Find Your Why Po wanted to be great at Kung Fu purely for the sake of being great. Unfortunately, that probably won’t be enough to sustain you in the InfoSec field.  We all have selfish motivations, but they should pale in comparison to the greater good of our community, industry, and humanity. You will meet many who have forgotten that we are doing this for people, not to serve technology. Find your "why", and let it be outside yourself. That motivation will carry you through the many challenges, twists and turns along the way. “You will meet many who have forgotten we are doing this for people…” Take the Shortest Path The circuitous route is to acquire the necessary skills along whatever path you are on now. Even so, you will at some point have to focus on the particulars of those skill areas and invest in them. The alternative is the more direct route of certification and/or education. Although it may be more difficult, it will give you a more immediate opportunity. Certifications offer concentrated, focused training in a specific set of topics to support your goals. For example, the SANS Institute and CompTIA have well-planned certification roadmaps. Simply take a look at them, consider your current ability level and pick a certification as a starting point. Another resource is the free site Cybrary.it which hosts training courses in the certification area of your choosing. Don't forget to schedule your exam to give you motivation. Just taking an exam is a learning experience. Here’s a blog on the value of certifications you might want to look at. A wise mentor once told me that in order to be successful in InfoSec you need strong bases in at least one but preferably two of three areas: development, system administration, or networking. You may, perhaps, choose certifications such as Python and Powershell, A+, NET+, CCNA, Windows, Linux, and others. These may be vendor specific or vendor-agnostic. Employers will prefer a mix of both, depending on their alliances, partnerships, and the technologies that they leverage to deliver their business. Security job postings are an excellent source of this business intelligence. Regardless of how you choose to invest your time and ene
Envoyé Oui
Condensat #infosec “host “the “there “you  but  we *ahem* @j4vv4d ability able about abreast accepted account acquire administration advance agnostic alienvault’s all alliances allow along also alternative although always analysis and/or another apologize appetite architecture are area areas areas: astride attackers author’s awesomeness bases become been beginner’s begins being bemoaned blog boarding both breathes business businesses but call can career carry ccna certain certification certifications challenges changes changing check choose choosing circuitous classic climb colleagues come coming commentary commentators community companies comparison comptia concentrated concepts connect consider consuming continual courses create current cybrary day defined deliver depending details determination develop development did difficult direct document documentation doing dojo don't dreams dreamt easy eats ebook education employers encounter energy enough environment even ever exam example excellent expect experience experiences exploit express falls fear field find finds first flavor focus focused forget forgotten form forum free fundamentals gathered get getting give goals good great greater guide hacking hand has have here’s him himself his history holding home hope hosts how humanity ignore illuminate immediate important include increasing increasingly individuals industry information infosec infosec: instead institute integrity intelligence interviews invest involved it's it’s job join journey just keep know kung lab landscape learning least legends let level leverage like linkedin linux logical longer look looking make many master masters may maybe meet mentee mentor mentors might miles mind mitigate mix moment more motivation motivations mountain much must nations necessary need needing net+ networking new not now occasionally offer often once one ones opinion opportunity order others out outside over own pale panda part particulars partnerships path peerlyst’s people people…” perhaps pick place planned point post postings potentially powershell practice practitioners prefer preferably presents: probably professionals profile project purely python rapidly rather ready real realm recall recognize refinement regardless relevant research resource resumé risk risks roadmaps route said sake sans satirical say scenarios schedule secure security security” see seek seen sees selfish serve set sets shifu shorter shortest should shoulders significant silent simply single site skeptical skill skills sleeps some source specialized specific stairs stand started starting stay step strong successful such support sustain system take taken taking talk talking technologies technology temple them them; then these thinking those though thoughts thousand threat three thriving through time told too tools top topics toward training trends troubleshooting turns twists twitter two unfortunately unknown unplanned upon valuable value vendor very video vlog want wanted warrior warriors way welcome well whatever when where whether which white who whom why will willing windows wise within witness woes won’t words work world would write years yet you've you’re you’ve your yourself zag zero zig
Tags Threat
Stories
Notes
Move


L'article ressemble à 1 autre(s) article(s):
Src Date (GMT) Titre Description Tags Stories Notes
AlienVault.webp 2018-08-20 13:00:00 (Déjà vu) How to Get into Infosec: InfoSec Career Path Hacking (lien direct) Maybe you've always dreamt of getting into the InfoSec field, and have been thinking about getting into information security for a while, or it's just coming to mind now. Regardless of where you are in your journey, welcome to the InfoSec community! In the words of the great Kung Fu Master, Shifu, “There is no level zero.” If you’ve seen Kung Fu Panda, you may recall that Po is a panda who eats, sleeps, and breathes Kung Fu, yet finds himself outside that community. He dreams of being a warrior. One day, he sees an opportunity to witness a significant moment in Kung Fu history and so he sets out on his journey.  But first, he must climb to the temple. It would have been easy for him to zig-zag his way to the top of the mountain, though it might have taken longer. Instead, he started with the logical place... the stairs - a much shorter path. You too will have to choose your path to awesomeness. Allow me to illuminate the way. “There is no level zero.” Find Your Why Po wanted to be great at Kung Fu purely for the sake of being great. Unfortunately, that probably won’t be enough to sustain you in the InfoSec field.  We all have selfish motivations, but they should pale in comparison to the greater good of our community, industry, and humanity. You will meet many who have forgotten that we are doing this for people, not to serve technology. Find your "why", and let it be outside yourself. That motivation will carry you through the many challenges, twists and turns along the way. “You will meet many who have forgotten we are doing this for people…” Take the Shortest Path The circuitous route is to acquire the necessary skills along whatever path you are on now. Even so, you will at some point have to focus on the particulars of those skill areas and invest in them. The alternative is the more direct route of certification and/or education. Although it may be more difficult, it will give you a more immediate opportunity. Certifications offer concentrated, focused training in a specific set of topics to support your goals. For example, the SANS Institute and CompTIA have well-planned certification roadmaps. Simply take a look at them, consider your current ability level and pick a certification as a starting point. Another resource is the free site Cybrary.it which hosts training courses in the certification area of your choosing. Don't forget to schedule your exam to give you motivation. Just taking an exam is a learning experience. Here’s a blog on the value of certifications you might want to look at. A wise mentor once told me that in order to be successful in InfoSec you need strong bases in at least one but preferably two of three areas: development, system administration, or networking. You may, perhaps, choose certifications such as Python and Powershell, A+, NET+, CCNA, Windows, Linux, and others. These may be vendor specific or vendor-agnostic. Employers will prefer a mix of both, depending on their alliances, partnerships, and the technologies that they leverage to deliver their business. Security job postings are an excellent source of this business intelligence. Regardless of how you choose to invest your time and ene Threat
My email: