Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Getting Started as a Big-Time Security Whiz

    By
    Larry Loeb
    -
    October 25, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Since my e-mail address gets put at the end of many of the things that I write, I (understandably) receive e-mails from people. Some are queries about what Ive written, some are pitches about products that I havent written about but someone wishes that I would, and some are pleas. The pleas are usually the most interesting, since they usually come from folk who realize they havent got a clue and want one rather badly.

      What they mostly seem to want is a clue about is how to become a big-time, big-deal, big-city security whizzo like I am. Sigh. I usually tell them that Im not, but that I just play one on TV. (Most of the people from the U.S. get the joke, but that line really throws the guys from Estonia and the like.) And then it turns out that most of the folks writing the pleas basically just want some idea of how to start in the “security field”. Maybe they arent happy with the job they have and want to move into another area. Maybe they think theyll make more money “doing security”. Maybe they just want a different kind of challenge. It varies.

      The first question I usually pose in response to that kind of query is “What do you mean by security?” People have so many misconceptions about what the field entails. But what Im really asking them is “Are you a GoodGuy or a Cracker”? GoodGuys (also called “white hats”) are interested in defending their systems, and crackers (a.k.a. the “black hats”) want to get into them. Usually, you are one or the other. (Of course someone may start out as a cracker, get tired of the hassle, and then decide to get a job selling their hard-earned knowledge of busting into systems. But that doesnt happen as often as you would think. Cutting your hair and wearing a tie is a big obstacle to some people.)

      A potential GoodGuy is encouraged to get certified in security by a recognized organization. Not only do you learn what you will need to know in order to do the job for someone that will pay you, but you also gain credentials that someone who will pay you wants to see that you have before they will hire you. Im thinking of something like (but not limited to) the CISSP certificate. CISSP stands for Certified Information System Security Professional. The CISSP examination consists of 250 multiple-choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium. More information about the training needed for this program can be found at www.cissps.com/.

      /zimages/4/28571.gifRead the full story on Ziff Davis Internets Security IT Hub: Getting Started as a Big-Time Security Whiz

      Avatar
      Larry Loeb

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×