SlideShare a Scribd company logo
1 of 16
Cyber Security
A Beginner's Guide
By RR Group & Kolte Training Center
Index Cyber Security Introduction
 Overview & Introduction
 Industry Applications & Trends
 Key Terminologies
Key Points
 Is Cyber Security a Good Career Option.
 Key Skills Needed to be in Cyber Security
 Types of Cyber Security Roles
Depth Guide
 Salary Per Role In Industry
 Certifications Needed For Each Role
 Our Guidance
O v e r v i e w
 Cybersecurity is the protection of
internet-connected systems such as
hardware, software and data from
cyberthreats. The practice is used by
individuals and enterprises to
protect against unauthorized access
to data centers and other
computerized systems.
 It sounds like something out of a
movie, but unfortunately, it’s a
common occurrence in today’s online
landscape. This is why Cyber
Security has become such a vital
part of any business strategy—and
Cyber Security specialists are in
demand now more than ever.
Introduction
 Cybersecurity is the protection of
internet-connected systems such as
hardware, software and data from
cyberthreats. The practice is used by
individuals and enterprises to protect
against unauthorized access to data
centers and other computerized systems.
 With an increasing number of users,
devices and programs in the modern
enterprise, combined with the increased
deluge of data -- much of which is
sensitive or confidential -- the
importance of cybersecurity continues to
grow. The growing volume and
sophistication of cyber attackers and
attack techniques compound the
problem even further.
Key Applications
The important applications of cyber security
are as follows:
 Access Control: In this application,
authentication, authorization, and
monitoring are focused
 Telecommunications and Network
Security: Information and
communication confidentially are
protected.
 Information Security Governance and
Risk Management: This application of
cyber security deals with risk
management, security governance, data
integrity, security education, and risk
analysis.
Key Applications
The important applications of cyber security
are as follows:
 Software Development Security:
Identification of software defects during
development and ensuring that policies
are addressed and regulatory
requirements are maintained.
 Cryptography: Encryption of sensitive
information and decryption of this
information for the authorized people.
 Legal, Regulations, Investigations, and
Compliance: The investigation of
suspicious events and legal protocols.
Regulation maintenance and compliance.
Key Trends in
I n d u s t r y
 The global cyber security market size
was valued at $197.36 billion in 2020,
and is projected to reach $478.68 billion
by 2030, growing at a CAGR of 9.5%
from 2021 to 2030.
Trends In Cyber Security
 Rise of Automotive Hacking.
 Potential of Artificial Intelligence (AI)
 Mobile is the New Target.
 Cloud is Also Potentially Vulnerable.
 Data Breaches
Is Cybersecurity a
G o o d C a r e e r ?
 The U.S. Bureau of Labor Statistics
estimates that the employment of
information security analysts will
grow 310 percent from 2021 to
2029. In comparison, the average
growth rate for all other occupations
is nearly 160 percent higher .
 The field of cybersecurity offers
plenty of variety. Businesses across
all industries – from healthcare and
finance to entertainment and retail
– face cybersecurity challenges, so
there are opportunities in countless
fields and disciplines.
C y b e r s e c u r i t y
C a r e e r P a t h
 Depending on your experience level,
you may consider the following
cybersecurity jobs:
 Entry-level: Systems Administrator,
Network Engineer, Network
Administrator, Security
Administrator
 Mid-level: Cybersecurity Analyst,
Penetration Tester, Security
Technician, IT Auditor
 Senior-level: Cybersecurity Manager,
Cybersecurity Engineer, Chief
Information Security Officer
Key Skills Needed
to be in Industry
 A bachelor's degree in engineering
or CS or A master's degree
 Proven skills in security testing and
auditing and security risk
management
 Cybersecurity leadership
 Cryptology
 Knowledge of government and
national security Network security
 Privacy engineering
 Problem-solving skills
 Analytical skill
 Technical writing skills
 Coding
 Expertise in law
Cybersecurity
Job Titles
Position one can get in Industry
 Cybersecurity Analyst
 Cybersecurity Specialist
 Security Systems Administrator
 Chief Information Security Officer
 Forensic Computer Analyst
 Penetration Tester
 Security Architect
 Security Manager
 Information Security Analysts
 Security Engineer
 Cryptographer
 Security Consultant
Salary Per Job
Titles in Industry
 Systems Administrator - $79,990
 Programmer Analyst - $81,334
 Systems Analyst - $81,970
 Security Analyst - $92,552
 Network Engineer - $100,000
 Security Engineer - $119,981
 Chief Information Security Officer -
$230,801
Top Certifications
in the Industry
 Certifications needed in the Industry
 Certified Information Systems Security
Professional (CISSP)
 Certified Information Systems
Auditor (CISA)
 Certified Information Security Manager
(CISM)
 Certified Ethical Hacker (CEH)
 GIAC Security Essentials Certification
(GSEC)
 Systems Security Certified Practitioner
(SSCP)
 Offensive Security Certified
Professional (OSCP)
Top Certifications
in the Industry
EC Council Certifications
 CSCU - Certified Secure Computer User
 ECSS - EC-Council Certified Security
Specialist
 ECES - EC-Council Certified
Encryption Specialist
 CND - Certified Network Defender
 CPENT – Certified Penetration
Testing Professional
 CTIA - Certified Threat Intelligence
Analyst
 ECIH - EC-Council Certified Incident
Handler
 CHFI - Computer Hacking Forensic
Investigator
Top Certifications
in the Industry
EC Council Certifications
 CSA - EC-Council Certified SOC
Analyst
 EDRP - EC-Council Disaster
Recovery Professional
 CASE Java - Certified Application
Security Engineer Java
 CASE .Net - Certified Application
Security Engineer .Net
 LPT - Licensed Penetration Tester
 CEH Master
Thank You

More Related Content

What's hot

Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageErik Van Buggenhout
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 

What's hot (20)

Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
SIEM and SOC
SIEM and SOCSIEM and SOC
SIEM and SOC
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 

Similar to Cyber Security Seminar.pptx

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right ChoiceEmma Thompson
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfsphinx Worldbiz
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfMax Secure Ltd
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 

Similar to Cyber Security Seminar.pptx (20)

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontier
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Why MSc is Right Choice
Why MSc is Right ChoiceWhy MSc is Right Choice
Why MSc is Right Choice
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Cyber Security Seminar.pptx

  • 1. Cyber Security A Beginner's Guide By RR Group & Kolte Training Center
  • 2. Index Cyber Security Introduction  Overview & Introduction  Industry Applications & Trends  Key Terminologies Key Points  Is Cyber Security a Good Career Option.  Key Skills Needed to be in Cyber Security  Types of Cyber Security Roles Depth Guide  Salary Per Role In Industry  Certifications Needed For Each Role  Our Guidance
  • 3. O v e r v i e w  Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  It sounds like something out of a movie, but unfortunately, it’s a common occurrence in today’s online landscape. This is why Cyber Security has become such a vital part of any business strategy—and Cyber Security specialists are in demand now more than ever.
  • 4. Introduction  Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  With an increasing number of users, devices and programs in the modern enterprise, combined with the increased deluge of data -- much of which is sensitive or confidential -- the importance of cybersecurity continues to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.
  • 5. Key Applications The important applications of cyber security are as follows:  Access Control: In this application, authentication, authorization, and monitoring are focused  Telecommunications and Network Security: Information and communication confidentially are protected.  Information Security Governance and Risk Management: This application of cyber security deals with risk management, security governance, data integrity, security education, and risk analysis.
  • 6. Key Applications The important applications of cyber security are as follows:  Software Development Security: Identification of software defects during development and ensuring that policies are addressed and regulatory requirements are maintained.  Cryptography: Encryption of sensitive information and decryption of this information for the authorized people.  Legal, Regulations, Investigations, and Compliance: The investigation of suspicious events and legal protocols. Regulation maintenance and compliance.
  • 7. Key Trends in I n d u s t r y  The global cyber security market size was valued at $197.36 billion in 2020, and is projected to reach $478.68 billion by 2030, growing at a CAGR of 9.5% from 2021 to 2030. Trends In Cyber Security  Rise of Automotive Hacking.  Potential of Artificial Intelligence (AI)  Mobile is the New Target.  Cloud is Also Potentially Vulnerable.  Data Breaches
  • 8. Is Cybersecurity a G o o d C a r e e r ?  The U.S. Bureau of Labor Statistics estimates that the employment of information security analysts will grow 310 percent from 2021 to 2029. In comparison, the average growth rate for all other occupations is nearly 160 percent higher .  The field of cybersecurity offers plenty of variety. Businesses across all industries – from healthcare and finance to entertainment and retail – face cybersecurity challenges, so there are opportunities in countless fields and disciplines.
  • 9. C y b e r s e c u r i t y C a r e e r P a t h  Depending on your experience level, you may consider the following cybersecurity jobs:  Entry-level: Systems Administrator, Network Engineer, Network Administrator, Security Administrator  Mid-level: Cybersecurity Analyst, Penetration Tester, Security Technician, IT Auditor  Senior-level: Cybersecurity Manager, Cybersecurity Engineer, Chief Information Security Officer
  • 10. Key Skills Needed to be in Industry  A bachelor's degree in engineering or CS or A master's degree  Proven skills in security testing and auditing and security risk management  Cybersecurity leadership  Cryptology  Knowledge of government and national security Network security  Privacy engineering  Problem-solving skills  Analytical skill  Technical writing skills  Coding  Expertise in law
  • 11. Cybersecurity Job Titles Position one can get in Industry  Cybersecurity Analyst  Cybersecurity Specialist  Security Systems Administrator  Chief Information Security Officer  Forensic Computer Analyst  Penetration Tester  Security Architect  Security Manager  Information Security Analysts  Security Engineer  Cryptographer  Security Consultant
  • 12. Salary Per Job Titles in Industry  Systems Administrator - $79,990  Programmer Analyst - $81,334  Systems Analyst - $81,970  Security Analyst - $92,552  Network Engineer - $100,000  Security Engineer - $119,981  Chief Information Security Officer - $230,801
  • 13. Top Certifications in the Industry  Certifications needed in the Industry  Certified Information Systems Security Professional (CISSP)  Certified Information Systems Auditor (CISA)  Certified Information Security Manager (CISM)  Certified Ethical Hacker (CEH)  GIAC Security Essentials Certification (GSEC)  Systems Security Certified Practitioner (SSCP)  Offensive Security Certified Professional (OSCP)
  • 14. Top Certifications in the Industry EC Council Certifications  CSCU - Certified Secure Computer User  ECSS - EC-Council Certified Security Specialist  ECES - EC-Council Certified Encryption Specialist  CND - Certified Network Defender  CPENT – Certified Penetration Testing Professional  CTIA - Certified Threat Intelligence Analyst  ECIH - EC-Council Certified Incident Handler  CHFI - Computer Hacking Forensic Investigator
  • 15. Top Certifications in the Industry EC Council Certifications  CSA - EC-Council Certified SOC Analyst  EDRP - EC-Council Disaster Recovery Professional  CASE Java - Certified Application Security Engineer Java  CASE .Net - Certified Application Security Engineer .Net  LPT - Licensed Penetration Tester  CEH Master