This is a presentation I have delivered to under graduate students who are interested in cyber security and want to know the strategy to get into cyber security by preparing themselves while studying their under graduation.
2. Personal
Personal
About me
12+ years of experience in IT.
Worked in Zoho, Netsurion, Trustwave and BT
Experience in following areas of Cybersecurity
Security Operations
Threat hunting
Product/Solution Designing & Implementing
Consultant/Presales & Support
Vulnerability Assessment
Risk Analysis
3. Personal
Personal
What’s ahead?
Why cybersecurity?
What’s missing?
CyberSec Roles
Breaking down the roles
Getting started
Preparing yourself
Further reading
9. Personal
Personal
CyberSec Roles – Penetration Tester
White hat hacking
Finding gaps
Break into network
Analyze security measures and report
Can work independently - Bug Bounty $$$$
11. Personal
Personal
CyberSec Roles – Security Architect
Designing security solutions and framework
Identify new security requirements
Tune existing security controls
Closing the gaps
12. Personal
Personal
CyberSec Roles – Forensics Analyst
Recover and examine evidence
Prepare reports based on evidence
Work with law enforcement
Maintain chain of custody
13. Personal
Personal
CyberSec Roles – Security Auditor
Ensuring organization are adhering rules.
Assess the security risks and report it.
Recommends standards and practices.
Work with top management for remediation measures.
14. Personal
Personal
CyberSec Roles – CISO
Top management role in cyber security.
Heads all department in security and decision maker.
Identifies security objectives and metrics.
Managing Incident Response plan.
15. Personal
Personal
Getting started
Strong Basics
Networking, OS, Cryptography
Decide between security analyst/ penetration tester.
Security
Analyst
Penetration
Tester
• Big data analysis
• SIEM - Splunk, Qradar, ArcSight
• Scripting (Python, JavaScript, SQL)
• Know the tools
16. Personal
Personal
Getting started (contd.)
Free resources
TryHackMe
Hackthebox
Cyberdefenders
Cybrary
US Department of Homeland Security
Open Security Training
Heimdal Security
Sans Cyber Aces Online
Paid resources
Udemy
Future Learn
Coursera
Pluralsight
17. Personal
Personal
Preparing yourself
Make a plan.
Strong Basics.
Set up a lab and start experimenting.
Effective use of LinkedIn, Twitter, Blog.
Start planning a cyber sec final year project.
Stay updated.
19. Personal
Personal
One more thing
Password hygiene
Stop using one password for multiple accounts.
Start using a password manager. (Bitwarden, Keepass)
Enable 2FA wherever available.
Subscribe to data breach notifications from https://haveibeenpwned.com