473,594 Members | 2,812 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Cyber Security Career Advice Please

5 New Member
I’m interested in a career change.
My current job involves a lot of logic problems, though not IT related. With some research it appears cyber security and ethical hacking might be a career path for me to pursue.
Are there any free online courses or topics suggested I search on YouTube, etc, that would help me learn about cyber security so I can better understand if I have enough interest and intellect to fully continue down this career path?
Mar 6 '21 #1
10 45436
Divyan
5 New Member
Making one attempt to bump this
Mar 12 '21 #2
SwissProgrammer
220 New Member
"viewed: 987" and no one even replied a "hello."

Most books and college classes and on-line courses on security and computer security and hacking and variations of hacking (as they relate to computers and computer systems), I have found to be much worse than a waste of time.

Do a Google search on +"security" +"bytes.com" and read what has been said here, all of it by everyone that has posted here since this site began. Then read all of what those posters have said in their other posts. This, as I see it, is an industrial site frequented by people that actually make a living from what they talk about. You should study here first.

Then, after you have read all of that, do a Google search on just +"security". But, it has been my experience that commonly the actual best results on Google for this type of search are at least 10 or maybe 50 listings from the top.

You, YOU, just you, have to study. You HAVE TO study.
Mar 12 '21 #3
Divyan
5 New Member
@SwissProgrammer
This was worth the 987 non hello posts.

Thank you for your information. I’ll be searching this site for more information. I plan to spend much time studying, but want to make sure I study the correct areas of focus and don’t want to waste my time. For that reason, thank you again for this post.

I’ve seen both cyber security and ethical hacking in most of my research up up this point. How do these two careers differ?
Mar 13 '21 #4
Niheel
2,456 Recognized Expert Moderator Top Contributor
SwissProgrammer has provided good information and guidance.

Cyber security is such a broad topic. Everything from application security, data storage, data access, network access, authentication and identity services can fall into the scope of cyber security. That's just a few of the areas, there's many more.

Ethical hacking seems like a proactive approach to cyber security. It has taken off in recent times as an acceptable form of a career path in cyber security. There seem to be good practices available on the internet on how to contribute to the community and the overall health of the internet while at the same time developing skills.

Recently I ran into OpenBugBounty.o rg and it seems like an interesting approach to ethical hacking. They provide a way to learn about various vulnerabilities as they surface across the internet and also provide details on how to deal with them and how other's dealt with them if they did.

Here are some resources:
Hope that helps!
Mar 14 '21 #5
cetpainfotech
15 New Member
There are many resources available online that can help you learn about cybersecurity and ethical hacking. Here are a few options for online courses and resources that you can use to explore this career path:

Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Essentials: This is a free online course that covers the basics of cybersecurity and is designed for individuals with little or no cybersecurity background.

SANS Cyber Aces Online: This is a free online course that covers the fundamentals of cybersecurity, including network security, cryptography, and incident response.

edX Cybersecurity MicroMasters: This is a series of five online courses that cover the fundamentals of cybersecurity, including network security, cryptography, and incident response.

Hack the Box: This is a platform that offers a variety of cybersecurity challenges that can help you learn about different types of security vulnerabilities .

YouTube: There are many cybersecurity experts who share their knowledge through video tutorials on YouTube. Search for specific topics of interest like "ethical hacking", "penetratio n testing", "network security" and you'll find many informative and educational videos.

Cybersecurity Ventures: This is a website that provides free resources for cybersecurity professionals, including a cybersecurity career guide, news and articles, and a list of cybersecurity events.

Cybersecurity Challenge UK: This website offers a variety of challenges, competitions and training to help individuals develop their cyber security skills and knowledge.There are many resources available online that can help you learn about cybersecurity and ethical hacking. Here are a few options for free online courses and resources that you can use to explore this career path:



It's important to note that while these resources can be a great starting point, they may not cover all the necessary skills and knowledge to become a professional in cybersecurity. Therefore, it's important to continue learning and developing your skills through formal education, certifications, and hands-on experience.
Jan 28 '23 #6
tmudgal16
10 New Member
Yes, cyber security is in high demand. It is the most effective method for choosing a career in cyber security. The cybersecurity field involves protecting computer networks and data from unauthorized access, use, or destruction.
Feb 9 '23 #7
numberwhun
3,509 Recognized Expert Moderator Specialist
Cyber Security is the broader term covering many areas of security. When talking about Ethical hacking you can then delve into Penetration Testing (which is basically 'teaming' to test a companies systems (network and web) to see how secure they are. By teaming, I mean red, blue or purple teams (you can google those for more information, but red is the attack team, blue is defensive team and purple act as an intermediary between red and blue. But I diverse.

There is also Bug Bounty, which is hunting for bugs in company systems that have bug bounty programs.

In all, I would recommend you finding a high level cyber security course on youtube and watch it. It will give you a better idea of the plethora of areas that exist and examples of each. You can then explore each to gauge your interest.
Jul 14 '23 #8
zukeztomz
1 New Member
Thank you for your information.
Jul 15 '23 #9
NoelleGeorge
3 New Member
Switching to cyber security sounds exciting! To get started, search for free online courses on platforms like Coursera, edX, and YouTube. Look into basic concepts like network security, cryptography, and ethical hacking. You might also want to explore hrd corp claimable courses for more structured learning. Best of luck on your journey!
Sep 25 '23 #10

Sign in to post your reply or Sign up for a free account.

Similar topics

6
1518
by: frank | last post by:
I am in the process of writing a fairly large ASP.NET web application and I am about to implement log-ons, permissions etc. I have never used any security with ASP.NET before; only classic ASP. I would like to base my user's logon information and permissions on their domain account. What is the best way to do this? Can web-based forms communicate with the domain users accounts? What about storing session information - how do we do this?...
1
1122
by: John | last post by:
I have vb 6 apps that use sql server for the backend. These apps compile as a standalone exe file. Therefore, I am able to put these in one place on the network and all the users can run the application. I am trying to move these vb 6 apps to vb.net. I can create a folder on the network with the exe and dlls. It works this way, but I would prefer not to have all the dlls in the folder. This causes me to unnecessarily duplicate the dlls on...
1
9613
by: David Van D | last post by:
Hi there, A few weeks until I begin my journey towards a degree in Computer Science at Canterbury University in New Zealand, Anyway the course tutors are going to be teaching us JAVA wth bluej and I was wondering if anyone here would be able to give me some tips for young players such as myself, for learning the language. Is this the best Newsgroup for support with JAVA?
7
2431
by: Steven Blair | last post by:
I have a DB connection performance issue in my C# app. I have used the Stopwatch to track how long it takes to do a couple things. Creating a SqlConnection object takes 19ms, and Opening a connection (Sql2005) takes roughly 120ms. Connecting to Sql2000 is around 64ms. Does this sound correct, and can I speed this, since 140ms is unacceptable for creating a connection in this app.
1
1492
by: =?Utf-8?B?RW1tYSBIb3Bl?= | last post by:
Hi All, I need some advice please. I have very good knowledge of MS Access, Excel etc, reasonable knowledge of VBA and some very basic knowledge of VB6 and virtually non-existant knowledge of web based 'stuff'. I wish to build an application which will allow the user to enter a company and some information about it, once certain information is added, it will allow the user to run certain reports. This information needs to be stored...
0
2465
by: 8675309jl | last post by:
If you need it: http://www.career-advisor.net
0
3259
by: pycrypto | last post by:
Hi, I am working as an Infrastructure consultant with software engineering background. I have almost finished my 9yrs of IT experience in Infrastructure with the knowledge of Linux,Scripting, deployment, cluster implementation and etc... I'm interested to go in R&D. What should I do next ? Experienced geeks, please guide me.
3
3342
Nauticalgent
by: Nauticalgent | last post by:
Good morning Bytes, I have posted this question in some other forums - I am casting a wide net because I need some good advice. We have recently upgraded from SQL Server 2008 to 2014 two days ago and the smoke has finally settled. I thought about making a post about the pit-falls (error 44447 and 44446) but since there are NO entries on this forum or any other I frequent I figured it was so infrequent it wouldn't be worth it. While I...
0
8253
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8009
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8240
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
6661
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
5739
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
3903
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2389
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1482
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
1216
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.