Riley11 said 🔗
I’m studying networks right now within a boot camp 12 week program at a university, they put heavy stress on compliance from what I’m learning. I really want to get into the field , what is most important to focus on from
What you learned because I feel like most schools throw on extra info you won’t even use but I can’t dissect that part. I’ve run wireshark and Nmap plus Nessus with instruction but don’t remember all the commands to do it on my own for example .
|
Sorry in advanced for the long winded explanation but want to make sure I answer your question correctly like I wish someone would have answered it for me long ago.
First, don't worry about not remembering all of the wireshark or Nessus commands. Even if you were doing it at a gig, you wouldn't need to know them all by heart. You would eventually start doing it so much, you would eventually start remembering them and knowing it by heart as a result. It's really not like how you think. If you get a job in it, they only want to make sure that you have done it and that you have an understanding of what you're doing and that you can come in and get to work. That's all.
Bruh, the thing to understand about Cyber is there are a lot of different disciplines just within Cyber. I have some homies that been in Cyber for a decade and only have focused on policies and controls.
I know other people that have only done pen tests and vulnerability analysis and don't understand certificate structures and revocation.
For example, you could do:
Forensics – investigative analysis to gather and preserve evidence for people doin while sh!t on a machine or to see what actions have taken place. You got people going to law school now and also getting certs and getting into this sh!t. it is crazy!
Disaster Recovery and Contingency Planning – performs planning and test how organizations deal with disasters. I have to do a lil of this.
Information Security Auditing – examining the organization's practices and procedures, controls, protection mechanisms, physical security. I have to do a lil of this.
Software Assurance or Security Engineering - Secure coding practices and testing.
Test and Analysis - Checking new software and hardware and other technologies for weaknesses and against current policies. I just went through this last month. we wanted to integrate a 508 accessibility tool into our pipeline called DeQue Axe but they couldn't provide evidence or a statement that they were IPv6 compatible so our cyber team put a nix on it and said it introduces a vulnerability to that segment of the network.
Cryptanalysis and Cryptography – involves the creating, protecting, or breaking of ciphers and discovering any features or hidden parameters of an information system. With Crypto, NFTs, and block-chains, this segment is blowing up on the low. Plus traditional financial institutions are about to block-chain it up.
Information Security Policy and Planning – creating, updating and maintaining the information security policies. I do a lil of this.
Vulnerability Analysis and/or Pen testing - Conducting assessments of threats and vulnerabilities. I do a lil of this.
So there are some of the different responsibilities that Cyber practitioners have. Depending on the size of your organization, you may have one or more people performing multiple roles. I’ve worked in large organizations where you have a separate section responsible for each of these role.
All this is to say, don't sweat not knowing everything. It's like getting into IT. Get a good foundation and get your foot in the door. Once you learn the different lanes, you'll gravitate to something more specific.