Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Cybersecurity Career Master Plan
  • Table Of Contents Toc
  • Feedback & Rating feedback
Cybersecurity Career Master Plan

Cybersecurity Career Master Plan

By : Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen
4.6 (34)
close
close
Cybersecurity Career Master Plan

Cybersecurity Career Master Plan

4.6 (34)
By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen

Overview of this book

Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you’ll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you’ll discover the importance of defining and understanding your brand. Finally, you’ll get up to speed with different career paths and learning opportunities. By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression.
Table of Contents (15 chapters)
close
close
1
Section 1: Getting Started with Cybersecurity
4
Section 2: Your Path into the Industry
10
Section 3: Now You're in; Time to Level Up!

Understanding the top prominent cybersecurity domains

Despite the diverse number of subfields, in this book, we'll concentrate on the most in-demand areas of each domain shown in the preceding section, which are listed in the following table. Note that each domain has several areas that are equally in demand. However, since it is not practical to list all of them, only some have been chosen:

Table 2.1 – In-demand areas of domains

Let's simplify and focus our mind map view so that it mirrors this chapter's topic, like so:

Figure 2.2 – Cybersecurity domains

In this section, we learned that cybersecurity is a broad field that contains many sub-fields of different focuses. The sub-fields we are going to work on are Risk Assessment, Governance, Threat Intelligence, Security Operation, Security Architecture, and cybersecurity Education, respectively. In the upcoming sections, each of these domains will be closely...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY