1 of 28

CIS 52

Welcome to the last class!

Cybersecurity career overview

2 of 28

Logistics

The lab was due at 9am today

Last quiz will take place from 1pm till Sunday midnight

And you will be done!

3 of 28

Presentations

1

CSA Star Findings and Shai Hulud

David,Sanjay

2

Prowler

Ramos,Cesar

3

CSA STAR Summary and Prowler Tool

Njoroge,Peter Rerai

4

AWS Macie

Hollow,Craig Edward

5

Tool -- AWS Inspector

Thomas,Charnnel Shane

6

City of Oakland breach

Lam,James K

7

Shai-Hulud NPM worm

Pang,Andrew K

8

2019 Capital One Breach

Her,Rob Lue

9

Breach:microsoft cloud 2023-2024

Frozenda,Enayatullah

10

Snowflake Breach

Hall III,Nolan

11

Collins Aerospace Attack

Erdene-ochir,Byambaragchaa

12

CSA STAR Level 1 – AWS Self-Assessment

Abubaker, Ali

4 of 28

Detection And Response

  • Security Hub
  • Microsoft Sentinel
  • LimaCharlie

5 of 28

Prowler

  • setting up on your AWS account
  • running it

6 of 28

Review

  • AWS Academy -- Davis, Craig, Rob, Charnnel, Ali, Peter, Frosanda, Andrew, Nolan
  • Try Hackme -- Andrew, Craig, Nolan, Frozenda, Rob, Charnnel, Davis, Ali,
    • CTFs (3 CTFs) -- Craig, Davis, Rob, Ali(help)
  • Classes - Link
    • Introduction into core concepts
    • Identity and Access Management
    • Security Tools
    • Monitoring
    • Networking
    • Detection and Response
  • Handshake

7 of 28

AWS Cleanup

8 of 28

Self-explanatory

9 of 28

Keep in touch!

  • Add me on LinkedIn, if you want to: https://www.linkedin.com/in/vaibhavb
  • Let me know if I can help you with career advice, resume, etc.

10 of 28

That’s all, folks!

11 of 28

Security Careers & Certs

Additional Content

12 of 28

Jobs in Cybersecurity are plentiful!

  • Cybersecurity field is expanding at impressive rate.
  • “In the U.S., there are about 1 million cybersecurity workers, but there were around 715,000 jobs yet to be filled as of November 2021”, according to a report by Lightcast, a market research company.
  • Especially after the pandemics (COVID-19) changed our work style, there has never been a better time to launch a career in cybersecurity. Almost every company in the world today needs experts who know how to build and protect systems to mitigate persistent and potentially catastrophic cyber threats.

13 of 28

There are many types of jobs as well

Compliance specialists

Project Management

Detection & Response

Threat Analytics

DevOps

A bunch of others..

14 of 28

15 of 28

16 of 28

Many paths

  • The truth is that there is no real path to cybersecurity as a career; teenage hackers who target Navy intelligence officers with cyberwar backgrounds, political operatives who focus on privacy issues, or even political activists who go on to succeed in cybersecurity careers

17 of 28

From technical perspective..

  • If you really want to be a cybersecurity professional who is very good at what S(he) is doing, I can tell, from my experiences that have a piece of knowledge about the fundamentals of programming (preferably Python), computer networks, and Linux is critically necessary.

18 of 28

Networking & Linux

  • A cybersecurity professional should know the basics of computer networks such as network devices (ex: Router, Switch, Hub, Bridge, etc.), OSI and TCP/IP models, IPv4, IPv6, MAC address, ports, etc.
  • Most machines security sorts within the industry run some form of Linux within the foundation so there’s no getting around much of it. You may discover Linux type commands in switches, firewalls, stack balancers, and everything else beneath the sun
  •  Linux plays an inconceivably vital portion within the work of cybersecurity proficient. Specialized Linux disseminations such as Kali Linux are utilized by cybersecurity experts to perform in-depth entrance testing and vulnerability assessments, as well as give measurable investigation after a security breach.

19 of 28

The Three States of Digital Data�

Data at rest; Data at rest is a term that refers to data stored on hard drives, flash disks, in the cloud, or even on mobile devices.

Data in motion; Data in motion is data that is currently traveling across a network or processed in a computer’s RAM ready to be read or updated.

Data in use; Data in use is data that is being processed by one or more applications.

20 of 28

CIA Triad

In analyzing cybersecurity, the first step is to look at the CIA triad, which is a well-known model for the development of cybersecurity.

Confidentiality is the ability not to disclose information to unauthorized persons, programs, or processes.

Integrity means that protection against improper modification and destruction of information, ensuring that information cannot be changed undetected, and ensuring the integrity of the information.

Availability ensures that information is available to those in need that includes timely and reliable access, regardless of the time of day, place of residence, location, or other factors.

21 of 28

Being a Hacker vs Being a Bug Bounty Hunter

Being a cybersecurity professional doesn’t necessarily to be a hacker or a bug bounty hunter.

Bug Bounty Hunt is the process of searching for bugs, finding vulnerabilities, and reporting the reward to the security team of the site.

Usually, the word “hacker” is used with its negative meaning. From this perspective, a hacker is a person who uses knowledge to somehow undermine technology and steal something valuable or other malicious. Hacker, on the other hand, can be categorized into three;

22 of 28

Hats

White Hat Hackers; White Hat Hackers exploit vulnerabilities not to gain a personal advantage but helping organizations assess and strengthen their network security against bad actors.

Black Hat Hackers; Black Hat hackers are cybercriminals who infiltrate computer networks and use the compromised data for personal purposes, so if you are looking for a solid career path, look no further than Black Hat hacking — for those who want to go.

Gray Hat Hackers; Gray Hat Hackers violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers.

23 of 28

Few Vendor-agnostic Certs

  • OSCP (Offensive Security Certified Professional); The Offensive Security Certified Professional (OSCP) is the companion certification for our Penetration Testing with Kali Linux training course and is the world’s first completely hands-on offensive information security certification. The OSCP challenges the students to prove they have a clear and practical understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.
  • CISSP (Certified Information Systems Security Professional); The Certified Information Systems Security Professional (CISSP) is an information security certification for security analysts.
  • CISA (Certified Information Systems Auditor); The CISA designation is a globally recognized certification for IS audit control, assurance, and security professionals.
  • CompTIA Security+; CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

24 of 28

There are �a lot of certs� out there..

25 of 28

What the future holds

  • There are two important technologies that are going shape cybersecurity deeply for sure. Blockchain and Artificial Intelligence.
  • You should know, at least, the fundamental concept of these technologies and have an idea about how to implement them into cyberspace.
  • In my opinion, having knowledge about these technologies will be required for cybersecurity positions in the near future.

26 of 28

What about AWS�specific certs?

27 of 28

Blogs

28 of 28

The End