2.2.5 Lab - Becoming A Defender

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Lab - Becoming a Defender

Objectives
Research and analyze what it takes to become a network defender.
Part 1: Conduct search of Certifications.
Part 2: Investigate positions available within cybersecurity

Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one
of the fastest growing and most in-demand professions. Individuals in this field perform a wide variety of jobs
including, but not limited to, consultation, investigation, and program management services to mitigate risks
from both internal and external sources. Cybersecurity professionals are required to evaluate, design and
implement security plans, conduct in-depth fraud investigation, perform security research and risk
assessment, and propose solutions to potential security breaches.
Individuals with good security skills have a great earning potential. To be considered for one of these high
paying jobs, it is very important to have the proper qualifications. Because of this, it is important to consider
the industry certifications available for this career path. There are many certifications to choose from.
Selecting the right certification(s) for you requires careful consideration.
Note: You can use the web browser in the virtual machine that was installed in a previous lab to research
security-related issues. By using the virtual machine, you may prevent malware from being installed on your
computer.

Required Resources
 PC or mobile device with internet access and virtual machine (optional).

Instructions

Step 1: Conduct search of Certifications.


a. Use your favorite search engine to conduct a search for the most popular cybersecurity-related
certifications. List them below with the organization that provides the certification.
Answer:
1. Offensive Security Certified Professional (OSCP) - is an ethical hacking certification offered
by Offensive Security that teaches penetration testing methodologies and the use of the tools included
with the Kali Linux distribution.
2. CompTIA Advanced Security Practitioner (CASP+) - is the ideal certification for technical
professionals who wish to remain immersed in technology as opposed to strictly managing.
3. Certified Information Security Manager (CISM) - is a certification for advanced IT
professionals who want to demonstrate that they can develop and manage an infosec program at the
enterprise level.
T

ype your answers here.

2018 -2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 3 www.netacad.com
Lab - Becoming a Defender

b. Pick three certifications from the list above and provide more detail about the certification requirements
and knowledge gained i.e.: vendor specific or neutral, number of exams to gain certification, exam
requirements, topics covered etc.
Answer:
1. Offensive Security Certified Professional (OSCP) - There are no formal requirements to
take the exam. Offensive Security recommends familiarity with networking, Linux, Bash scripting, Perl or
Python, as well as completion of the Penetration Testing with Kali course.
2.. CompTIA Advanced Security Practitioner (CASP+) - The exam covers advanced topics like
enterprise security domain, risk analysis, software vulnerability, securing cloud and virtualization technologies,
and cryptographic techniques. There’s not a formal prerequisite for taking the CASP+ exam. CompTIA
recommends it only for experienced cybersecurity professionals with at least ten years of IT administration
experience (including five years of broad hands-on experience with security).
3. Certified Information Security Manager (CISM) - To take the CISM exam, you need at least
five years of experience in information security management. Satisfy up to two years of this requirement with
general information security experience. You can also waive one or two years with another certification in good
standing or a graduate degree in an information security-related field.

Type your answers here.

Step 2: Investigate positions available within cybersecurity


Glassdoor is one of the largest job sites worldwide. Using your browser of choice, access glassdoor.com and
search to find cyber security jobs available that were posted within the last two weeks. Adjust the search as
Questions:
you would like. You can search for jobs in your area or an area that you would like to live and work in.
a. How many new job listings were posted within the last two weeks?
Answer: Cagayan de Oro City has 6 cyber security Job listing that were posted last two weeks.

b. What is the salary range for the top 10 listings?


Salary: Php12,000.00 – 18,900.00 per month

c. What are the most common qualifications required by employers?


 Graduate of BS Computer Science, BS ComEng, BS IT, BS Electronics Engineering (EcE),
other IT related courses
 At least one (1) year of work experience in Level 2 Technical support and Systems
Operations or two (2) years of work experience in Level 1 Technical support/service desk
support.
 Required skill(s): Net Applications, Visual Basic, SQL, Windows Server, Web-based

 Willing to work in the office

d. What industry certifications are required by these employers?


Answer: Some industries don’t require certifications. They usually require experience.
.

2018 - 2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 3 www.netacad.com
Lab - Becoming a Defender

e. Do any of the certifications match the ones that you found in Step 1a?
Answer: No
Type your answers here.

f. Investigate online resources that allow you to legally test your hacking skills. These tools allow a novice
with limited cyber security experience to sharpen their penetration testing skills. One such site is Google
Gruyere (Web Application Exploits and Defenses). What kinds of challenges can you find?
 HackThisSite
 Root Me
 OverTheWire
 HackThis!!
 WebGoat
 Hellbound Hackers

2018 - 2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 3 www.netacad.com

You might also like