2.2.5 Lab - Maria
2.2.5 Lab - Maria
2.2.5 Lab - Maria
Objectives
Research and analyze what it takes to become a network defender.
Part 1: Conduct search of Certifications.
Part 2: Investigate positions available within cybersecurity
Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one
of the fastest growing and most in-demand professions. Individuals in this field perform a wide variety of jobs
including, but not limited to, consultation, investigation, and program management services to mitigate risks
from both internal and external sources. Cybersecurity professionals are required to evaluate, design and
implement security plans, conduct in-depth fraud investigation, perform security research and risk
assessment, and propose solutions to potential security breaches.
Individuals with good security skills have a great earning potential. To be considered for one of these high
paying jobs, it is very important to have the proper qualifications. Because of this, it is important to consider
the industry certifications available for this career path. There are many certifications to choose from.
Selecting the right certification(s) for you requires careful consideration.
Note: You can use the web browser in the virtual machine that was installed in a previous lab to research
security-related issues. By using the virtual machine, you may prevent malware from being installed on your
computer.
Required Resources
PC or mobile device with internet access and virtual machine (optional).
Instructions
2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Lab - Becoming a Defender
b. Pick three certifications from the list above and provide more detail about the certification requirements
and knowledge gained i.e.: vendor specific or neutral, number of exams to gain certification, exam
requirements, topics covered etc.
Certified Information Systems Security Professional (CISSP):
Organización: (ISC)²
Requisitos: Mínimo cinco años de experiencia laboral remunerada acumulativa en dos o más de
los ocho dominios del CISSP CBK (Cuerpo Común de Conocimiento de CISSP).
2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Lab - Becoming a Defender
Organización: EC-Council
Requisitos: No hay requisitos específicos, aunque se recomienda tener al menos dos años de
experiencia laboral en el ámbito de la seguridad de la información.
Examen: El examen CEH consta de 125 preguntas de opción múltiple, y los candidatos tienen
cuatro horas para completarlo.
CompTIA Security+:
Organización: CompTIA
Requisitos: No hay requisitos previos, aunque CompTIA recomienda tener al menos dos años de
experiencia en administración de IT con enfoque en seguridad.
2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Lab - Becoming a Defender
a. How many new job listings were posted within the last two weeks?
numero de ofertas de Nuevo trabajoType your answers here.
End of document
2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com