How to Career Guide into Cyber Security
Requirements
- No experience necessary
- Bring curiosity and general interest with you!
Description
The How to Career Guide into Cyber Security takes you from little or no knowledge and helps set you on the right path for a future career within Cyber Security. You will learn which of the key skills is needed for the most successful path in the shortest time possible. The amount of cyber security information and detail on the internet is simply overwhelming, this short course is your guide covering the core areas seen time and again that are in demand within the industry.
Cyber security is a fast-growing area, specialists are needed today, with a skills shortage, you will be in high demand and focusing on the areas covered here will enable your career. If you are a beginner have no experience or curious about cyber security in general, this course is for you as it will give you the key areas to research and learn more about.
Some of the key areas this will help you with:
Become more informed about cyber security
Help you decide which direction to take
Increased knowledge about the needed skills to focus on within cyber security
Help you to prepare for the next opportunity
This short course is free, to help get you started, and at the end you will be better informed and more certain of your options and future!
Who this course is for:
- Any person interested in a career within cyber security
Instructor
Tim Coakley is a Senior Security Solutions Architect for a large multi-national organisation and an Intructor. Tim started a long and successful full-time career in Digital Forensics supporting the criminal justice system and law enforcement on a long list of criminal cases. Parallel to this Tim ran a research and development business creating solutions from design through to support resulting in some unique and niche software not developed anywhere else. Tim now works fully within the cybersecurity space and has supported and worked within many security teams including, Investigations, Incident Response, Threat intelligence, Penetration Testing, Governance and Engineering until landing into Security Architecture.