Cybersecurity E Book
Cybersecurity E Book
Of Your Dreams:
The Cybersecurity Career Handbook
To l u l o p e M i c h a e l
Copyright © 2023 by Tolulope Michael. All Rights Reserved.
No Part of this publication may be reproduced, stored in a retrieval
system or transmitted, in any form or by any means electronic,
mechanical, photocopying, recording or otherwise without prior
written permission from the publisher, except for the inclusion of brief
quotations in a review.
Table of Contents
Foreword
Preface
INTRODUCTION
Chapter 1
An Overview of Cybersecurity..................................................................1
Chapter 2
Network Security......................................................................................27
Chapter 3
Building a Strong Foundation: Computer Science Essential Concepts.......60
Chapter 4
Gaining Hands-on Experience: What You Should Know About Internships,
Hackathons and Online Resources ...........................................................76
Chapter 5
Cybercrime Investigation In Cybersecurity................................................92
Chapter 6
Networking and Professional Development...............................................114
Chapter 7
Leadership and Management in Cybersecurity..........................................131
Chapter 8
The Future of Cybersecurity: Emerging Trends and Technologies ..............149
Chapter 9
Future-Proofing Your Career: Career Progression in Cybersecurity ............165
Bibliography
About The Author
Foreword
i
cybersecurity career. The book provides a solid foundation for those who
are just starting to explore the cybersecurity field, as well as valuable
insights for those who are already working in the industry and looking to
expand their knowledge and skills.
The author has done a fantastic job of breaking down the complex and
often intimidating world of cybersecurity into simple and understandable
terms. He provides a clear and concise overview of the key concepts,
technologies, and best practices that are essential for success in this field.
Whether you are a recent graduate, a professional looking to make a career
change, or a student just starting to explore the cybersecurity field, this
book will provide you with the information and guidance you need to
succeed.
Babatunde Stephen
Senior Cybersecurity Consultant.
ii
Preface
So let’s begin this exciting journey together and explore the world of
cybersecurity.
iii
INTRODUCTION
iv
In this book, you will learn the basics of cybersecurity. You will gain an
understanding of what cybersecurity is, why it is important, and the
various types of cyber-attacks. You will also learn about the different types
of cyber threats, including malware, phishing, and ransomware. You will
gain foundational understanding of the cybersecurity industry and see
why this field is so crucial in the modern world.
There are a variety of jobs available in the cybersecurity industry, and you
will find in this book an overview of the most common roles. You will learn
about the different types of cybersecurity jobs, including security analyst,
penetration tester, security architect, and more. You will get to know the
responsibilities of each role, the skills and qualifications required, and the
average salaries in each position.
Additionally, you will also come across a roadmap for building your career
in cybersecurity. You will learn about the various steps you need to take
to launch your career, including networking, gaining experience through
internships or volunteer work, and creating a strong resume and cover
letter. The importance of ongoing education and professional development
in the cybersecurity industry is also explained in detail.
v
The job market in the cybersecurity industry is competitive, and the author
has provided you with tips and strategies for navigating it. You will learn
about the different types of job search strategies, including networking,
online job boards, and recruiters.
Several other useful tips have also been included in this book to ease you
into this new and exciting phase of your career. Remember, a better version
of you is always waiting at the other side of discipline so get ready to work.
vi
Chapter 1
An Overview of Cybersecurity
1
Chapter 1: An Overview of Cybersecurity
and delete the Creeper. As a result, Reaper has been cited as the very first
example of checking malware antivirus and also the first self-replicating
program.
The purpose of hacking in its early days wasn’t for financial gain or to
access people’s information as there wasn’t much of such data in abundance
to begin with. The reason for it was to find out what was possible and
how much mess could be created. As technology progressed, and more
individuals, businesses and government needed to take their activities
online, threats also multiplied alongside. Attackers discovered gains that
could be financial, a power-move or an act of holding computer-system
users to ransom. Data breach became the goldmine for criminals hiding
behind keyboards.
2
The Cybersecurity Career Handbook
The fact that the dangers to security are constantly changing is probably
one of the most challenging obstacles to cybersecurity. New attack vectors
are generated as a result of the emergence of new technologies and the
novel and unconventional ways they are used. It might be difficult to
keep up with these constant changes and advancements in assaults and
to update procedures to defend against them. While bigger organisations
can easily improve on making sure that all cybersecurity components
are regularly updated to guard against any vulnerabilities, smaller firms
without the workforce or internal resources can find this very challenging.
3
Chapter 1: An Overview of Cybersecurity
Advancement in technology has also brought about the ease with which
we can share, store and transmit data through the use of technologically
enabled devices. The risk to this process however is that storage and
transmission of sensitive data across these various computer systems can
be very difficult to safeguard thereby increasing the need for vigilance and
the individuals who are trained to oversee it. Necessary precautions need
to be taken to ensure that what we consider to be private information to
us can not be accessed by prying individuals.
4
The Cybersecurity Career Handbook
Some of the job types available within the cybersecurity field include;
1. Computer Forensic Analyst:
A computer forensic analyst is the person who assesses devices and
systems and finds a method for recovering data. They use forensic
tools and investigative approaches to find specific data. These data can
be in the form of internet use history, word processing documents,
images and other files. The data they retrieve can be used in criminal
investigations, evidence in cases of cyber crime e.t.c. This role stands
at the intersection of cybersecurity and criminal justice.
2. IT Security Specialist:
An individual in this role works with a team of IT professionals to
develop innovative ways of protecting devices and systems within an
organisation from cyber attacks. They are well versed in the various
aspects of information security and the challenges that come with
network security. The IT security specialist is charged with the task of
assessing a system and identifying areas of weaknesses where a breach
may easily occur and also where they can be strengthened. They may
also perform test attacks to better understand how the current security
strategies perform.
5
Chapter 1: An Overview of Cybersecurity
3. Security Manager:
A security manager deals with high-level IT security issues. They serve
as a leader who oversees security measures within an organisation.
Their duties include hiring new employees, management of IT teams,
developing strategies for cybersecurity efforts, overseeing budgets,
evaluating new security tools and technologies and they may also be
in charge of writing rules and regulations regarding any cybersecurity
decision that may be taken in an organisation.
4. Security Engineer:
Security engineers are technical professionals With in-depth knowledge
of computer networking and operating systems. Their focus is on how to
constantly implement important security measures in an organisation.
They also resolve problems with technology such as IT software and
equipment. A more specific explanation of this role is that they are in
charge of installing firewalls, implementing breach detection systems
and working with other professionals to solve security-related issues.
Also, a security engineer tests security systems, conducts assessments,
analyses risks and suggests ways to prevent breaches in the future.
5. Security Consultant:
Also known as the Security Analyst is the person who helps to detect
vulnerabilities in computer systems, software programs, networks
and provides solutions towards strengthening them against hackers.
They help organisations identify ways in which an existing setup is
not functioning optimally and how they can be improved. A security
consultant may advise on specific systems and products depending on
the needs of the organisation.
6. Director of Security:
A director of security leads both managers of security and information
technology staff. This role is often only found in large companies
that have a higher number of professional team members dedicated
to maintaining system security. The director is expected to provide
leadership and guidance by administering and maintaining policies
to ensure security at all times. They also serve as the middleman who
6
The Cybersecurity Career Handbook
7
Chapter 1: An Overview of Cybersecurity
8
The Cybersecurity Career Handbook
To get started as a cybersecurity expert, you have to be aware that there are
various career paths for newbies to think about. It is usually best to start
with an entry-level role the most common being Information Security
Analyst, Information Security Specialist, Security Engineer, Security
Consultant, Digital Forensic Examiner, IT Auditor e.t.c. Entry-level roles
typically require a bachelor’s degree in computer science or related field
plus a few years of relevant experience. Technical skills and familiarity
with programming languages are also key features for the perfect entry-
level employee. Many cybersecurity professionals often enter the field
after gaining ample experience in an entry-level IT role.
Similarly, you could start with feeder roles such as Networking, Software
Development, Systems Engineering, Financial and Risk Analysis, IT
Support or even Security Intelligence.
People in advanced level roles typically manage those in mid and entry
levels. For advanced levels, a cybersecurity professional may occupy
roles such as Cyber Security Manager, Cyber Security Engineer, Chief
Information Security Officer or Cyber Security Architect. Each of these
roles requires years of experience and has executive level responsibilities
attached to it.
9
Chapter 1: An Overview of Cybersecurity
10
The Cybersecurity Career Handbook
The roles that require hands-on technical competence fall in this category.
As a technical expert, you will be required to comb through data and
display your knowledge of systems, networks and other tools to mention
a few. Your goal will be to prevent, detect and respond to cyber threats.
11
Chapter 1: An Overview of Cybersecurity
12
The Cybersecurity Career Handbook
For someone looking to start a career here, this means that there is ample
opportunity for you to get into the cybersecurity space with minimal
struggle and loads of opportunities to grow, diversify and give great value
for your expertise.
13
Chapter 1: An Overview of Cybersecurity
The current talent shortage has also created an edge for skilled cybersecurity
professionals in the sense that organisations all over the world are ready
to pay six-figure salaries for qualified individuals. The average salary of a
Cybersecurity Architect for instance is estimated at $130,000 while Cyber
Security Specialists can earn up to upwards of $91,000 per annum.
According to Mondo’s Tech Salary Guide as of January 2023, the six highest-
paid cybersecurity jobs can pay as high as $225,000. An Information
Security Manager can earn between $150,000 and $225,000. A Cyber
Security Engineer role nets between $126,000 and $213,000 per year.
Jobs in Application Security Engineering rakes in between $130,000 and
$200,000 while a Network Security Engineer can earn between $120,000
to $208,000. A Cuber Security Analyst and Penetration Tester (Ethical
hacker) fall within the range of $114,000 and $160,000.
The reason why employers are willing to pay this much for skilled hands
is not difficult to figure out at all. Between 2020 and 2021, the yearly
average data breach was said to have increased the most - a spike that was
most likely heavily influenced by the COVID -19 pandemic. In 2022
alone, the average data breach cost has been put at $4.35 million, a 2.6%
rise from the 2021 amount of $4.24 million. The idea is simply to pick
one’s poison.
A need unmet invariably creates opportunities for those who can provide
solutions. Cybercrime is predicted to cost the world $10.5 trillion annually
by the year 2025. To prevent or at least prepare to wage war against this
kind of threat, new jobs are continually being generated to build the army
needed to take up arms against cyber attacks.
14
The Cybersecurity Career Handbook
As the future of the industry shines brighter, some skills become more
sought after than some others. Listed below are 10 cybersecurity positions
you should look into acquiring for the future.
15
Chapter 1: An Overview of Cybersecurity
To prevent future loss, organisations now store their data in the cloud.
The cloud also provides a safe haven for data from cyber attacks. For
such attacks to take place, research has shown that most breaches happen
as a result of human-errors and not due to mistakes from cybersecurity
professionals who must be able to design and implement security controls
that protect cloud infrastructure.
16
The Cybersecurity Career Handbook
Common operating systems such as Linux and Windows are also needed
knowledge bases you need to touch. All these different tools and many
others are part of the skills that will definitely stand you out anywhere in
the world.
Penetration Testing
When a test hack turns out successful, the cybersecurity team uses such data
to develop better strategies to resolve potential points of vulnerabilities.
Some testing tools you should be familiar with include Nessus, Metasploit,
Jawfish, SQLMap.
In the next five years, the demand for software developers and engineers is
expected to grow by 164% according to Burning Glass. A good candidate
for application security will need to have outstanding skills in building,
implementing and maintaining secure applications.
17
Chapter 1: An Overview of Cybersecurity
The next course of action after a data breach is an investigation into how
the attack occurred. Digital forensics as to do with examining data to
decipher the origin of a cyberattack and how to prevent future occurrence.
HTML, MySQL, Python, PHP, JavaScript and Ruby are just a few of the
most common ones you should improve your skills with.
Risk assessment helps to identify weak points in a system and work towards
fixing them. It is an integral part of any professional’s cybersecurity skill
set. Artificial intelligence is also sometimes employed to gather data from
numerous nodes throughout networks after which the collected data is
evaluated in real time to detect patterns of abnormal activities.
To improve your skills in this role, you need to have a good understanding
of Security Incident, Event Monitoring technologies such as Splunk which
can be used to collect data for continuous monitoring.
18
The Cybersecurity Career Handbook
19
Chapter 1: An Overview of Cybersecurity
Emerging Technologies
At the very top of this list is Artificial intelligence also known as AI. It is one
of the most advanced security programs experts employ in understanding
the cyber environment and identifying abnormal activities.
In the last few years, AI has proliferated into various industries. These
days, AI coupled with machine learning algorithms are used in crunching
data, computerising tasks and speed up the process of taking decisions
very quickly on the next line of action. We will delve deeper into this
later on.
Most entry level roles do not require you to have coding capabilities or a
good grasp of programming languages but as you progress in your career
or switch roles as the case may be, you will be required to master and have
a really good knowledge of top programming languages.
Employers are always ready to put their money on the best guy, what you
need to do is ensure you are the best guy or at least give yourself a fighting
chance. The right sets of programming language and coding skills can
make all the difference in your career growth and advancement.
20
The Cybersecurity Career Handbook
Let’s give you a head start by examining some of the top-tier programming
languages that employers are expected to be on the lookout for in the
coming years.
Below are some of the most popular programming languages that will be
in demand for a long time.
1. JavaScript:
This is one of the core technologies of the World Wide Web that is
highly sought after by employers. JavaScript is a high-level language
used as a client-side programming language by almost all websites.
It is also one of the most hacked tools since input from users and
browser data can easily be collected and webpage manipulation can
easily be done for any purpose. JavaScript must not be mistaken with
Java although they share similarity, there are distinctions between
them.
2. Python:
Python is a beginner-friendly programming language that is quite
popular among programmers. It is a free open-source programming
language that comes with extensive support modules and community
development. Security professionals often use python to automate
scripts which enables them to build programs instead of just buying.
It is also used in scientific and computational applications such as
Abacus and FreeCAD.
21
Chapter 1: An Overview of Cybersecurity
3. Java:
This is a high-level, programming language that is class-based and
object oriented. Developers use it to construct applications for data
centres, laptops, game consoles, cell phones, scientific supercomputers
and other related devices. It is also used in the backend of several
popular websites such as Amazon, Google, YouTube and Twitter. Due
to its complex nature, experienced developers with Java coding skills
are always in high demand.
4. Go:
Go or Golang as it is sometimes called is a statically typed, compiled
programming language designed by Google. It was created to aid
the work of programmers working on large projects. Go recently has
become one of the fastest growing programming languages due to its
ease-of-use and its ability to handle massive codebases. Its simple and
modern structure and syntax familiarity has made it quite popular
among many large IT companies.
5. PHP:
Created in 1990, PHP is an open-source programming language
many web developers find essential. It has been used to build more
than 80% of websites on the internet including popular ones like
Facebook and Yahoo. PHP is a powerful tool for making dynamic
and interactive web pages. It is considered a relatively easy language
to learn for a beginner with several communities online to follow for
support and guidance.
6. C#:
This multifaceted programming language is another popular general
purpose tool recommended to learn. It covers a variety of programming
disciplines hence the wide acceptability it enjoys. C# is best suited
for applications on Windows, Android and iOS and is used on the
backend of several popular websites such as Bing, Dell, Visual Studio
and many more.
22
The Cybersecurity Career Handbook
7. Kotlin:
Kotlin is a modern cross-platform, statically typed, general purpose
programming language. It is used extensively for web applications,
desktop applications, Android apps and server-side application
development. It was built to be interoperable with Java and also
supports functional programming languages.
8. R:
This Programming language is most used for statistical computing
including linear and nonlinear modelling, calculation, testing,
visualisation and analysis. Unlike some other open-source
programming languages, R is not as easy for beginners to pick up but
there are several communities online where you will find developers to
aid your learning journey.
9. Swift:
Swift is an easy-to-learn open-source programming language that
supports almost everything from the programming language objective
-C. Compared to other programming languages, it requires fewer
coding skills and can be used with IBM Swift Sandbox and IBM
Bluemix. Popular iOS apps like WordPress, Mozilla Firefox and
SoundCloud use the Swift programming language.
10. MATLAB:
It is a programming language owned by MathWorks built specially for
scientists and engineers for programming and numeric computing.
MATLAB allows matrix manipulations, plotting of functions and
data, implementation of algorithms, creation of user interfaces and
interfacing with programs written in other languages. Programmers
use it to build machine learning and deep-learning applications.
11. Ruby:
Ruby is another beginner-friendly programming language that is
focused on simplicity and productivity. It was designed to be flexible
from the standpoint of its object-oriented architecture that supports
procedural and functional programming notation. There is a growing
23
Chapter 1: An Overview of Cybersecurity
interest in Ruby because it is easy to learn and write in. You will also
find a community of programmers online for support and to provide
answers to questions you may have.
12. C and C++:
C is arguably the oldest and most popular programming language
and often referred to as the root of other languages like C#, Java and
JavaScript while C++ is an enhanced version of C. They are mostly used
in developing applications where performance is a critical issue such as
client/server applications, video games and commercial products like
Firefox and Adobe.
13. TypeScript:
Developed by Microsoft, TypeScript is relatively new compared to
other programming languages. It is well suited to large code bases and
is used to create JavaScript-based projects with typing in both client
and server-side development. This makes it quite useful for spotting
errors and preventing systemic issues.
14. SQL:
SQL is short for Structured Query Language. It allows you to access
and manipulate databases and is the world’s most widely used
database query language. Although it is quite challenging to learn,
its benefits far outweigh the difficulties of using it. E-commerce
applications, web applications and data warehouses adopt its usage for
improved performance, better data integrity and more accessible data
manipulation.
15. HTML:
HTML stands for HyperText Markup Language. It is the standard
markup language for documents designed to be displayed in a
web browser. It can be used to add images, links and other types
of content to be displayed on a web page. HTML is quite simple
to learn and doesn’t require you knowing much about it to create
a basic web page. It supports the creation of structured documents
by indicating structural semantics for text elements such as headings,
lists, paragraphs, quotations and other objects.
24
The Cybersecurity Career Handbook
16. Scala:
Scala is a strong statically typed general-purpose programming language
that combines both object-oriented and functional programming. It
helps avoid bugs in large and complex applications. Scala can be used
for any task Java does. Companies that use Scala include Twitter and
Netflix.
17. NoSQL:
NoSQL are non-relational databases that provide high performance
adaptability to a range of capabilities. They are often used in big data
applications that require data to be distributed across many nodes.
Some types of NoSQL databases include key-value stores, pure
document databases, graph databases and Column databases.
18. CSS:
CSS means Cascading Style Sheet. As the name implies, it is a stylesheet
language that instructs the browser on how we want our HTML to
appear. This means, it is used to describe how a page produced in
markup language is presented. It helps developers create a responsive
and accessible website that looks good on any device. With CSS,
you can style how you want components, grid elements and images
to appear, even making the website easy to navigate for people with
disabilities.
19. Perl:
Sometimes interpreted to mean Practical Extraction and Report
Language, Perl is a high-level, general purpose programming language
originally designed for text manipulation. It is used for system
administration, networking and other applications that involve user
interface. Perl is also lauded for its power and versatility.
20. Rust:
This is another multi-paradigm high-level, general-purpose
programming language. It is a memory-efficient tool that lays
emphasis on type safety, performance and concurrency. Rust runs very
fast, prevents segfault and guarantees thread safety. Professionals often
25
Chapter 1: An Overview of Cybersecurity
rely on its use for mission-critical software because of its safety and
reliability.
There are several other programming languages apart from the 20 listed
here but to start your journey into programming, learning any of these will
be an excellent place to start. You can also find several platforms online
offering bootcamps and courses that will equip you with the necessary
skills in a short time.
Asides learning the language, you will also be issued a certificate for
credibility and pave your way better to landing a well-paying programmer
job.
26
Chapter 2
Network Security
There are many ways a system may be compromised and left vulnerable to
attackers. These vulnerabilities can appear in devices, data, applications,
users and locations. Due to this, providing security for each area of
weakness must be specific and in folds to guarantee that people with
malicious intent do not gain access.
A well designed network security ensures that client data and information
is protected and shared data is also secure in order to provide reliable
access and network performance.
27
Chapter 2: Network security
There are typically three ways in which network security is controlled and
enforced. There are:
1. Physical Network Security.
2. Technical Network Security.
3. Administrative Network security.
28
The Cybersecurity Career Handbook
Firewalls
A firewall acts as a barrier between an external untrusted network and
an internal trusted network. It is adopted in controlling incoming and
outgoing traffic on networks with predetermined security rules. To keep
out unfriendly traffic into a network system, firewalls are configured by
administrators to block or permit entry or exit to a network.
29
Chapter 2: Network security
30
The Cybersecurity Career Handbook
Sandboxing
The practice of sandboxing refers to a process where organisations scan
for malware by opening a file in a safe and isolated environment before
granting it access to their network. Sandboxing first observes the files or
code as they are opened and looks for malicious behaviour to prevent
threats from getting on the network.
31
Chapter 2: Network security
The challenge for computer scientists has been to develop protocols that
allow processes running on host computers to interpret the signals they
receive and engage in meaningful conversations in order to accomplish
tasks on behalf of users. These Network protocols also include flow
control, which helps keep a data sender from swamping a receiver with
messages that it hasn’t been processed yet or stored due to space shorts and
error control.
32
The Cybersecurity Career Handbook
Threats to control systems can come from various sources. These threats
are constantly evolving and new ones are emerging all the time, so it
remains essential for organisations and individuals to stay informed and
take proactive measures to protect themselves against these threats. Some
common sources of threats include:
1. Nation States:
Hostile countries may launch a cyber attack against companies or
institutions with the aim of interfering with communications, cause
disorder and inflict damage.
2. Terrorist Organisations:
Terrorist organisations are often known to conduct cyber attacks
with the aim of destroying or abusing critical infrastructure, threaten
national security, disrupt economies, and cause bodily harm to citizens.
3. Hackers:
These are individuals or groups who use their expertise to gain
unauthorised access to computer systems and networks. They may
target an organisation using a variety of attack techniques. Hackers
33
Chapter 2: Network security
Like we have mentioned before, cyber threats can take many forms or
shapes. One of the most common and often used types are Malware
Attacks.
34
The Cybersecurity Career Handbook
Malware Attacks
A malware short for malicious software is a software that is designed to
harm or damage computer systems and networks. It infiltrates a system
usually via a link on an untrusted website, email or an unwanted software
download. It then deploys on the target system, collects sensitive data,
manipulates and blocks access to network components and may even
destroy data or shut down the system altogether. Some well-known types
of malware include:
1. Viruses:
A visual is a self-replicating program that can attach itself to another
program or file in order to reproduce. When executed it replicates
itself by modifying other computer programs and inserting its own
code into those programs. If the process of replication is successful,
the affected areas are then said to be infected with a computer virus.
They generally need a host program in order to take action. The virus
writes its own code into the host program and when the program
runs, the written virus program is executed first, causing infection
and eventual damage. As a result of the millions of dollars worth of
damages caused by viruses each year, an industry of antivirus software
has cropped up either selling or freely distributing protection to users
of various operating systems.
2. Worms:
A worm is a malware that seeks to exploit software vulnerabilities and
back doors to gain access to an operating system. Unlike the virus,
a worm is a stand-alone malware that does not require a code to
replicate itself and spread to other computers. Instead, it relies on a
computer network to spread itself, relying on security failures on the
target computer to access it. It uses this machine as its host to scan
and infect other computers. Once these worm-invaded computers are
controlled, the worm will continue to scan and infect other computers
using these computers as hosts with the same pattern of behaviour
continuing. Worms almost always cause some amount of damage to
a network, even if only by consuming bandwidth, whereas viruses
35
Chapter 2: Network security
36
The Cybersecurity Career Handbook
There are several types of social engineering tactics that attackers use to
manipulate individuals into divulging sensitive information or performing
actions that may compromise security. Some of the most common types
are:
1. Phishing:
This is a type of social engineering in which attackers use email or text
messages to trick individuals into providing sensitive information. The
attacker may send an email pretending to come from a trusted source
in order to lure individuals to divulge information such as passwords
or financial details.
2. Vishing:
Vishing meaning voice phishing is when an attacker uses phone calls
to trick an individual into providing sensitive information or into
performing actions that may compromise security. It typically targets
people in the older age spectrum but can be employed against anyone.
3. Baiting:
This is the type of social engineering where an attacker uses the promise
of something desirable such as a prize or a reward to trick individuals
into providing sensitive information or to take action that may leave
weakness in security they can exploit.
37
Chapter 2: Network security
4. Pretexting:
Similar to baiting, the attacker pressures the target into giving
up information under false pretences. This typically involves
impersonating someone with authority whose position will compel
the victim to comply.
5. Shareware:
This is a type of social engineering in which attackers use fear,
uncertainty, and doubt to trick individuals into providing sensitive
information or into performing actions that may compromise security.
6. Piggybacking:
Piggybacking is when an authorised user provides physical access
to another individual who piggybacks off the user’s credential. For
example, an employee may grant access to someone posing as a new
employee who misplaced their credential card.
SQL Injection
SQL injection is a type Injection cyber attack that targets databases by
injecting malicious SQL code into web application’s input fields. The goal
of the attack is to gain unauthorised access to sensitive data stored in the
database, such as user passwords or financial information. SQL injection
attacks can be used to steal data, modify data, or even delete data from
a database. It is important to use prepared statements and parameterized
queries to prevent SQL injection attacks. Additionally, using a web
application firewall can help protect against these types of attacks.
38
The Cybersecurity Career Handbook
2. Union-based:
This type of attack allows the attacker to combine the results of
multiple SELECT statements into a single result set. This can be used
to gain access to data that is not normally visible to the attacker.
3. Blind:
Blind SQL injection attacks do not reveal the results of the injected
SQL code, making them more difficult to detect. These types of attacks
can be used to extract sensitive data over time by repeatedly making
small changes to the injected SQL code.
4. Error-based:
This type of attack leverages error messages returned by the database
to extract sensitive data.
5. Inferential:
This type of attack uses a series of true or false queries to infer data
from a database without directly accessing it.
Man-in-the-Middle Attack
A man-in-the-middle (MitM) attack refers to a cyber attack where an
attacker intercepts and alters communication between two parties
without their knowledge or consent. The attacker is able to read, insert,
and modify messages as they pass through the network, potentially
stealing sensitive information or injecting malware. MitM attacks can be
mitigated through the use of encryption and secure protocol, as well as by
using trusted networks and verifying the identity of the parties involved
in the communication.
39
Chapter 2: Network security
Denial-of-Service Attack
A denial-of-service attack is one in which the perpetrator seeks to
make a machine or network resource unavailable to its intended users
by temporarily or indefinitely disrupting service of a host connected to
a network. This kind of attack overloads the target system with a large
volume of traffic, thereby hindering the ability of the system to function.
An attack that involves multiple devices as the target is known as a
distributed denial-of-service (DDoS). There are several types of DDoS.
Some of them are SYN flood DDoS, UDP flood DDoS, HTTP flood
DDoS, ICMP flood, NTP amplification.
40
The Cybersecurity Career Handbook
With some of the threats identified and several others security experts are
discovering regularly, ensuring we put security measures in place is the
obvious first place to begin. Listed below are some popular ones;
1. Using a strong and unique password:
A strong password is one that is difficult for others to guess or crack.
It should be at least 12 characters long and include a mix of uppercase
and lowercase letters, numbers, and special characters. It is also
important to use a different password for each of your accounts, in
case one password is compromised, the others won’t be put at risk too.
2. Enabling two-factor authentication:
Two-factor authentication (2FA) adds an extra layer of security to your
accounts by requiring a second form of verification, such as a code
sent to your phone or a fingerprint scan, in addition to your password.
This makes it much more difficult for someone to gain unauthorised
access to your accounts, even if they have the password.
3. Keeping software and operating systems up to date:
Software and operating system vendors regularly release security
patches for known vulnerabilities. By keeping your software and
operating system up to date, you can ensure that your devices and
network are protected against the latest threats.
4. Being cautious of suspicious emails or links:
Phishing emails are a common tactic used by attackers to gain access to
sensitive information. These emails may contain links or attachments
that when clicked, will install malware on your device or take you to a
fake website designed to steal your login credentials.
5. Using a firewall:
A firewall is a security system that monitors and controls incoming
and outgoing network traffic based on a set of security rules. It helps
to prevent unauthorised access to a network and can also be used to
clock certain types of traffic, such as incoming traffic from known
malicious IP addresses.
41
Chapter 2: Network security
42
The Cybersecurity Career Handbook
That means the OSI provides the standards for different computer systems
to be able to communicate with each other. It can be seen as a universal
language for computer networking and is based on the concept of dividing
a communication system into seven abstractly as each one stacked on top
of the last.
Each layer of the OSI model takes care of a specific job and communicates
with the layers above and below itself.
The OSI model guides technology vendors on the design of software and
hardware that can be operated together, providing a clear framework that
describes the capabilities of a network communication or system. It can
also be seen as a universal language for computer networking.
The OSI model is very useful for troubleshooting network problems Even
the most modern Internet does not strictly follow its methodology. One
very good use of the model is the fact that it’s easier to trace problems
due to the nature of the model. When there’s a challenge in the network
system, it is easier to narrow down and isolate the source of the trouble. If
the problem can be narrowed down to one specific Layer of the model, a
lot of unnecessary work can be avoided.
43
Chapter 2: Network security
The seven abstraction layouts of the OSI model identified from top to
bottom are as follows:
1. Application Layer:
Of all the layers in the OSI model, this is the only layer that directly
interacts with data from the user. This is because at this layer, both
the end-user and application layer interact directly with the software
application. Software applications like web browsers and email
clients rely on the application layer to initiate communications. It is
important to know that client software applications are not part of
the application layer; rather the application layer is responsible for
the protocols and data manipulation that the software relies on to
present meaningful data to the user. The application layer identifies
communication partners, resource availability, and synchronises
communication. Examples of this include HTTP and SMTP.
2. Presentation Layer:
This layer prepares data for the application layer. In other words, it
makes the data presentable by formatting or translating it for the
application layer based on the syntax or semantics that the application
accepts. It is also responsible for encryption and compression of data.
For instance, if two communication devices communicating are using
different encoding methods, layer six is responsible for translating
incoming data into a syntax that the application layer of the receiving
device can understand. In the process of compressing data for the
application layer, The presentation layer improves the speed and
efficiency of communication by minimising the amount of data that
will be transferred.
3. Session Layer:
This layer is responsible for opening and closing communication
between two devices. A session refers to the time between when the
communication is opened. The session covers when a connection
between machines is set up, managed and terminated. The session
44
The Cybersecurity Career Handbook
layer ensures that the session stays open long enough to transfer all the
data being exchanged and then promptly closes the session in order
to avoid wasting resources. Additionally this layer also synchronises
data transfer with checkpoints. This is applicable for example if a
file is being transferred and there’s a disconnect during the session.
Without the checkpoints, the entire transfer will have to begin again
from scratch instead of where it left off.
4. Transport Layer:
Transport layer manages the delivery and error check of data packets. It
provides the functional and procedural means of transferring variable-
length data sequences from a source host to a destination host from
one application to another across the network, while maintaining
the quality of service functions. This layer also controls the reliability
of a given link between a source and destination host through flow
control, error control and acknowledgment of sequence and existence.
Flow control determines an optimal speed of transmission to ensure
that a sender with a fast connection remains at pace with a receiver
with a slow connection.
5. Network Layer:
This layer facilitates data transfer between two different networks. It
is responsible for the functional and procedural means of transferring
packets from one node to another connected in different networks.
This layer is not necessary if the two devices communicating are on
the same network. Packets which refer to segments from the transport
layer which are broken up into smaller units are reassembled on the
receiving device by the network layer. In addition, the network layer
is responsible for routing which refers to the best physical path for the
data to reach its destination.
6. Data Link Layer:
The data link layer provides node-to-node data transfer. It is quite
similar to the network layer except that the data link layer facilitates
data transfer between two devices on the same network. It’s responsible
for detecting and possibly correcting errors that may occur in the
45
Chapter 2: Network security
physical layer. This layer takes packets from the network layer and
breaks them into smaller pieces called frames. Similar to the network
layer, the data link layer is also responsible for flow control and error
control in intra-network communication.
7. Physical Layer:
The physical layer is responsible for the transmission and reception
of an unstructured raw data between a device, such as a network
interface controller, ethernet hub or network switch and a physical
transmission medium. It includes the physical equipment involved in
the data transfer such as the cables and switches. This is also the layer
the data gets converted into bit streams which are a string of 0s and 1s.
46
The Cybersecurity Career Handbook
47
Chapter 2: Network security
48
The Cybersecurity Career Handbook
4. Security Awareness:
A career in cybersecurity is one that requires the highest level of
security awareness. To curtail the activities of cyber criminals who
are regularly on the prowl and looking for weaknesses to exploit, a
professional should be knowledgeable about the current ways systems
can be exploited and what can be done to breach-proof it.
5. Problem-Solving Skills:
The ability to solve problems is a major part of many job roles but even
more so in cybersecurity. To be a good problem-solver, you need an
analytical mind as well as an ability to view situations from different
angles, think laterally and try new things.
6. Teamwork:
If there was ever a place where a tree does not make a forest, the cyber
job space would be it. There is often a misconception that a job in
cybersecurity is a solo task, but upon closer look, you will find that it
is not so. The ability to work independently is definitely an important
one but for the majority of scenarios, the ability to collaborate with
others both inside and outside of your department is a necessity. These
collaborations can range from building defence solutions as a team to
consulting with business units and working with their feedback.
7. Adaptability:
In cybersecurity, the ability to adjust to situations as they change can
make all the difference. Being flexible and adorable means you are
quick to embrace new ideas and not get hung up on existing solutions
8. Learning Capabilities:
Cybersecurity is one space that requires you to be a life-long learner.
Security professionals are expected to be up-to-date on trends and
vulnerabilities so they can quickly learn to adapt and apply the skills
they have gained in a new context.
49
Chapter 2: Network security
During interviews, having examples of all these skills and how you have
displayed them previously can help you stand out to employers and make
you all the more employable for your dream job.
Ethics in broad terms refers to the concerns humans have always had for
figuring out how best to live. It deals with our concepts of what is generally
believed to be right or wrong.
In cybersecurity today, ethical issues are at the core of practices that are
targeted towards ensuring the protection of data, networks and computer
systems. These data, systems and networks all have their own economic
or other value but what experts seek to protect the most is the integrity,
functionality and reliability of human practices and institutions that rely
on them. In protecting these institutions and practices, security experts
by extension are protecting the lives and well being of the human beings
who depend on them.
The goal of ethics is not to dictate what professionals must do when faced
with every ethical dilemma but to instil a strong sense of principles that
govern behaviour or conduct in order to prevent grave repercussions for
both the professional, the organisation and the individual.
50
The Cybersecurity Career Handbook
The security of any network has a lot more to do with ethics than we
realise. Many security breaches among IT experts have been traced to
ethical lapses from cybersecurity professionals. This makes it all the more
important and necessary that ethics in this space are enforced for the
benefit of all.
1. Harm to Privacy:
Privacy harm is often explained as the negative consequences of a
violation of privacy. One of the most common cyber threats to privacy
is identity theft. This is a situation in which personally identifying
information is stolen and used to impersonate victims in financial
transactions or other illegitimate purposes. The continued growth
of our global data system further amplifies the poor and unethical
cybersecurity practices around the world. Even those who have stayed
off the digital grid are not protected from the effects of privacy harm.
Friends and family members of people who even practise stringent
personal data security may unwittingly generate their data and
share online. Cybersecurity professionals are therefore pressured to
increase efforts by employing advanced cybersecurity tools and taking
specialised training.
2. Harm to Property:
The threat or attack on cybersecurity do not only cause damage to
digital properties. Physical assets may also be lost when a breach
occurs. Oftentimes, property can be directly targeted through cyber-
intrusions that may seek to misappropriate electronic funds, passwords
or even remotely cause damage to these properties. These forms of
exploitation can sometimes be instigated by criminals motivated
individuals or even politically affiliated groups.
3. Cybersecurity Resource Allocation:
Cybersecurity is expensive and this should also serve as a motivation
for professionals to keep their guards up at all times. The imposing
cost of system resources such as data storage capacity, power efficiency
51
Chapter 2: Network security
Cybercrime means any criminal act that involves the use of a computer or
a Computer network. Such criminal acts may include identity theft, fraud,
trafficking in child pornography and intellectual property or violating of
privacy.
52
The Cybersecurity Career Handbook
Categories of Cybercrimes
53
Chapter 2: Network security
There are keys relevant to the field of information security and of particular
interest those that live and/or work in the USA. The Computer Fraud and
Abuse act of 1986 (CFA Act) is the cornerstone of many computer-related
federal laws and enforcement efforts. In October 1996, it was amended
by the National Information Infrastructure Protection Act of 1996. This
modification covered several sections of the previous act and increased the
penalties of several crimes. Punishment for offences prosecuted under this
statute varies from fines to imprisonment of the 20 years of both.
The three criteria for determining the severity of punishment under this
law depends on the value of information and whether it was carried out
for the purpose of ;
- Commercial advantage.
- Private financial gain.
- In Furtherance of a criminal act.
Another key law is the computer security act of 1987. It was one of the first
attempts to protect federal computer systems by establishing minimum
acceptable security practices. The responsibility of developing these
security standards and guidelines fell to the National Bureau of Standard
in cooperation with the National Security Agency.
54
The Cybersecurity Career Handbook
55
Chapter 2: Network security
Asides the obvious and persistent skill gap and staffing issues in the
cybersecurity space, there are several other challenges that make working
in the field an uphill task for professionals. Everyday seems to unveil
even more trouble as the world experiences more progress in science and
technology.
56
The Cybersecurity Career Handbook
With the amount of personal and sensitive information the internet carries
about every single one of us such as home address, banking card details
and much more and the ever-present threat of breach on the horizon,
cybersecurity becomes even more indispensable and with a possibility of
major trouble lurking in every corner.
57
Chapter 2: Network security
3. Cloud Attacks:
A cyberattack that is channelled towards remote service providers
using their cloud infrastructure to offer hosting, computing or storage
services is called a cyberattack. Cloud storage providers are constantly
on the lookout as they are responsible for keeping data secure,
protected and running.
4. Phishing Attacks:
Phishing attacks have become increasingly sophisticated and often
transparently mirror the site being targeted , allowing the attacker
to observe everything while the custom is navigating the site. This
form of social engineering where attackers deceive people into
revealing sensitive information is one of the major challenges faced by
cybersecurity professionals.
5. Cryptocurrency and Blockchain Attacks:
Blockchain-based systems are off subject to internal and external
attacks these days. Despite the high level of security that Bitcoin and
Cryptocurrencies claim, cybercriminals have found a way to exploit
system loopholes and steal from unsuspecting users.
Despite all the various challenges that plague the Cybersecurity industry,
it is still one with a very promising future. Our world will forever be
reliant on technology creating boundless opportunities for those working
to make it secure.
58
The Cybersecurity Career Handbook
2. Job Growth:
Presently, cybersecurity experts are some of the most sought after
in the world and the trend is not going to change any time soon.
Cybersecurity represents one of the industries where professionals will
enjoy challenging roles with equally rewarding gains.
3. BYOD Policy:
This means Bring Your Own Device and is a policy that is expected
to boost opportunities in cybersecurity even more. As more businesses
are allowing employees to work remotely on their personal devices,
they are all the more vulnerable to cyber attacks. As a result businesses
are turning to cybersecurity to secure sensitive data by monitoring,
classifying and resolving various types of threat fueling market growth.
59
Chapter 3
Building a Strong Foundation:
Computer Science Essential Concepts
60
The Cybersecurity Career Handbook
61
Chapter 3: Building a Strong Foundation
Data Structure
This is the process of collecting and organising data in such a way that we
can easily perform operations on them in an effective way. It involves data
organisation, management and storage format that gives the most efficient
access to data.
62
The Cybersecurity Career Handbook
63
Chapter 3: Building a Strong Foundation
4. Queues:
A queue is a collection of entities that are maintained in a sequence and
can be modified by the addition of entities at one end of the sequence
and the removal of entities from the other end of the sequence. It has
a first in first out (FIFO) structure which can commonly be found in
many programming languages as well. This structure is named a queue
because it resembles a real-word queue. The queue’s basic operations
are ‘enqueue’ ( to insert an element to the end of the queue) and
‘dequeue’( to delete an element from the beginning of the queue).
Some applications of queues are in managing threads in multithreading
and implementing queueing systems.
5. Hash Tables:
Hash table also known as hash map is a data structure that implements
an associative array or dictionary. It stores values which have keys
associated with each of them. A hash table uses a hash function to
compute an index, also called a hash code, into an array of buckets
or slots, from which the desired value can be found. It efficiently
supports lookup when one knows the key associated with the value.
In an ideal situation, the hash function will assign each key to a
unique bucket, but most hash table designs employ an imperfect hash
function, which might cause hash collisions where the hash function
generates the same index for more than one key. Hash tables are used
to implement database indexes, implement associative arrays and to
implement the ‘set’ data structure.
6. Trees:
A tree is a widely used, non-linear data structure that represents a
hierarchical tree structure with a set of connected nodes. Each node in
the tree can be connected to many children ( depending on tree type),
but must be connected to exactly one parent, except for the root noise
which has no parent. This constraint means there are no cycles or
loops ( no node can be its own ancestor ) and also that each child can
be treated like the root of its own sub tree, making recursion a useful
technique for tree reversal. Tree data structures are applicable in binary
64
The Cybersecurity Career Handbook
65
Chapter 3: Building a Strong Foundation
Computer science and Cybersecurity are closely related as both involve the
use of computers and technology to solve problems and protect against
potential threats. Computer science provides the foundational knowledge
and tools needed for cybersecurity. In addition, many cybersecurity
professionals have a background in computer science, as they need to
understand how computer systems and networks operate in order to
identify and defend against potential vulnerabilities and attacks.
66
The Cybersecurity Career Handbook
6. Information theory:
In the context of cybersecurity, information theory provides a way
to model the trade-offs between different security goals, such as
confidentiality, integrity, and availability.
Algorithms
67
Chapter 3: Building a Strong Foundation
3. Common algorithms:
There are many different types of algorithms (such as quick sort
and merge sort), searching algorithms (such as binary search and
linear search), and graph algorithms (such as Dijkstra’s shortest path
algorithm and Prim’s minimum spanning tree algorithm).
4. Big O notation:
Big O notation is used to describe the time complexity of an algorithm,
which describes the upper bound in the number of operations it
performs as the size of the input increases.
5. Recursion:
Recursion is a technique where a function calls itself in order to solve
a problem. Some problems are naturally recursive and are more easily
solved using recursion.
6. Heuristics:
Heuristics are methods that are used to make decisions or solve
problems that may not have a clear optimal solution. Heuristics are
widely used in optimization problems, where the goal is to find the
best solution among many possibilities.
7. Divide and conquer:
Divide and conquer is a technique that involves breaking down a large
problem into smaller sub-problems and solving them independently.
This technique is often used in sorting and searching algorithms.
8. Dynamic programming:
Dynamic programming is a technique that is used to solve problems
by breaking them into smaller overlapping subproblems and then
reusing solutions to these sub-problems.
68
The Cybersecurity Career Handbook
List of Algorithms
All fields of science have their own problems and need efficient algorithms.
Listed below are some of the different aspects of algorithms:
- Search algorithm.
- Merge algorithms.
- Sorting Algorithms.
- Numerical algorithms.
- Graph algorithms.
- Computational geometric algorithms.
- String algorithms.
- Combinatorial algorithms.
- Medical algorithms.
- Machine learning.
- Cryptography.
- Data compression algorithms.
- Parsing techniques.
69
Chapter 3: Building a Strong Foundation
Let’s examine one of the most popular types, Sorting Algorithms. There
are many different types of sorting algorithms, each with its own set
of characteristics and trade-offs. Some of the most common sorting
algorithms include:
1. Bubble sort:
A simple sorting algorithm that repeatedly steps through the list to be
sorted, compares each pair of adjacent items and swaps them if they
are in the wrong order. It is a basic algorithm and not very efficacies
for large data sets, but it is easy to understand and implement.
2. Insertion sort:
This is another simple sorting algorithm that builds the final sorted
list one item at a time by repeatedly removing one element from the
input data, finding the location it belongs within the sorted list, and
inserting it there. It is more efficient than bubble sort and is often used
for small data sets or data sets that are already partially sorted.
3. Selection sort:
This is a sorting algorithm that divides the input list into two parts:
the sorted part at the left end and the inserted part at the right end.
It repeatedly finds the minimum element from the unsorted part and
moves it to the sorted part. Like bubble sort and insertion sort, it is
not efficient for large data sets.
4. Merge sort:
A sorting algorithm that divides the input list into two sublists,
recursively sorts each sublist, and then merge the two sorted sublists
to produce the final sorted list. It is highly efficient and can handle
large data sets and data sets with many unique elements.
5. Quicksort:
This algorithm uses a divide-and-conquer strategy to partition the
input list into two sublists: one containing items smaller than a chosen
‘pivot’ element, and the other containing items greater than the pivot.
It then recursively sorts the sublists. It is very efficient, especially for
70
The Cybersecurity Career Handbook
large data sets, but it can be slow on data sets with many unique
elements.
6. Radix sort:
The radix sort is one which sorts the elements of an array by first
grouping the individual elements of the array by their radix(i.e their
digits when represented in some base) and then sorting the elements
in each group. It is useful in sorting large data sets of integers, but may
not work as well for other types of data.
7. Heap sort:
A sorting algorithm that builds up a heap from the input list, and then
repeatedly extracts the maximum element from the heap and places it
at the end of the sorted list. It is efficient for large data sets and can be
implemented using a priority queue data structure.
8. Bucket sort:
This sorting algorithm distributes the elements of an array into a
number of ‘buckets’, and then each bucket is sorted individually,
either using a different sorting algorithm or recursively using the
bucket sort. It is efficient for large data sets with a limited number of
possible values.
9. Counting sort:
The counting sort algorithm is one that takes advantage of the fact
that the input consists of integers in a small range by counting the
number of occurrences of each value and then using this information
to determine the position of each value in the output array.
71
Chapter 3: Building a Strong Foundation
72
The Cybersecurity Career Handbook
They are user-defined data types that act as the blueprint for individual
objects, attributes and methods.
2. Objects:
These are instances of class created with very specific and defined data.
Objects can either correspond to things found in the real world or
they can represent abstract entities. When a class is defined initially,
the description is the only object that is defined.
3. Methods:
Methods are functions that are defined inside a class which describe
the behaviour of an object. Each method contained in a class
definition starts with a reference to an instance object. In addition,
the subroutines contained in an object are called instance methods.
Programmers use methods for reusability or keeping functionality
encapsulated inside one object at a time.
4. Attributes:
These are defined in the class template and represent the state of an
object. Objects usually have their data stored in the attributes field. A
class attribute belongs to the class itself.
73
Chapter 3: Building a Strong Foundation
methods accessible and also hides complexity so no one can see what’s
behind the object’s curtain.
2. Inheritance, Composition and Delegation:
Inheritance, composition and delegation are always that objects in
a program can relate to one another, but they are distinct concepts.
Inheritance is a mechanism where a new class (called a derived class
or child class) is created from an existing class(called a base class or
parent class). The derived class inherits properties and methods from
the base class and can also add new properties and methods. This
allows for code reuse and a clear hierarchy among classes. Rather than
utilising database tables and programming subroutines, the developer
utilises objects the user may be more familiar with: objects from their
application domain. Composition is when an object contains one or
more other objects as its properties. The composed object does not
inherit from the other objects but it can access their properties and
methods. This allows for code reuse and a way to model complex
relationships among objects. Object compositions is used to represent
“has-a” relationship for instance every employee has an address, so
every employee object has access to a place to store an address object
(either directly embedded within itself, or at a separate location
addressed via a pointer). Delegation on the other hand is a mechanism
where an object is passed as a parameter to another object, which then
uses the methods and properties of the passed object. This allows for
code reuse and a way to model complex relationships along objects.
3. Polymorphism:
This is the ability for a single function or method to operate on
multiple types of data, allowing for greater flexibility and code reuse.
Objects are designed in such a way that they can share behaviours
and they can take one more than one form. The program determines
which meaning or usage is necessary for each execution of that object
from a parent class, reducing the need to duplicate code.A child class
is then created, which extends the functionality of the parent class.
74
The Cybersecurity Career Handbook
4. Abstraction:
This is the ability to focus on essential features of an object and
ignore the unimportant details, simplifying the design process and
making the code more readable. Here, objects only reveal internal
mechanisms that are relevant for the use of other objects, hiding any
unnecessary implementation code. The derived class can have its
functionality extended. This concept can help developers more easily
make additional changes or additions over time.
This is the branch of computer science that deals with the design,
implementation, analysis, characterization, and classification of
programming languages and their individual features. Programming
language theory falls within the discipline of computer science, both
depending on and affecting mathematics, software engineering, and
linguistics.
Formal methods are a specific kind of maths- based technique for the
specification, development and verification of software and hardware
systems. It forms one of the foundational principles of software engineering,
especially where security and safety is involved. Formal Methods have
been employed in software testing since they help avoid errors and can
also give a framework for testing.
75
Chapter 4
Gaining Hands-on Experience:
What You Should Know About
Internships, Hackathons and
Online Resources
76
The Cybersecurity Career Handbook
Additionally, hiring managers get loads of resumes when new roles are
posted. How does one then stand out in a pile of resumes from more
experienced applicants or even beginners like yourself? Some amount of
experience gained through internships or co-op increases your odds of
being selected by a very wide margin.
77
Chapter 4: Gaining Hands-on Experience
Types of Internship
78
The Cybersecurity Career Handbook
Just like an actual job, getting a placement for an internship has its
procedures. Organisations do not just offer the opportunity to anyone
who applies. A person looking for an internship will need to devise
means to stand out from the crowd of applicants seeking the same role.
For applicants who are still students, maintaining an excellent grade and
participating in extracurricular activities that pertain to cybersecurity is a
sure fire way to get the hiring manager looking at their direction.
79
Chapter 4: Gaining Hands-on Experience
Once you scale through the application process, you will need to prepare for
an interview. Most organisations like to get to know their interns through
an interview process. Your interview should be taken as seriously as an
interview for a full-time job. To prepare for this part of your application,
you can search the internet for commonly asked internship interview
questions or check job listing sites like LinkedIn.com and Glassdoor.com.
Government Internships
This largely depends on the country you live in. Government internships
can also be a fantastic way to gain the necessary experience, knowledge
and skills needed to kickstart your career in cybersecurity.
80
The Cybersecurity Career Handbook
Non-government Internship
There are many websites accessible to anyone where you can find the
perfect internship program for you. Job listing sites are usually top on this
list:
♦ LinkedIn.com:
This a great resource for professionals in any industry throughout
their career. It provides an easy but effective way to create connections
that you will find help at any stage you may be in your career. You
can search for an internship by navigating the jobs page and search
for internships using the search bar. To make your search easy, using
specific keywords can help you narrow your search down to exactly
what you are looking for.
♦ Internships.com:
This is another fantastic place to locate the internship job of your
dreams. The website allows you to type in keywords and location to
filter out the program of your choice.
♦ Glassdoor.com:
This job listing site also offers a great way to find internship roles. You
can also find a review of prospective employers on the site as well.
It’s also one of the top sites to search for a full time job when you are
ready.
81
Chapter 4: Gaining Hands-on Experience
♦ WayUp.com:
Previously known as InternMatch.com, this site was built specifically
to match individuals with their pretreat internship opportunity. The
site requires the creation of a personal profile and other necessary
information. The site then does the job of matching you with an
employer based on your information
82
The Cybersecurity Career Handbook
It is not merely enough that you land your dream internship program. The
benefits may be lost on you if you do not maximise the opportunity before
starting out. There are several strategies you can use to make the most of
an internship. They include:
1. Set clear goals:
Before starting your internship, take some time to think about what
you want to achieve. This will help you stay focused and make the
most of your time.
2. Be proactive:
Don’t be afraid to take initiative and ask for additional responsibilities
or projects. This will help you gain more experience and show your
interest in the company and the field.
3. Network:
Take advantage of the opportunity to meet and connect with
professionals in your field. Attend company events , and don’t hesitate
to reach out to colleagues for advice or mentorship.
4. Learn as much as you can:
Take advantage of the opportunity to learn from more experienced
professionals. Ask questions, take notes, and take on projects that
challenge you.
5. Be open-minded:
Be open to new experiences and be willing to try new things. You
never know what you might discover that you enjoy doing.
83
Chapter 4: Gaining Hands-on Experience
6. Reflect:
Take some time to reflect on what you have learnt and accomplished
during your internship. This will help you identify areas where you
can improve and prepare for your next step.
7. Follow up:
Stay in touch with the people you met during your internship and
keep them updated on your progress, they can be of great help in the
future.
84
The Cybersecurity Career Handbook
85
Chapter 4: Gaining Hands-on Experience
86
The Cybersecurity Career Handbook
87
Chapter 4: Gaining Hands-on Experience
4. Post-class availability:
Only few resources available with classroom-based training are also
usable after class. Online classes on the other hand make resources
available to you even weeks after. Irrespective of the sessions you might
have missed, you have the opportunity to go over it at your pace for
a longer time.
5. Continuous update:
Most classroom courses only have the opportunity to update the course
material only per semester. In the case of online classes however, new
updates in the real world can easily be applied to what is being learned
as they are happening.
6. Less expensive:
Most of the time, it costs less to take an online class rather than its
equivalent in physical classes. Materials such as textbooks are made
available in searchable PDFs and other similar expenses a traditional
class will incur are drastically reduced or excluded entirely.
Online or virtual labs are a great way to practise and train in a safe online
environment. They are more than just basic cybersecurity training though.
Some are also designed to provide the latest certification from reputable
companies like Cisco and Microsoft. Virtual training labs have been
employed by companies as a way of keeping their r IT departments up to
date, certified, fluent with industry software and knowledgeable about the
latest threats in the world.
88
The Cybersecurity Career Handbook
How It Works
Web designers can also take advantage of such tools. They can affect
major changes or create entirely new features in a safe web environment,
test them out, share feedback, and then move to the live version of their
product or website. Through this means, they easily avoid disruption to
clients and product performance.
Other industries that use the virtual labs for training are the mechanical
engineering and construction fields. For beginners, simulations provide a
perfect means of honing your skills without causing unnecessary hiccups
with projects.
MOOCs or Massive Open Online Courses, are online classes that are open
to anyone, anywhere, and usually for free. In the field of cybersecurity,
MOOCs can provide a great way for individuals to learn about various
topics related to computer security and network defence. Some popular
MOOCs in cybersecurity include ethical hacking, cybercrime and cyber
defence. These courses often include video lectures, quizzes and hands-on
exercises, and can be a great way to gain a foundational understanding of
cybersecurity concepts.
89
Chapter 4: Gaining Hands-on Experience
However, it’s important to note that prior to now, MOOCs were generally
not considered a substitute for a formal education or professional
certification in the field but now a few of them offer their own online
certificate programs, bundling a set of courses around a specific subject
and providing proof of completion similar to a degree program.
There are many online learning resources for cybersecurity. They include:
- Courses on platforms like Coursera, EdX, Udemy, Udacity and
Khan academy.
- Cybersecurity -specific online learning platforms like Cybersecurity
Ventures and SANS Institute.
- Online tutorials and guides from websites like Cybersecurity
Degree Hub, SANS Institute and Cybersecurity Ventures.
- Cybersecurity certification programs from organisations like
CompTIA and SANS Institute.
- Virtual labs and simulations to practise hands-on cybersecurity
skills.
- Online communities and forums where cybersecurity professionals
can connect and learn from each other.
Some of these resources may require payment or subscription and it is also
recommended that you do your research of the reputation of the resources
before taking any course.
Here are a few steps you can take to leverage online learning resources to
start a career in cybersecurity:
1. Research the different types of cybersecurity roles and determine
which one aligns with your interests and skills. This will help you
focus your learning efforts and make the most of your time.
2. Look for online courses and certifications that are relevant to the
role you are interested in. These will provide you with a solid
foundation in the concepts and technologies you will need to
know for that role.
90
The Cybersecurity Career Handbook
91
Chapter 5
Cybercrime Investigation In
Cybersecurity
92
The Cybersecurity Career Handbook
As a result of their vast knowledge and their ability to collect evidence and
ultimately understand how crimes are committed, they are often asked
to testify in court and therefore play an important role in prosecuting
cybercriminals. Many of them also help in cybercrime prevention.
93
Chapter 5: Cybercrime Investigation In Cybersecurity
94
The Cybersecurity Career Handbook
95
Chapter 5: Cybercrime Investigation In Cybersecurity
5. Analytical Skills:
This entails the ability to analyse data, identify patterns and draw
conclusions based on the gathered information.
6. Communication Skills:
This is the investigator’s ability to clearly and effectively communicate
complex technical information to non-technical audiences, including
legal and management teams. This skill is also required to be able to
properly document investigations.
7. Project Management Skills:
This refers to an investigator’s ability to manage and prioritise several
tasks and projects at the same time and be able work effectively in a
team.
8. Internet Research Skills:
A cybercrime investigator is also an expert at finding information
online. This is more than just using search engines but also about
knowing where to look and how to automate the process of searching
for people’s personal information they must have left online.
9. Familiarity with incident response and incident management
processes:
This includes knowledge of incident response plan, incident triage,
and incident reporting.
10. Understanding of threat intelligence and incident management
practices:
This will help investigators to track and respond to cyber threats.
11. Knowledge of cloud computing, virtualization and mobile devices:
Investigators must have a solid grasp of these aspects of cybersecurity
in other to effectively navigate their ways during investigations
12. Knowledge of cyber attacks and attack vectors:
Investigators have up to date knowledge of attacks and the patterns
including social engineering, malware and hacking techniques.
96
The Cybersecurity Career Handbook
97
Chapter 5: Cybercrime Investigation In Cybersecurity
98
The Cybersecurity Career Handbook
Digital Forensics
Once researchers have collected enough data about the cybercrime, they
examine the digital systems that were affected, or those supposed to
be involved in the origin of the attack. This process involves analysing
network connection raw data, hard drive, file systems, caching devices,
RAM Memory and more. During the forensic investigation, the researcher
follows up on all the involved trails looking for fingerprints in system files,
network and service logs, email, web-browsing history e.t.c.
Some of the key skills and tools used in digital forensics include data
recovery, data analysis, and understanding of digital devices and networks.
It is also important to have a good understanding of laws and regulations
related to the collection and handling of digital evidence.
99
Chapter 5: Cybercrime Investigation In Cybersecurity
100
The Cybersecurity Career Handbook
Penetration Testing:
An Overview of The Role of Penetration Testers in Identifying and
Mitigating Vulnerabilities in Systems and Networks
101
Chapter 5: Cybercrime Investigation In Cybersecurity
The process of testing for penetration can be broken down into five stages:
1. Planning and Reconnaissance:
This stage involves defining the scope of a test; identifying the systems
to be addressed and the test methods to be used. Also during this
process, a tester would need to gather intelligence such as network
and domain names, to better understand the potential vulnerabilities.
2. Scanning:
The second step during a penetration test is to understand how the
target application will respond to various attempts at intrusion.
Typically, this process is done through static analysis and dynamic
analysis. Status analysis involves inspecting an application’s code to
estimate the way it behaves while running. Dynamic analysis also
involves inspecting an application’s code in a running state. This is a
more practical way of scanning, as it provides a real-time view into an
application’s performance.
3. Gaining Access:
This stage uses web application attacks such as cross-site scripting,
SQL injection and backdoors, to uncover a target’s weak points.
Testers then work on exploiting these vulnerabilities usually by
escalating privileges, stealing data, intercepting traffic and so on, to
better understand the amount of damage that can be caused through
such weakness exploitations.
4. Maintaining Access:
The purpose of this stage is to see if the vulnerability can be used
to achieve a persistent presence in the exploited system at least long
enough for a bad actor to gain in-depth access. The purpose of this
102
The Cybersecurity Career Handbook
103
Chapter 5: Cybercrime Investigation In Cybersecurity
4. Double-blind Testing:
In a double-blind test, the security personnel are not aware of the
simulated attack. This way, no prior arrangements can be made to
reinforce defences before an attempted breach.
5. Targeted Testing:
During this scenario, the tester and security personnel work together
and carry each other along as they work. This process provides the
security team with feedback from a hacker’s point of view in real-time.
104
The Cybersecurity Career Handbook
105
Chapter 5: Cybercrime Investigation In Cybersecurity
Case study 1:
A government agency hired a penetration testing company to assess the
security of their network infrastructure. The testers used tools such as
Nmap, Nessus, and Metasploit to identify vulnerabilities in the agency’s
network devices, such as routers and switches. They also used social
engineering tactics, such as phishing emails and phone calls, to test the
agency’s employees’ susceptibility to social engineering attacks. The testing
revealed several vulnerabilities that were then addressed by the agency,
including implementing a patch management process and strengthening
their employee security awareness training.
Case study 2:
A software development company hired a penetration testing company
to assess the security of their mobile application. The testers used tools
such as the MobSF and the Drozer to identify vulnerabilities in the
mobile application, such as weak encryption, insecure data storage, and
poor input validation. They also simulated various scenarios, such as
jailbreaking and rooting the device, to test the security of the application
in different environments. The testing revealed several vulnerabilities that
were then addressed by the development team, including implementing
secure data storage and encryption methods.
Case study 3:
A retail company hired a penetration testing company to assess the security
of their e-commerce website. The testers used tools such as sqlmap and
Burp Suite to identify vulnerabilities in the web application, such as lack
of input validation and weak session management. They also tested the
security of the company’s payment gateway by attempting to exploit
known vulnerabilities in the payment software. The testing revealed
several loopholes that were addressed by implementing a secure session
management system and implementing input validation.
106
The Cybersecurity Career Handbook
Security Engineering:
107
Chapter 5: Cybercrime Investigation In Cybersecurity
108
The Cybersecurity Career Handbook
7. Cloud security:
This involves securing data and applications in cloud environments. It
includes technologies such as encryption, network segmentation and
identity and access management.
Compliance on the other hand refers to the process of ensuring that the
organisation is following all relevant laws, regulations, and standards.
This includes things like following data protection laws, complying with
environmental regulations, and adhering to industry standards.
109
Chapter 5: Cybercrime Investigation In Cybersecurity
110
The Cybersecurity Career Handbook
There are several best practices related to security and risk management
that organisations can implement to help protect against potential risks:
1. Conduct regular risk assessments:
Regularly identifying and evaluating potential risks is critical to
managing them effectively. This can include conducting a formal risk
assessment, as well as regularly reviewing the organisation’s risk profile
and making updates as necessary.
2. Develop a risk management plan:
Having a plan in place to manage potential risks can help
organisations respond quickly and effectively when a risk materialises.
A risk management plan should include a process for identifying and
prioritising risks, as well as a process for implementing and monitoring
risk management controls.
111
Chapter 5: Cybercrime Investigation In Cybersecurity
112
The Cybersecurity Career Handbook
113
Chapter 6
Networking and
Professional Development
114
The Cybersecurity Career Handbook
Combining these two elements can help you create a strong foundation
in your career. Building a strong network and continuing to grow in the
cybersecurity field requires a combination of persistence, communication
skills, and professionalism. Here are some tips to help you along the way:
1. Attend events and conferences:
This is one key way to meet people especially when you don’t socialise
enough in your free time. Attending industry events and conferences
will help you meet professionals in your area of specialisation and even
others you may be considering switching to in the future. You also get
to learn about new trends and technologies, and make connections
that can help you grow in the field. Niche events are also a great way
to meet people who are interested in the same things as you.
2. Join a Professional organisation or club:
Becoming a member of a professional organisation gives you a free
pass to meeting many people in the cybersecurity industry without
trying too hard. You can easily walk up to other members, start a
conversation or contribute to an on-going one and request to carry on
the conversation by sharing your contact details.
115
Chapter 6: Networking and Professional Development
3. Volunteer:
Volunteering for a cybersecurity-related organisation or event can
help you access opportunities that you may otherwise have ever come
across. You Get the chance to work closely with industry professionals
and gain valuable experience as well.
4. Build relationships:
The importance of relationships can never be overlooked especially
when you are just finding your footing in a new career. Building
relationships helps you stay in-the-know as well as create opportunities
for exchange of ideas with others.
5. Seek out mentors:
No matter the level you may be in your career journey, having a mentor
can make an otherwise tedious process simple. Having a mentor in
the field can provide you with guidance, support, and advice as you
advance your career.
6. Continuously learn:
Stay current with trends in the industry and best practices by
continuously educating yourself through courses, certifications, and
reading industry publications and blogs.
7. Be professional:
Maintain a professional demeanour and be respectful of others in the
industry. Your reputation is important and can impact your ability to
network and advance in the field.
8. Follow up and maintain connections:
Follow up with people you meet at events and conferences, and
maintain connections by staying in touch and offering help when
needed.
9. Attend events outside of your industry:
Most people who need the services of a security expert are often
people outside the industry. Attending events outside your industry
gives you the opportunity to tell people about what you do and how
116
The Cybersecurity Career Handbook
you can help them secure their systems and networks better to prevent
unwanted breaches.
117
Chapter 6: Networking and Professional Development
6. Offer value:
People are only willing to work with people who are valuable. Offering
value can be as simple as sharing information the person you are
talking to does not know about or even offering to take a lot at a
problem you think you can solve for them.
By following these tips, you can build a strong network and continue to
grow. A commitment to continuous learning, building relationships, and
being professional will help you achieve your goals and succeed in your
career.
Most times, the difference between advancing in your career and being in
the same spot for a long time, is who you know and the relationships you
have successfully kept and nurtured.
Counting on just the opportunities you come across yourself or apply for
directly is usually not enough in the long run. You need people who can
vouch for your competence, character and professionalism when you are
not in the same room with the opportunity- which you won’t be most
times.
You won’t always be there to blow your own horn so you need people
who will do it for you and with results too. Building a strong network
for support and guidance comes in handy for several important reasons.
Some of them include:
1. Collaboration makes all the difference:
Cybersecurity is too important a field to be a job you can do as a
loner. The industry already has a skilled personnel deficit and this
directly impacts how well professionals can help keep important and
confidential data secure. Networking and connecting with others as
a professional opens up doors for collaborative work. This in turn
leads to stronger teams working together to put up a front against
cyberattacks.
118
The Cybersecurity Career Handbook
2. Better opportunities:
A strong network can provide you access to job opportunities that
may not be advertised or known to the general public. Industry
professionals can provide references, introductions, and support in
your job search. Apart from the job opportunities, your connections
can help you access opportunities to learn and improve by providing
recommendations or sharing their ideas with you.
3. Industry knowledge:
Networking can help you stay current with trends, updated rules and
regulations that you may previously not be aware of.
4. Personal growth:
Another awesome benefit of networking is the potential for personal
growth. Networking can help you develop skills, expand your
knowledge, and improve your professional abilities.
5. Support system:
Building a strong network can provide you with a support system of
industry professionals who can provide guidance and support as you
advance your career.
119
Chapter 6: Networking and Professional Development
120
The Cybersecurity Career Handbook
5. Career advancement:
Staying knowledgeable and current in the field of cybersecurity can
open up new job opportunities and higher salaries. It’s essential for
experts to keep learning to stay ahead in the competitive job market.
6. To keep up with hardware changes:
One of the greatest vulnerabilities cybersecurity experts face has to do
with hardware. With the advent of the Internet of things, countless
tiny devices are now interconnected enhancing cyber capabilities of
all kinds but creating more vulnerabilities. When exposed to threats,
these devices can expose even bigger systems to great threats when left
unchecked. Experts need to stay informed on new hardware and how
to make them less susceptible to attacks.
7. Protecting organisations:
The ultimate goal of cybersecurity is to protect organisations and
individuals from cyberattacks. By continuously learning, experts can
improve their skills and be better equipped to prevent, detect, and
respond to security incidents.
8. Successful attacks cost more than learning:
It can be really quite expensive when a hacker out-skills an expert.
This can lead to losses in the billions of dollars for organisations and
individuals. Making allowance for improving security personnels
ensures that they are better equipped to prevent huge losses with the
right knowledge, skills and abilities.
121
Chapter 6: Networking and Professional Development
1. Certifications:
Cybersecurity certifications such as Certified Information Systems
Security Professional (CISSP), Certified Ethical Hacker (CEH), and
CompTIA Security+ demonstrate expertise in the files and can be
earned through exams and coursework.
2. Conferences and Workshops:
Attending industry conferences and workshops provides opportunities
for experts to learn about the latest trends, technologies, and best
practices in cybersecurity. These events often include keystone
speakers, presentations, and hands-on training sessions.
3. Online courses:
Online courses and e-learning platforms offer flexible and convenient
ways for experts to continue their education. These courses cover a
wide range of topics in cybersecurity and can be taken at any time.
4. Professional organisations:
Joining professional organisations such as the Information Systems
Security Association (ISSA) or the International Association of
Computer Security Professionals (IACSP) provides access to training,
resources, and networking opportunities in the cybersecurity field.
5. On-the-job training:
Many organisations offer in-house training and development programs
for their cybersecurity experts to keep them up-to-date with the latest
technologies and best practices.
122
The Cybersecurity Career Handbook
1. Hands-on experience:
Practical experience in a real-world environment can be a valuable form
of continuing education. This can be achieved through internships,
volunteer work, or participating in Capture the Flag (CTF) events
and hackathons.
2. Community participation:
Participating in online forums, discussion groups, and communities
can provide exposure to new ideas, techniques, and tools in the field
of cybersecurity.
3. Peer-to-peer learning:
Collaborating and exchanging knowledge with other cybersecurity
experts can be a valuable form of continuing education. This can be
achieved through mentorship programs, professional networks, or
peer-reviews.
4. Public speaking and writing:
Presenting at conferences, writing articles and blog posts, and
contributing to open-source projects can help experts improve their
knowledge and skills while also sharing their expertise with others.
5. Self-directed learning:
Self-directed learning through books, research papers, and online
resources can be an effective way for experts to continuously improve
their skills and knowledge.
123
Chapter 6: Networking and Professional Development
124
The Cybersecurity Career Handbook
The certification is valid for three years, after which one would be required
to complete 120 Continuing Professional Education (CPE) credits and
pay an annual maintenance fee to keep their certification current.
4. CompTIA Security+:
125
Chapter 6: Networking and Professional Development
CEH is highly regarded in the industry and can lead to career opportunities
as a Security Analyst, Security Consultant, or a Penetration Tester. It is
important to know that while this certification provides a good foundation
in ethical hacking, it’s only one aspect of a comprehensive information
security education.
126
The Cybersecurity Career Handbook
127
Chapter 6: Networking and Professional Development
128
The Cybersecurity Career Handbook
Although the cost of getting a certification is on the high side, the rewards
thereafter are definitely worth it.
Strategies for Maximising Your Learning and Professional
Development Efforts
129
Chapter 6: Networking and Professional Development
130
Chapter 7
Leadership and Management
in Cybersecurity
131
Chapter 7: Leadership and Management in Cybersecurity
132
The Cybersecurity Career Handbook
133
Chapter 7: Leadership and Management in Cybersecurity
134
The Cybersecurity Career Handbook
Leadership plays a critical role in the cybersecurity field as it sets the tone
and direction for the organisation’s security posture. Leaders have the
responsibility to ensure the protection of their organisation’s assets and
to drive innovation and change in the face of constantly evolving threat
patterns. They drive innovation by identifying and adopting new security
solutions that can better protect the organisation.
Effective leadership and management also ensures that the organisation has
the necessary tools, processes and personnel in place to respond quickly
and effectively to security incidents, minimising impact and preserving
the organisation’s reputation.
While the leadership in a cybersecurity team always has the security of the
organisation on their mind the most, they also help create and nurture a
culture of security within the organisation, where employees understand
the importance of security and are empowered to make decisions that
support it.
135
Chapter 7: Leadership and Management in Cybersecurity
136
The Cybersecurity Career Handbook
Asides the leadership styles mentioned earlier, there are other ways a leader
can motivate their team for growth and favourable outcomes. Some of
these unconventional methods include:
1. Agile leadership:
137
Chapter 7: Leadership and Management in Cybersecurity
2. Design thinking:
3. Hackathons:
138
The Cybersecurity Career Handbook
139
Chapter 7: Leadership and Management in Cybersecurity
3. Communication:
Cybersecurity incidents can be complex and have far-reaching
consequences. Effective communication is critical to ensure that
everyone is informed and on the same-page. Teams need to have clear
lines of communication with stakeholders, including, IT, legal and
HR, to ensure that incidents are handled quickly and effectively.
4. Balancing security and usability:
Cybersecurity measures must be effective in protecting sensitive
information, but they also need to be user-friendly so that employees
can do their jobs effectively. Teams need to balance the need for
security with the need for usability to ensure that employees can be
productive and that the organisation is protected from cyber threats.
5. Managing Risks:
Teams are responsible for managing risks, but this can be difficult
when there are limited resources and competing priorities. Teams need
to prioritise their efforts and allocate resources effectively to minimise
risks and protect their organisations.
6. Collaborating with other departments:
Cybersecurity teams need to work closely with other departments,
such as IT, HR and legal, to ensure that the organisation is protected
from cyber threats. This requires strong collaboration skills and the
ability to effectively communicate with stakeholders.
7. Ensuring compliance:
Many organisations are subject to regulations and standards that
dictate how they must handle sensitive information and respond to
cyber threats. Teams must ensure that the organisation is in compliance
with these regulations and that they have the necessary policies and
procedures in place to protect sensitive information.
140
The Cybersecurity Career Handbook
141
Chapter 7: Leadership and Management in Cybersecurity
142
The Cybersecurity Career Handbook
getting the work done. Talented individuals are not only beneficial to
the organisation they can help inspire their team members to be more
dynamic in fulfilling their roles.
There are several approaches that can be taken towards team management,
some of them of them unconventional ones are:
1. Scrum:
In the context of cybersecurity, scrum can be used to manage security
projects by breaking down tasks into smaller and more manageable
chunks, allowing for faster response times and increased efficiency.
Daily stand-up meetings can be used to keep everyone informed
about the status of ongoing security initiatives and identify potential
vulnerabilities before they become a problem. Additionally, cross-
functional teams can be leveraged to bring a variety of skills and
expertise to the table, making it easier to tackle complex security
challenges.
2. Holacracy:
Holacracy can be applied to cybersecurity by empowering security
professionals and giving them the autonomy they need to respond to
threats in real-time. The decentralised structure of holacracy makes
it easier for security teams to collaborate and make quick decisions,
which is essential in an industry where threats can evolve quickly.
By giving employees more control over the security processes and
protocols, organisations can improve the overall security posture and
minimise the risk of cyber attacks.
143
Chapter 7: Leadership and Management in Cybersecurity
3. Kanban:
This is a visual method of managing and prioritising work, in software
development and information technology. It uses a board to visualise
the workflow and prioritise tasks, allowing teams to adjust and adapt
to changes quickly.
4. Lean management:
This is a method that originated in manufacturing but has since been
applied to various industries, including cybersecurity. It focuses on
minimising waste and maximising value, and encourages continuous
improvement through data-driven decision making.
5. DevOps:
This is a software development method that emphasises collaboration
between development and operations teams, allowing for faster
and more frequent releases of software. DevOps can be applied to
cybersecurity by automating security testing and integrating security
into the software development lifecycle, making it easier to identify
and remediate vulnerabilities.
6. ITIL (Information Technology Infrastructure Library):
This is a set of best practices for IT service management, and can
be applied to cybersecurity by providing a framework for incident
management, change management, problem management, and other
important processes. ITIL can help organisations respond to security
incidents more efficiently and effectively, and improve the overall
security posture.
7. Remote team management:
As more and more security professionals are working from home, it has
become increasingly important to ensure best practices in cybersecurity.
Clear communication and guidelines are critical for remote teams, as
well as the use of collaboration tools such as video conferencing and
instant messaging. Keeping remote workers engaged and motivated is
also essential, as it helps to foster a strong team culture and maintain
accountability. Additionally, it’s important for remote teams to have
144
The Cybersecurity Career Handbook
145
Chapter 7: Leadership and Management in Cybersecurity
146
The Cybersecurity Career Handbook
Some of the common tools used in Agile and Scrum project management
include:
1. Project management software:
This software helps project managers to track tasks, allocate resources,
and monitor project progress. Some popular project management
tools used in Agile and scrum include Jira, Asana, and Trello.
2. Version control systems:
These systems allow teams to manage code changes and keep track of
the different versions of a software application. Examples include Git
and Subversion.
3. Collaboration tools:
Collaboration tools such as video conferencing, instant messaging,
and team chat, are essential for remote teams and help to foster a
strong team culture.
147
Chapter 7: Leadership and Management in Cybersecurity
148
Chapter 8
The Future of Cybersecurity:
Emerging Trends and
Technologies
The good news is that as much as cybercriminals are discovering new ways
to launch attacks against organisations and individuals, new technologies
are also emerging to combat them. Some of the key trends and technologies
shaping the future is cybersecurity include:
1. Artificial Intelligence (AI) and Machine Learning (ML):
AI and ML algorithms can be used to analyse large amounts of data
and identify patterns that might indicate a cyber attack. This allows
for rapid detection of threats and enables organisations to respond
quickly to mitigate the risk. AI and ML can also be used to automate
149
Chapter 8: The Future of Cybersecurity
150
The Cybersecurity Career Handbook
151
Chapter 8: The Future of Cybersecurity
152
The Cybersecurity Career Handbook
The impact of key emerging trends can both be positive and negative.
On one hand, technologies such as artificial intelligence and machine
learning can greatly improve a company’s ability to detect and prevent
cyberattacks. On the other hand, these techno can also be used by attackers
to automate and scale their attacks. In addition to this, the increasing use
of cloud computing, Internet of Things and mobile devices has created
new channels for cybercriminals to exploit.
153
Chapter 8: The Future of Cybersecurity
1. Design thinking:
Design thinking is a user-centred, iterative approach to problem-
solving that emphasises empathy, experimentation, and collaboration.
In the context of cybersecurity, design thinking can be used to create
more secure and user-friendly systems by involving users in the design
process and testing prototypes with them to understand their needs
and challenges.
2. Hackathons:
As a collaborative tool, hackathons are well-known for bringing
together developers, designers and other tech-savvy individuals to
create new solutions often in a short amount of time. In its application
to cybersecurity, hackathons can be used as a way to bring together
experts and non-experts to collaborate and develop new solutions to
cyber threats. These events can also serve as a way to test and validate
ideas, identify potential weaknesses and vulnerabilities in systems and
bring attention to important cybersecurity issues.
3. DevSecOps:
DevSecOps is an approach that blends the principles of agile
methodology with the practice of security. It involves integrating
security into every aspect of the software development process, from
coding to deployment. This approach helps organisations improve
security and reduce vulnerabilities, while also increasing efficiency and
reducing time-to-market for software releases.
4. Shift Left:
The “Shift Left’’ approach involves embedding security considerations
and testing early in the software development process, rather
than waiting until the end. By doing this, organisations can catch
security issues early in the development cycle and resolve them more
efficiently. This approach can lead to faster and more secure software
development, and reduces the risk of security vulnerabilities.
154
The Cybersecurity Career Handbook
5. Security-first Culture:
A “security-first” culture is one in which security is a top priority and
is integrated into every aspect of the organisation’s operations. This
approach helps organisations improve their overall security posture
and reduce the risk of data breaches and other security incidents.
6. Bug Bounty Programs:
A bug bounty program is a crowdsourcing approach in which
organisations invite independent security researchers to identify
and report vulnerabilities in their systems. Organisations reward the
researchers for their contributions, incentivizing them to help identify
and resolve security issues. This approach can help organisations
improve their security posture and catch security issues that might
otherwise go unnoticed.
7. Security Development Lifecycle (SDL):
The SDL is a process that incorporates security considerations into
every phase of the software development process, from requirements
gathering to development. This approach helps organisations build
security into their software development process, reducing the number
of security vulnerabilities and improving the overall security of their
products.
8. Multi-layered Security Model:
A multi-layered security model combines multiple security controls
and technologies to provide a comprehensive defence against cyber
threats. This approach helps organisations reduce the risk of data
breaches and other security incidents by creating multiple lines of
defence.
9. Security-by-Design:
The security-by-design philosophy involves incorporating security
into every aspect of a product or service from the outset. This approach
helps organisations build security into their products and services,
reducing the risk of data breaches and other security incidents.
155
Chapter 8: The Future of Cybersecurity
156
The Cybersecurity Career Handbook
157
Chapter 8: The Future of Cybersecurity
5. Embrace automation:
Automation is a key part of many unconventional cybersecurity
approaches, such as DevSecOps and Shift Left. Embracing automation
can help organisations increase efficiency, reduce vulnerabilities, and
improve security.
6. Stay up-to-date:
Cybersecurity is an ever-evolving field, and unconventional approaches
are no exception. Organisations must stay up-to-date with the latest
trends and best practices to ensure that they are taking full advantage
of these approaches.
7. Leverage community resources:
Many unconventional approaches, such as community-driven security
and bug bounty programs, rely on the contributions of external
experts. Organisations must leverage these resources and tap into the
expertise of the security community to achieve the best results.
8. Measure and track results:
To determine the effectiveness of unconventional approaches,
organisations must measure and track key metrics, such as the number
of vulnerabilities found and resolved, the time-to-market for software
releases, and the overall security posture of the organisation.
9. Be flexible and adaptable:
Unconventional approaches often require organisations to think and
operate differently. Organisations must be flexible and adaptable, and
be willing to change their approach if necessary to achieve the best
results.
158
The Cybersecurity Career Handbook
1. GitLab:
This company has adopted a Security First culture, integrating security
into every aspect of their development process, from code writing to
development. This approach has helped GitLab reduce vulnerabilities
and improve the overall security of their software.
2. Etsy:
Etsy had adopted a Bug Bounty program, inviting independent security
researchers to identify and report vulnerabilities in their systems. This
approach has led to the discovery and resolution of several security
issues, and has helped Etsy maintain the security of its platform.
3. Microsoft:
Microsoft has implemented a Security Development Lifecycle (SDL)
process, incorporating security considerations into every phase of their
software development process. This approach has helped Microsoft
reduce the number of security vulnerabilities in its software and
improve the overall security of its products.
4. Google:
Google employed a multi-layered security model, combining multiple
security controls and technologies to provide a comprehensive defence
against cyber threats. This approach has helped Google maintain the
security of its platform and protect users from cyber attacks.
5. Amazon Web Services (AWS):
They adopted a security-by-design philosophy, incorporating security
into every aspect of their cloud services offerings. This approach has
helped AWS maintain the security of its cloud services and reduce the
risk of data breaches for its customers.
159
Chapter 8: The Future of Cybersecurity
6. Dropbox:
Dropbox has implemented a zero trust security model, assuming that
all network traffic is hostile and verifying the identity of every user
and device before allowing access. This approach has helped Dropbox
maintain the security of its platform and protect its users’ data.
7. Salesforce:
Salesforce has adopted a trust-fruit philosophy, prioritising the security
and privacy of its users’ data above all else. This approach has helped
Salesforce maintain the security of its platform and protect its users
from data breaches.
As bright as the future may look for the cybersecurity industry, there
are equally challenging times to be expected also. With more advanced
technology emerging regularly for professionals to beef up their security
strategies, individuals with malicious intent also apply this same technology
to their attacks. As a result, cybersecurity experts must find ways to
create strategies that are more impervious to threat and action plans that
enforce quick detection in case of breaches. Some of the challenges and
opportunities expected to face the cybersecurity field include:
1. Proliferation of connected devices:
The internet of things (IoT) has brought about a proliferation of
connected devices, including smart home devices, wearable technology,
and other connected devices. These devices often have limited security
features, making them vulnerable to hacking and exploitation. The
increasing number of connected devices increases the attack surface
for cyber criminals and presents new security challenges.
160
The Cybersecurity Career Handbook
161
Chapter 8: The Future of Cybersecurity
These are just a few of the key challenges the cybersecurity field will need
to work through in the near future. It’s important for organisations to
stay informed about these challenges and invest in the technology and
processes necessary to address them, in order to stay ahead of emerging
threats.
162
The Cybersecurity Career Handbook
163
Chapter 8: The Future of Cybersecurity
164
Chapter 9
Future-Proofing Your
Career: Career Progression in
Cybersecurity
Cybersecurity on the other hand can include any of these stages or none
at all. While employers may have a set of requirements they expect
a prospective employee to fulfil, oftentimes a cybersecurity expert’s
proficiency is mostly determined by other factors such as problem solving
skills, technical aptitude and their ability to understand how people,
systems and applications are interdependent.
There are rare cases where individuals with a degree are found excelling
in their job role. However, starting your career by earning a degree in
preferably science or technology usually gets one a stronger consideration
when it comes to opportunities. An educational background in this field
denotes some basic understanding of computer systems and applications.
165
Chapter 9: Future-Proofing Your Career
Years later data has shown that cybersecurity remains a dynamic industry.
According to the 2022 (ISC)2 Cybersecurity Workforce Study, there are
several indicators that really exciting and rewarding times are ahead for
the cybersecurity professional. Some of the key highlights in the report are
1. Experience and Practical Skills are Growing in Importance for
New Hires:
The report claims that “from 2021 to 2022, practical skills and
experience have grown into being more important qualifications
for those considering employment in the cybersecurity profession.
In particular more emphasis is being placed on relevant IT work
experience (29% to 35%), strong problem-solving skills (38% to
44%) and relevant work experience (31% to 35%). The ubiquitous
importance of certifications was less prioritised this year(29% vs.
32%), as were cybersecurity qualifications or training (17% vs.23%),
graduate degrees (10% vs. 13%) and undergraduate degrees (10%
vs.14%).”
2. For Younger Workers, More Roads Lead To Cybersecurity:
“Nearly half of respondents under the age of 30 move into cybersecurity
from a career outside of IT. Younger professionals are more likely to use
their education in cybersecurity or a related field (23%) as a stepping
stone to either enter the profession or move from a totally different
field (13%) outside the It or Cybersecurity landscape. Some are even
recruited after their own self-education with cybersecurity(12%). As
respondents approach ages 50 to 54, we observed a peak in the number
of employees who have used a career in IT as their pathway into the
166
The Cybersecurity Career Handbook
167
Chapter 9: Future-Proofing Your Career
168
The Cybersecurity Career Handbook
Success Stories:
Professionals in the Field and How they Have Advanced Their Careers
Like we have discussed previously, there are several ways you can advance
your career in cybersecurity alongside a combination of determination
and hard-work. For some well-known professionals in the field, traditional
strategies such as earning degrees and certifications helped their career
growth. Some of them are:
1. Troy Hunt:
He is an accomplished security professional from Australia who serves
as Microsoft Regional Director and has also been honoured Microsoft’s
Most Valuable Professional (MVP) in Developer Security. With more
than 30 security-related courses available on Pluralsight, including his
multi-part hacking course, he is well known for his commitment to
educating IT and security professionals. Troy also frequently presents
keynote addresses and workshops to large audiences at security
conferences. He started out building software for the web in ‘95 where
he had various roles in Australia and the UK. In 2001 he went to
Pfizer in Sydney and spent the next 14 years until his departure in
2015 building and managing software in the world’s largest healthcare
company. He worked first as a software developer then as an Architect
responsible for software delivery across Asia Pacific. This ranged from
systems to manage clinical trials, report on patient adverse events
and optimise sales force operations. His focus has since shifted to
Information Security.
2. Virginia Rometty:
Known as the first woman to hold the CEO position at IBM, Ginny
as she is popularly called had held the position for seven years. After
obtaining a degree in computer science and electrical engineering,
she started working at General Motors. She joined IBM in 1981 as
169
Chapter 9: Future-Proofing Your Career
170
The Cybersecurity Career Handbook
2. Natasha Syace-Zalem:
Coming from a career in music photography, Natasha Syace-Zalem
who is Amazon’s global head of partner engineering is a renowned
professional. She is the founder of Empowering Women with Tech
where she encourages more women to consider a career in STEM. She
graduated with a degree in producing and directing and started out as
a music photographer before venturing into technology and working
with various media companies.
3. Dave Kennedy:
David Kennedy is the founder of TrustedSec. His transition into
cybersecurity started with his background as a US Marine. After serving
in the military, he became interested in the field of cybersecurity and
started to build his expertise through online-courses and hands-on
experience. He eventually transitioned into the field and now runs his
leading cybersecurity consulting firm, TrustedSec. He is a well-known
speaker and author on the topic of cybersecurity, providing companies
and organisations with advice on how to secure their systems and
networks.
4. Tiffany Trojillo:
Tiffany Trojillo’s transition into cybersecurity was inspired by her
love of technology and her desire to help others. She started as a hair
stylist but eventually realised that her true passion was technology. She
enrolled in online courses to learn about cybersecurity and eventually
landed a job in the field, working her way up from entry-level to her
current role as a cybersecurity consultant. Trojillo is a sought-after
speaker and advocate for diversity in the industry.
In chapter five we looked at various ways you can advance your career
in cybersecurity. Future-proofing your career entails staying current with
latest developments and advancements in the field and position yourself
to remain relevant as the times change. By investing in your professional
development and staying ahead of the curve, you can ensure that you have
what it takes to keep being sought-after and have a rewarding career in
the future.
171
Chapter 9: Future-Proofing Your Career
Crowdfunding
172
The Cybersecurity Career Handbook
Third, you need to keep your backers informed and engaged throughout
the campaign. This can include sending regular updates on your progress,
answering questions and addressing concerns, and showing your gratitude
to backers by providing them with exclusive content or early access to
your product.
173
Chapter 9: Future-Proofing Your Career
Angel Investor
Angel investors are high net worth individuals who are interested in
investing in startups and early-stage businesses. Securing investment from
angel investors requires a solid business plan, a clear understanding of
your target market, and a compelling pitch.
To start, it’s important to do your research and find angel investors who
are interested in investing in the particular sector of your business. There
are various online platforms and organisations that connect entrepreneurs
with angel investors, so take advantage of these resources to identify
potential investors.
Once you’ve identified potential angel investors, it’s time to prepare your
pitch. Your pitch should clearly explain your business idea, its potential
for growth and profitability, and what sets it apart from other businesses
in its industry. Make sure you have a well-defined plan for how you will
use the funds you receive, and be prepared to answer questions about your
business model, target market, and competition.
When you meet with angel investors, be confident, and make sure to listen
to their feedback and concerns. They may have suggestions or insights
that can help you refine your business plan and improve your chances of
securing investment.
Angel investors typically invest their own money and take an active role
in helping their portfolio companies grow and succeed. This means that
you will have access to not only their funding but also their network of
contacts and their expertise. Working with angel investors can be a great
way to gain valuable mentorship and advice as you build your business.
174
The Cybersecurity Career Handbook
One of the benefits of working with angel investors is that they typically
invest in early-stage companies, when access to capital is critical and the
risks are higher. This means that they are often willing to take a chance on
businesses that traditional investors might pass over.
However, it’s important to remember that when you receive funding from
angel investors, you will likely need to give up a portion of ownership in
your business. Make sure you are comfortable with this arrangement, and
consider seeking the advice of a financial advisor or an attorney before
finalising your deal.
Bootstrapping
175
Chapter 9: Future-Proofing Your Career
As your business grows and becomes more established, you can start to
think about seeking outside investment. This can come in the form of debt
financing, equity investment, or other forms of capital. But by focusing
on bootstrapping first, you will have a much stronger foundation to build
upon, and you will be in a much better position to negotiate terms and
secure the funding you need to grow your business.
Loans
176
The Cybersecurity Career Handbook
Once you have a clear understanding of your loan options, it’s time to
start preparing your loan application. This typically involves creating a
detailed business plan that outlines your financial projections, marketing
strategy, and target market. You will also need to provide documentation,
such as tax returns, financial statements, and bank statements, to support
your loan application.
When applying for a loan, it’s important to be realistic about your funding
needs and the amount of money you are requesting. Lenders will typically
review your business plan and financial statements to determine the
amount of money they are willing to lend, so it’s important to have a clear
understanding of your financial situation and how you will use the funds
you receive.
One of the benefits of securing a loan is that you have more control over
the use of your funds, as you are not giving up ownership in your business.
Additionally, loans can provide a more predictable source of funding, as
you know exactly how much money you will receive and when it will be
available.
However, it’s important to remember that loans also come with obligations,
such as interest payments and loan repayment terms. Make sure you are
comfortable with the terms and conditions of your loan, and consider
seeking the advice of a financial advisor or an attorney before finalising
your deal.
177
Chapter 9: Future-Proofing Your Career
178
The Cybersecurity Career Handbook
Bartering
179
Chapter 9: Future-Proofing Your Career
One of the key benefits of bartering is that it can help you conserve cash
and make the most of your resources. Bartering can help you maximise
the value of your business and minimise your expenses, allowing you to
allocate your resources in a more effective way. Additionally, bartering can
help you build relationships with other businesses, which can be valuable
for networking and building a supportive community of entrepreneurs.
Grants
Grants are an excellent way to get the funding you need to get your business
off the ground. The first step is to identify which grants are available to
you. Organisations such as the Small Business Administration (SBA),
National Science Foundation (NSF), Department of Homeland Security
(DHS), and National Institute of Standards and Technology (NIST) are
just a few sources of grants for science and technology-related businesses.
Do your research, and make a list of the grants that are relevant to your
business.
180
The Cybersecurity Career Handbook
Once you have a list of grants you’re interested in, it’s time to evaluate your
eligibility for each one. This involves reviewing the grant requirements
such as the type of business, size, location, and other criteria. Some grants
are specific to a particular field of business, while others are more general
and available to any small business.
When you have a solid understanding of the grants you’re eligible for,
it’s time to get to work on your proposal. A grant proposal is a detailed
document that outlines your business, the problem you’re trying to solve,
and how your proposed solution will benefit the community. A well-
written proposal can make all the difference in securing funding for your
cybersecurity business.
It’s essential to follow all guidelines and regulations for grant usage to
ensure compliance and successful completion of the project. Be sure to
read all of the terms and conditions carefully and keep detailed records of
how you’re using the grant funding. This will help you stay on track and
ensure that you’re able to complete your project as planned.
181
Chapter 9: Future-Proofing Your Career
Online sales
One of the key advantages of online sales is the potential to reach a massive
audience. By utilising online marketplaces such as Amazon and eBay, you
can reach customers from all over the world, expanding your customer
base and increasing your sales. And with the rise of e-commerce, more and
more people are shopping online, making it an excellent opportunity for
you to grow your business.
182
The Cybersecurity Career Handbook
Funding your side- business while working a 9-5 job can be challenging,
but a combination of these approaches can increase your chances of
success. The field of cybersecurity offers you the flexibility to spread your
wings as much as you want to. It may seem difficult initially balancing
your role as a cybersecurity professional and being an entrepreneur but
know that it is doable if you put your heart to it.
183
Bibliography
184
The Cybersecurity Career Handbook
185
Bibliography
186
The Cybersecurity Career Handbook
187
About The Author
188
The Cybersecurity Career Handbook
189