Reader small image

You're reading from  Cybersecurity Career Master Plan

Product typeBook
Published inSep 2021
PublisherPackt
ISBN-139781801073561
Edition1st Edition
Right arrow
Authors (4):
Dr. Gerald Auger
Dr. Gerald Auger
author image
Dr. Gerald Auger

Dr. Gerald Auger has worked within information security since 2006 and holds a PhD in cyber operations. Gerald has helped tens of thousands of aspiring cybersecurity professionals through his "Simply Cyber" YouTube channel and is regularly interviewed for his thoughts on cybersecurity professional development. Gerald is a full-time information security practitioner, adjunct faculty at The Citadel, The Military College of South Carolina; chief content creator for Simply Cyber; and managing director at Coastal Information Security Group.
Read more about Dr. Gerald Auger

Jaclyn “Jax” Scott
Jaclyn “Jax” Scott
author image
Jaclyn “Jax” Scott

Jaclyn "Jax" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University.
Read more about Jaclyn “Jax” Scott

Jonathan Helmus
Jonathan Helmus
author image
Jonathan Helmus

Jonathan Helmus ("Moos1e") is a penetration tester and professor with over 10 years of experience in engineering, information security, and information technology. Jon resides in a small town right outside Seattle, Washington, where he and his family raise alpacas on their mini farm. Currently, Jon works as a freelance educator teaching topics such as pentesting, red teaming, cloud security, and vulnerability exploitation. He also works as a contract pentester and cloud security professional for clients all around the world.
Read more about Jonathan Helmus

Kim Nguyen
Kim Nguyen
author image
Kim Nguyen

Kim Nguyen is a Software Engineer, with a broad background thanks to her B.S. in business administration and M.S. in computer science. Kim's day-to-day work focuses on software engineering of cloud-based technologies, while continuing her research into cybersecurity on the side. Kim is also an instructor at the City University of Seattle, where she teaches computer science courses. She is an active technical speaker and researcher at cybersecurity and computer science conferences. Kim holds several certificates, including AWS Certified Developer and CompTIA Linux+. Kim is the founder of Passion Sets Success, a platform that helps people identify their passion, to achieve the right career for them.
Read more about Kim Nguyen

View More author details
Right arrow

Chapter 5: Getting Hands-On Experience with No Experience

Jon's previous chapter on certifications and education was important because it helped educate you on the field and industry, which, in turn, helps you deliver value as you become a cyber professional. One challenge these two don't help with is the common requirement of experience.

It's the chicken and the egg problem all over again. Employers want to give jobs to people with experience, but you can't get experience without a job. Let's crack the egg in this chapter and explore getting hands-on experience in the specific area you want in innovative ways.

Hands-on experience can be more important than having a certification, especially when you first enter this industry. This chapter will provide all the guidance you need to get that valuable hands-on-keyboard experience, without having to have a cyber job yet.

This chapter will start off by presenting several actionable ways to get experience...

Technical requirements

Check out the following link to see the Code in Action video:

https://bit.ly/3iaGzUk

Hacking all the things

This section will guide you on offensive security skill development through a vulnerable web application home lab. A walk-through of building and using a WebGoat system on a Raspberry Pi will be provided to help you learn about web application security and Open Web Application Security Project (OWASP) top vulnerabilities.

WebGoat

WebGoat is an intentionally vulnerable web application that is designed to educate individuals on web application security concepts through actual hands-on exploitation of web application vulnerabilities, as well as descriptive write-ups on why the vulnerabilities allow exploitation.

A great way to get hands-on experience and actually develop real cybersecurity skills and get experience is to have a home lab. Home lab is a fairly subjective term. A home lab could be one computer running some applications, all the way up to having physical network appliances, security appliances, and endpoints simulating an actual corporate network...

Guarding all the doors

There are many, many skills that cybersecurity defenders can learn about to be more proficient at their job. This section will teach you about defensive skill development through analyzing actual malicious network traffic for indicators of compromise and interesting attributes.

There are whole books dedicated to just learning about blue team skills. This section of this book covers just a few of those many skills, but it is intended to give you a good taste of that world and to give you practical hands-on experience. We will gain some experience with Wireshark, a network traffic analysis tool, and take a brief look at malware analysis.

Wireshark is a network analysis tool that every cybersecurity professional should be familiar with, especially if you're going to be a blue team or a security operations analyst. Wireshark analyzes network packet capture (PCAP) files. PCAP files are captured network traffic files.

Wireshark has a nice, clean graphical...

Blazing your own trail

Building and working through labs for hands-on cyber skills is great, but there are more generalized ways of getting experience and socializing yourself within the cybersecurity community. This section highlights alternative opportunities from the traditional 9-5 entry-level position that allow you to apply cyber skills in controlled settings and develop practical cybersecurity experience through methods including internships, conference events, non-profit support, and looking within your own organization.

Conferences – more than just talks

Cybersecurity conferences offer an amazing amount of opportunities for you to gain experience, network with people who can get you experience, and to get exposure to many topics in cybersecurity that you may not naturally encounter on your own. There are many cybersecurity conferences to choose from and taking advantage of them should be accessible.

Some of the larger ones that you may have heard of include...

Looking in the mirror

This section will show you how to look inward to show how you already have cyber experience and don't even realize it and, more importantly, how to showcase it on a resume. This technique is not exclusively for individuals pivoting from an IT career into cybersecurity, but it will be easier for those individuals with that work background.

One common mistake I see professionals make that are transferring into the cybersecurity field is that they think that they don't have any experience yet. I hear comments such as "I worked help desk," "I was a software engineer," and "I was a networking engineer."

Whatever their work background is, these individuals take on the position that they have not worked in cybersecurity. In this section, I'd like to challenge you and your assumptions that you don't have cybersecurity experience. Quite often, cybersecurity skills overlay many different parts of the business, and...

Summary

This chapter showed you how to build labs to gain hands-on skills so that you can experience working in cybersecurity. This will allow you to capture cyber work experience in your resume and to speak from experience during cybersecurity job interviews.

We also explored how to get a cybersecurity job and experience through internships and leveraging your current role. Internships and supporting information security offices at businesses provide you with real-world experience that is practical and helps you develop your skills.

Finally, we discussed how to take full advantage of cybersecurity conferences to professionally network, demonstrate your skillset, and learn about cybersecurity. I wouldn't blame you if you took a break to go find your socks, as I know this chapter blew them off.

Now that you have the necessary skills and experience, in the next chapter, you'll learn how to brand yourself so that you stand out among your peers and take the final...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Cybersecurity Career Master Plan
Published in: Sep 2021Publisher: PacktISBN-13: 9781801073561
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Authors (4)

author image
Dr. Gerald Auger

Dr. Gerald Auger has worked within information security since 2006 and holds a PhD in cyber operations. Gerald has helped tens of thousands of aspiring cybersecurity professionals through his "Simply Cyber" YouTube channel and is regularly interviewed for his thoughts on cybersecurity professional development. Gerald is a full-time information security practitioner, adjunct faculty at The Citadel, The Military College of South Carolina; chief content creator for Simply Cyber; and managing director at Coastal Information Security Group.
Read more about Dr. Gerald Auger

author image
Jaclyn “Jax” Scott

Jaclyn "Jax" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University.
Read more about Jaclyn “Jax” Scott

author image
Jonathan Helmus

Jonathan Helmus ("Moos1e") is a penetration tester and professor with over 10 years of experience in engineering, information security, and information technology. Jon resides in a small town right outside Seattle, Washington, where he and his family raise alpacas on their mini farm. Currently, Jon works as a freelance educator teaching topics such as pentesting, red teaming, cloud security, and vulnerability exploitation. He also works as a contract pentester and cloud security professional for clients all around the world.
Read more about Jonathan Helmus

author image
Kim Nguyen

Kim Nguyen is a Software Engineer, with a broad background thanks to her B.S. in business administration and M.S. in computer science. Kim's day-to-day work focuses on software engineering of cloud-based technologies, while continuing her research into cybersecurity on the side. Kim is also an instructor at the City University of Seattle, where she teaches computer science courses. She is an active technical speaker and researcher at cybersecurity and computer science conferences. Kim holds several certificates, including AWS Certified Developer and CompTIA Linux+. Kim is the founder of Passion Sets Success, a platform that helps people identify their passion, to achieve the right career for them.
Read more about Kim Nguyen