cybersecurity: education and career...
Post on 20-May-2020
18 Views
Preview:
TRANSCRIPT
Cybersecurity:Education and Career
Opportunities
2015 PCAP Cybersecurity Student Workshop
Andreea Cotoranu - March 27, 2015
About Cybersecurity
• Background
• Cyberspace
• transformed the daily lives of people;
• is critical to national priorities in all sectors including commerce, financial services, healthcare, education, energy, defense, etc.;
• Problem Examples
• Privacy of personally identifiable information is often violated on a massive scale by persons unknown;
• Intellectual property is stolen;
• Law enforcement cannot always respond effectively to cybercrime
• due to national boundaries and uncertain legal and ethical frameworks;
• Proposed Solution
• Professionals that understand the problem and design solutions;
• Citizens that contribute to making the Internet a safer and secure place;
• Cybersecurity research and education;
Cybersecurity Workforce• Demand
• Demand is growing at three and a half times the pace of the overall IT job market;
• Jobs as network systems and Information security professionals are expected to grow by 53% in the next four years; (U.S. Bureau of Labor Statistics)
• There were an estimated 1 million unfilled cybersecurity jobs globally in 2014; (Cisco cybersecurity report)
• Qualifications
• Four out of five cybersecurity jobs require a college degree;
• Problem-solving, and experience with a range of computer systems, networks, and security tools;
• Verbal and written communication, management and leadership, flexibility, multi-tasking, dependability, integrity, and decision-making;
• Salary
• Cybersecurity professionals report an annual average salary of $116,000, or approximately $55.77/hour; (U.S. Bureau of Labor Statistics)
• Just out of college? The average salary starts at $88,000+!
Cybersecurity Workforce: Framework
• Specialty Areas• Conceptualizing, designing, and building secure IT systems;
• Supporting, administering, and maintaining IT system performance and security;
• Identifying, analyzing, and mitigating threats to internal IT systems and networks;
• Investigating cyber events and/or crimes of IT systems, networks, and digital evidence;
• Operating and collecting cybersecurity information that may be used to develop intelligence;
• Analyzing cybersecurity information to determine its usefulness for intelligence;
• Providing support so that others may effectively conduct their cybersecurity work.
• NICE Framework• http://niccs.us-cert.gov/training/tc/framework
Cybersecurity Workforce: Job Titles• Examples
• Risk and Vulnerability Analyst
• Auditor
• Business Process Analyst
• Database Administrator/Developer
• Information Resources Manager
• Security Analyst
• Intrusion Analyst
• Ethical Hacker
• Computer/Network Defense Analyst (cryptologic)
• Computer Crime Investigator
• Special Agent
• Digital Forensic Examiner
• Top 20 Cool InfoSec & Cybersecurity Jobs
• http://www.sans.org/20coolestcareers/
Cybersecurity Workforce: Job Placement*• Full-Time Employers
• National Security Agency
• Central Intelligence Agency
• Federal Bureau of Investigation
• Defense Information Systems Agency
• Space and Naval Warfare Systems Command
• Manhattan District Attorney’s Office
• Johns Hopkins - Applied Physics Lab
• Internship Employers
• Department of Homeland Security
• Department of Transportation
• Department of Justice
• Lockheed Martin
• Booz Allen Hamilton
• Dow Jones and Company
• Metropolitan Transportation Authority
*Seidenberg Job Placement Examples 2011-14
Cybersecurity: Get a Degree• BA Computer Science• BS Computer Science
• Information Assurance Minor
• BS Information Technology• Cybersecurity Focus
• MS Computer Science• Network Security Concentration • Web Security Concentration
• MS Information Systems• MS Internet Technology
• Security and Information Assurance Concentration
• PhD Computer Science• Doctor of Professional Studies in Computing
• Security Research Focus
Pace University Programs and Application Information:http://www.pace.edu/seidenberg/seidenberg-programs
Cybersecurity: Cybersecurity Scholarships
• CyberCorps®: Scholarship for Service
For detailed information and to apply: http://seidenberg.pace.edu/sfs
Cybersecurity: Get Certified
• CompTIA Security +• http://certification.comptia.org/getCertified/certifications/security.aspx
• ISACA Cybersecurity Fundamentals• http://www.isaca.org/cyber/pages/cybersecurity-fundamentals-certificate.aspx
• (ISC)2 Certified Information Systems Security Professional and others…• https://www.isc2.org/credentials/default.aspx
Cybersecurity: Get Experience
• Internships
• Volunteer Work
• White Hat Hacking
• Independent Research/Projects
• Competitions
Cybersecurity: Get Experience
Independent Projects / Research
• 2015 PCAP Summer Research Project
• Web Security
• Biometrics
• Mobile Forensics
Download application from:
https://sites.google.com/site/pcapproject/students
Cybersecurity: Get Experience
Competitions
• U.S. Cyber Challenge
• http://www.uscyberchallenge.org/
• National Collegiate Cyber Defense Competition
• http://www.nationalccdc.org/
• CSAW – NYU Poly School of Engineering
• https://csaw.isis.poly.edu/
• https://www.facebook.com/NYUPolyCSAW
Cybersecurity: Get Connected
• Guest Speaker Seminars
• Computer Club
• Other
• Academic and Professional Organizations
• High Technology Crime Investigation Association
• Open Web Application Security Project
• ISACA
• Association for Computing Machinery
• Institute of Electrical and Electronics Engineers
Cybersecurity Conferences: Get Connected
• Shmoocon• https://www.shmoocon.org/
• BlackHat• https://www.blackhat.com/
• Women in Cybersecurity• https://www.csc.tntech.edu/wicys/
• Information Security Conferences of 2015• http://www.concise-courses.com/security/conferences-of-2015/
Questions?
Email: acotoranu@pace.eduOffice: Goldstein Academic Center Room 329
Office Phone: 914-773-3193
Other Resources• Pace University CyberCorps Scholarship for Servicehttp://seidenberg.pace.edu/sfs
• Seidenberg IA Web Sitehttp://seidenberg.pace.edu/ia
• Ars Technicahttp://arstechnica.com/
• CCDC Videohttp://www.youtube.com/watch?v=SmNAvpeFOCU
• Def Con Hacking Conferencehttps://www.defcon.org/ also look up DefCon videos on YouTube
• Humorwww.xkcd.co
top related