2.2.5 Lab – Becoming a Defender Answers
Lab – Becoming a Defender (Answers Version)
Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Research and analyze what it takes to become a network defender.
Part 1: Conduct search of Certifications.
Part 2: Investigate positions available within cybersecurity
Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one of the fastest growing and most in-demand professions. Individuals in this field perform a wide variety of jobs including, but not limited to, consultation, investigation, and program management services to mitigate risks from both internal and external sources. Cybersecurity professionals are required to evaluate, design and implement security plans, conduct in-depth fraud investigation, perform security research and risk assessment, and propose solutions to potential security breaches.
Individuals with good security skills have a great earning potential. To be considered for one of these high paying jobs, it is very important to have the proper qualifications. Because of this, it is important to consider the industry certifications available for this career path. There are many certifications to choose from. Selecting the right certification(s) for you requires careful consideration.
Note: You can use the web browser in the virtual machine that was installed in a previous lab to research security-related issues. By using the virtual machine, you may prevent malware from being installed on your computer.
Required Resources
- PC or mobile device with internet access and virtual machine (optional).
Instructions
Part 1: Conduct search of Certifications.
- Use your favorite search engine to conduct a search for the most popular cybersecurity-related certifications. List them below with the organization that provides the certification.
Type your answers here.
Answers will vary.
- Pick three certifications from the list above and provide more detail about the certification requirements and knowledge gained i.e.: vendor specific or neutral, number of exams to gain certification, exam requirements, topics covered etc.
Type your answers here.
Answers will vary.
Part 2: Investigate positions available within cybersecurity
Glassdoor is one of the largest job sites worldwide. Using your browser of choice, access glassdoor.com and search to find cybersecurity jobs available that were posted within the last two weeks. Adjust the search as you would like. You can search for jobs in your area or an area that you would like to live and work in.
Questions:
- How many new job listings were posted within the last two weeks?
Type your answers here.
Answers will vary.
- What is the salary range for the top 10 listings?
Type your answers here.
The answers will vary.
- What are the most common qualifications required by employers?
Type your answers here.
The answers will vary.
- What industry certifications are required by these employers?
Type your answers here.
The answers will vary.
- Do any of the certifications match the ones that you found in Step 1a?
Type your answers here.
The answers will vary.
- Investigate online resources that allow you to legally test your hacking skills. These tools allow a novice with limited cyber security experience to sharpen their penetration testing skills. One such site is Google Gruyere (Web Application Exploits and Defenses). What kinds of challenges can you find?
Type your answers here.
Answers will vary.