Cybersecurity

Job roles in IT and cybersecurity

This post gives a succinct overview of in-demand job roles in IT and cybersecurity. Key job responsibilities, skills, and certifications for the following IT and cybersecurity roles are covered: System Administrator, Network Administrator, Incident Responder, Penetration Tester, Cloud Engineer, Cybersecurity Manager, and Privacy Analyst. You may also be interested in IT career paths – everything you […]

Job roles in IT and cybersecurity Read More »

job-roles-it-cybersecurity-1200x821px

Key CCNA terms and concepts

This post focuses on key CCNA terms and concepts. This is a CCNA glossary for Cisco IT professionals. You may also be interested in How to get CCNA certification. CCNA glossary Application Programming Interfaces (APIs) and REST APIs: APIs are published instructions to interface with a product or service. APIs enable developers to assemble a

Key CCNA terms and concepts Read More »

key-ccna-terms-ccna-glossary-1200x1015px

How to get CCNA certification

Do you want to know how to get CCNA certification? This post offers advice on how to get CCNA certification. This post explains how to become a Cisco Certified Network Associate. It offers tips and resources to help aspiring computer networking specialists pass their CCNA 200-301 exam (Implementing and Administering Cisco Solutions). You may also

How to get CCNA certification Read More »

get-ccna-certification

How to break into information security

Demand for information security specialists has soared in the last decade due to increasing rates of cybercrime. There is a severe shortage of talent for entry-level information security analyst positions. But trying to break into information security can seem like an overwhelming endeavor. This post introduces the three IT infrastructure foundation areas and the two

How to break into information security Read More »

how-to-break-into-information-security

The Security Operations Center (SOC) career path

This post discusses the Security Operations Center (SOC) career path. First, the SOC unit composition and technologies are discussed. Then the SOC team member roles and responsibilities, skills/qualifications, and certifications are discussed. Finally, training resources for SOC careers are suggested. You may also be interested in IT career paths – everything you need to know. What

The Security Operations Center (SOC) career path Read More »

Security-Operations-Center-soc-career-path-1200x675px

The GRC approach to managing cybersecurity

This post discusses Governance, Risk Management, and Compliance (GRC) in the context of IT governance and cybersecurity. The GRC approach to managing cybersecurity takes a risk-based approach to managing risks to the confidentiality, integrity, and availability of valued enterprise information assets. This discussion covers the ins and outs of the GRC cybersecurity career path –

The GRC approach to managing cybersecurity Read More »

GRC-cybersecurity-1200x1030px

IT career paths – everything you need to know

IT career paths – everything you need to know to plan, kick-start, and level up your IT career: job roles, job titles, specializations, skills, certifications, salaries, and training resources, from entry level positions to senior level positions. You may also be interested in The Security Operations Center (SOC) career path. IT industry employers Getting into

IT career paths – everything you need to know Read More »

A burning flame IT career paths

Ethical assessment of teaching ethical hacking

My uOttawa PhD thesis, titled Technoethics and sensemaking: Risk assessment and knowledge management of ethical hacking in a sociotechnical society, completed in 2020 at uOttawa engineering (the PhD in DTI uOttawa Program), contributed a set of pragmatic policy statements – recommendations to mitigate the risks of teaching hacking skills to higher education students in computer science and computer engineering disciplines. Three key themes

Ethical assessment of teaching ethical hacking Read More »

Ethical-assessment-teaching-ethical-hacking-1574x675px

Professional ethical hacking body of knowledge

My uOttawa PhD thesis exploring ethical hacking teaching practices in Canadian higher education, completed in 2020 at uOttawa engineering (the PhD in DTI uOttawa Program), contributed a set of implementable policy recommendations to inform effective ethical hacking teaching practices in computer science, computer engineering, and software engineering undergraduate programs – spanning instruction (approach), curricula content (what professional ethical hacking skills

Professional ethical hacking body of knowledge Read More »

Professional ethical hacking body of knowledge

What do ethical hackers do?

This is a discussion of what do ethical hackers do. The discussion focuses on key practices, responsibilities, and roles of professional ethical hackers. It is based on work I completed in a uOttawa PhD thesis (2020) on the topic of ethical hacking sociotechnology. Key practices of ethical hackers include vulnerability scanning, vulnerability assessment (identifying/listing known software vulnerabilities), penetration

What do ethical hackers do? Read More »

what-do-ethical-hackers-do
Text copying is disabled!