From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
Careers in information security
From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
Careers in information security
- Every year, US News and World Report does a study of the 100 best jobs in America, and information security consistently lands on that list. In 2022, information security analyst made it all the way to the top of that list ranking as the best job in America. Now, that's not just the best technology job, it's the best possible job in the entire country. Now, let's talk about some of the reasons that information security careers are so highly desirable. First, there are plenty of jobs available. While many career fields face an increasingly tight job market, the US Bureau of Labor Statistics projects incredible job growth of 33% through 2030 for the information security field. That's more than doubled the growth rate of computing jobs in general and more than quadruple the growth rate across all fields. Those are very optimistic projections if you're looking to break into information security as a new career field. Second, the jobs that are available pay very well. The median salary for an information security analyst in 2020 was more than $100,000. Just look at how that compares to other IT jobs and all jobs in America. And remember, the median is only the middle salary in the range. Half of all security professionals earn more than that. With the top 10% earning more than $140,000 a year, information security is certainly a lucrative field. Finally, information security is a professionally rewarding career. The nature of our field is that you get exposure to almost every area of information technology. Information security professionals work with network engineers, database specialists, server administrators, application developers, attorneys, and almost everyone else in the IT organization. They often find themselves in conversations with CIOs and CTOs as well as top business leaders. Perhaps it's not surprising that some security professionals go on to become chief information officers themselves. Now, most people begin their careers in information security as generalists in the field, typically in a role called information security analyst or something similar. These entry-level positions provide exposure to many different areas of information security and give the hands-on experience necessary to move up in the ranks of both information security and the IT organization. As security professionals develop along their career path, they typically specialize in one or more sub-disciplines of information security. Some security professionals specialize in network security working with network engineers to ensure that the organization's communication links are secure. Network security professionals work with firewalls, virtual private networks, intrusion detection and prevention systems, and other network security technologies. Others go on to specialize in computer forensics and assist with both internal and external investigations. Forensic experts might work on behalf of private organizations or law enforcement agencies helping to identify and retrieve critical evidence from information systems. Now, one of the most lucrative career options for a security professional is in the world of security consulting. Consultants work with many different clients, helping them design security strategies and implement highly specialized solutions. This career path often involves a lot of travel, but it can be very financially rewarding. No matter which direction your career goes in. You'll find that information security offers many different job options that align with your interests.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Identification, authentication, authorization, and accounting3m 34s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors4m 25s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Something you have4m 24s
-
(Locked)
Password authentication protocols3m 10s
-
(Locked)
Single sign-on and federation3m 9s
-
(Locked)
Passwordless authentication1m 48s
-
(Locked)
Privileged access management2m 31s
-
(Locked)
Cloud access security brokers5m 15s
-
(Locked)
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
Prevent SQL injection4m 25s
-
(Locked)
Understand cross-site scripting4m 46s
-
(Locked)
Request forgery4m 8s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
Directory traversal3m 6s
-
(Locked)
File inclusion1m 46s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Cookies and attachments4m 6s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Race conditions2m 13s
-
(Locked)
Memory vulnerabilities3m 34s
-
(Locked)
Code execution attacks2m 43s
-
(Locked)
Data poisoning55s
-
(Locked)
Third-party code3m 38s
-
(Locked)
Interception proxies5m 22s
-
(Locked)
-
-
(Locked)
Input validation2m 41s
-
(Locked)
Parameterized queries3m
-
(Locked)
Authentication and session management issues1m 49s
-
(Locked)
Output encoding3m 13s
-
(Locked)
Error and exception handling3m
-
(Locked)
Code signing2m 8s
-
(Locked)
Database security3m 53s
-
(Locked)
Data de-identification2m 44s
-
(Locked)
Data obfuscation2m 12s
-
(Locked)
-
-
(Locked)
Build an incident response program4m 13s
-
(Locked)
Creating an incident response team2m 15s
-
(Locked)
Incident communications plan2m 44s
-
(Locked)
Incident identification4m 26s
-
(Locked)
Escalation and notification2m 29s
-
(Locked)
Mitigation2m 20s
-
(Locked)
Containment techniques3m
-
(Locked)
Incident eradication and recovery5m 39s
-
(Locked)
Validation2m 24s
-
(Locked)
Post-incident activities4m 17s
-
(Locked)
Incident response exercises1m 37s
-
(Locked)
-
-
(Locked)
Conducting investigations3m 50s
-
(Locked)
Evidence types3m 28s
-
(Locked)
Introduction to forensics3m 21s
-
(Locked)
System and file forensics4m 26s
-
(Locked)
File carving3m 46s
-
(Locked)
Creating forensic images5m 30s
-
(Locked)
Digital forensics toolkit2m 25s
-
(Locked)
Operating system analysis6m 9s
-
(Locked)
Password forensics7m 16s
-
(Locked)
Network forensics4m 1s
-
(Locked)
Software forensics4m 25s
-
(Locked)
Mobile device forensics1m 10s
-
(Locked)
Embedded device forensics2m 30s
-
(Locked)
Chain of custody1m 50s
-
(Locked)
Ediscovery and evidence production3m 3s
-
(Locked)