{"id":656,"date":"2018-08-10T14:32:07","date_gmt":"2018-08-10T14:32:07","guid":{"rendered":"http:\/\/thinqtanklearning.com\/blog\/?p=656"},"modified":"2018-08-10T20:00:17","modified_gmt":"2018-08-10T20:00:17","slug":"the-importance-of-gaining-cybersecurity-skills","status":"publish","type":"post","link":"https:\/\/thinqtanklearning.com\/blog\/the-importance-of-gaining-cybersecurity-skills\/","title":{"rendered":"The Importance of Gaining Cybersecurity Skills"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone wp-image-657\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Cybersecurity-Skills.png\" alt=\"\" width=\"665\" height=\"374\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Cybersecurity-Skills.png 2366w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Cybersecurity-Skills-300x169.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Cybersecurity-Skills-768x432.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Cybersecurity-Skills-1024x576.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Cybersecurity-Skills-1200x675.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p>It is no secret that the job market for cybersecurity professionals is growing and showing no signs of slowing down, as long as the headlines and top news stories contain major data breaches on a regular basis. Company and personal data is at risk, and employers need professionals who can understand cyber-attacks, recognize suspicious activities and take actions to prevent serious harm.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-658\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Help-Desk-Banner.png\" alt=\"\" width=\"625\" height=\"35\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Help-Desk-Banner.png 1250w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Help-Desk-Banner-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Help-Desk-Banner-768x43.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Help-Desk-Banner-1024x57.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Help-Desk-Banner-1200x67.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p>As CompTIA Chief Technology Evangelist James Stanger noted in his\u00a0<a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2017\/09\/01\/learn-and-earn-with-channelcon-online-cybersecurity-at-the-help-desk\" target=\"_blank\" rel=\"noopener\"><strong>ChannelCon 2017 presentation<\/strong>,<\/a>\u00a0the skills of help desk professional need to include cybersecurity. Help desk professionals need to understand the types of threats attempting to access the network so they can escalate any suspicious activity, block unusual actions and educate end users on how to help secure the network.<\/p>\n<p>Today\u2019s networks are changing as well. Companies are moving to\u00a0<strong><a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2018\/05\/16\/what-is-cloud-computing-a-general-overview\">cloud computing<\/a><\/strong>\u00a0in one form or another. Mobile networking is a huge issue, with the ability for employees to work from anywhere with an internet connection on multiple portable devices.<\/p>\n<p>Just as company networks are changing, so are the job roles of IT professionals who maintain the company networks. Today, job roles are becoming broader, and as security risks increase, job roles that traditionally focused on connectivity and infrastructure, and not necessarily network security or data breaches, are now at the center of securing information and the corporate infrastructure.\u00a0<strong><a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2017\/09\/06\/your-next-move-help-desk-technician\">Help desk professionals<\/a><\/strong>\u00a0are at the front line responding to customer issues and need to be able to determine if a corporate attack is underway or if an end user is simply experiencing issues and needs their password reset.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-659\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/CyberSecurity-Skills-Banner.png\" alt=\"\" width=\"625\" height=\"35\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/CyberSecurity-Skills-Banner.png 1250w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/CyberSecurity-Skills-Banner-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/CyberSecurity-Skills-Banner-768x43.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/CyberSecurity-Skills-Banner-1024x57.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/CyberSecurity-Skills-Banner-1200x67.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p>Looking at basic networking operations, it is easy to see where cybersecurity skills are required. A\u00a0network administrator\u00a0and\u00a0systems administrator\u00a0have many day-to-day tasks that include cybersecurity skill sets. Within these job roles, depending on the size of the organization, one would expect to be configuring end-user devices, managing access to resources, and patching endpoint devices and servers. Administrators would also be monitoring the network, for both performance issues and suspicious activity.<\/p>\n<p>In addition to understanding what tools should be used on the network, these job roles require skills for interpreting reports and analyzing data to maintain and secure the network.<\/p>\n<p>In most of today\u2019s networks, mobile devices are playing an ever-increasing role of accessing company information and resources. How will they connect to the network, and what access will they have? As companies increasingly move data and applications to the cloud, this adds another layer of complexity to the network and system administrator roles to be able to control data access and secure corporate information.<\/p>\n<p>In larger organizations, you may encounter separate job titles for network infrastructure, cloud services, IT support and cybersecurity. All of these can have overlapping skills and tasks. In a small or medium-sized organization, you may only have one or a few people who are responsible for completing all the tasks related to building, maintaining and securing the corporate network and supporting end users.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-660\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Skills-Banner.png\" alt=\"\" width=\"625\" height=\"35\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Skills-Banner.png 1250w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Skills-Banner-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Skills-Banner-768x43.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Skills-Banner-1024x57.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Security-Skills-Banner-1200x67.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p>Networking and security skills are critical for anyone in these job roles, and that is where\u00a0<a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Security-Plus-Training-Course-Sep-17\" target=\"_blank\" rel=\"noopener\"><strong>CompTIA Security+<\/strong>\u00a0<\/a>comes into play. An IT support specialist or network or systems administrator that is looking to take their career to the next level will can look into CompTIA Security+. This certification is key for anyone who supports users, infrastructure and company information.<\/p>\n<p>What sets <a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Security-Plus-Training-Course-Sep-17\" target=\"_blank\" rel=\"noopener\"><strong>CompTIA Security+<\/strong><\/a> apart from other cybersecurity certifications is that it covers the holistic overview pertaining to securing a company\u2019s infrastructure and data. It also covers the foundational, critical areas an IT professional needs to understand to secure the network.<\/p>\n<p>In particular, <a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Security-Plus-Training-Course-Sep-17\" target=\"_blank\" rel=\"noopener\"><strong>CompTIA Security+<\/strong><\/a> covers the following:<\/p>\n<p>\u2022 The areas where network breaches can occur, including physical attacks, digital attacks and internal and external threats<br \/>\n\u2022 Understanding threats, data and host security<br \/>\n\u2022 Risk management<br \/>\n\u2022 Hands-on network skills<\/p>\n<p>These skills are critical for anyone looking to advance their career and demonstrate that they can perform specific tasks instead of just understanding the concepts. (Original <a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2018\/07\/18\/comptia-security-the-secret-sauce-to-gaining-cybersecurity-skills\" target=\"_blank\" rel=\"noopener\">post<\/a> by\u00a0<span class=\"author\">Stephen Schneiter)<\/span><\/p>\n<p><a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Security-Plus-Training-Course-Sep-17\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-661\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/07\/CompTIA-Security-Banner.png\" alt=\"\" width=\"640\" height=\"275\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/07\/CompTIA-Security-Banner.png 3168w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/07\/CompTIA-Security-Banner-300x129.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/07\/CompTIA-Security-Banner-768x330.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/07\/CompTIA-Security-Banner-1024x440.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/07\/CompTIA-Security-Banner-1200x516.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><\/p>\n<p>If you have any questions about advancing your IT career, or our\u00a0<strong><a href=\"http:\/\/bit.ly\/thinQtank\" target=\"_blank\" rel=\"noopener\">Training and Certification Programs<\/a><\/strong>, we would love to hear from you! 855-TO-THINQ (855-868-4467)\u00a0\u00a0<strong><a href=\"mailto:website@thinqtanklearning.com\">website@thinqtanklearning.com<\/a><\/strong><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/SficV6p4AFs?list=PLeHzhn7aVgUcJ_UFCypE8HAXlNeK8_6j5&amp;rel=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is no secret that the job market for cybersecurity professionals is growing and showing no signs of slowing down, as long as the headlines and top news stories contain major data breaches on a regular basis. Company and personal data is at risk, and employers need professionals who can understand cyber-attacks, recognize suspicious activities &hellip; <a href=\"https:\/\/thinqtanklearning.com\/blog\/the-importance-of-gaining-cybersecurity-skills\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Importance of Gaining Cybersecurity Skills&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":669,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts\/656"}],"collection":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/comments?post=656"}],"version-history":[{"count":5,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts\/656\/revisions"}],"predecessor-version":[{"id":672,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts\/656\/revisions\/672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/media\/669"}],"wp:attachment":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/media?parent=656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/categories?post=656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/tags?post=656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}