Answer the question
In order to leave comments, you need to log in
What is the structure of the training plan for an information security specialist (step by step)?
To repeat\learn from scratch as an information security specialist, I made the following plan for myself:
1. Repeating the basic principles of network technologies\protocols\principles
(so, for a general reminder\development, I may have forgotten something)
2. Repeating the administration of Windows and Unix systems + MySQL + the basics of Kali LInux
(the same courses + literature + practice are used)
3. Maybe from scratch: A short course in information security for a system administrator or what to "close in the first place"
from scratch 4. From scratch: Cisco routing and security
(I think you can get certificate, the system is the same courses + practice)
5. Almost from scratch: Kali Linux + Parrot OS + in-depth understanding and knowledge of pentest + I have already slowly crawled onto Hack the box, but I don’t want to be there for the sake of the status of "mother's hacker". (same courses + practical skills)
6. From scratch: Python + advanced pentest + aim for a certificate.
7. Final goal: Obtaining deep and capacious knowledge in those. direction of information security and achieving the status of a generalist with an emphasis on IT audit and Pentest.
I drew in my head such an ideal image of a specialist who knows both the base + theory deeply and owns the current practice of application. I'm waiting for criticism
Important note: I already know the NIST and ISO standards. I do mostly paper work. I also have knowledge of information security audit, but I want to significantly broaden my horizons in technical terms and develop as a specialist.
I'm really looking forward to the additions / practical comments and advice.
UPD. University finished. Faculty - Cybersecurity. I have knowledge in the field of cryptography and a tower. The purpose of the opus is to keep knowledge in the industry up to date and develop skills.
Answer the question
In order to leave comments, you need to log in
I slowly crawled onto Hack the box, but I don't want to be there for the sake of the status of "mother's hacker".
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question