SlideShare uma empresa Scribd logo
1 de 30
How to
become a
cybersecurity
Analyst
Boni Yeamin
Agenda
• Introductions
• Become a Cybersecurity
Analyst
• Cybersecurity Other
Roles
• Cyber Security Analyst
salary
• The End
$ Who I am ?
• Work in defensive Security
• Cyber Security Analyst
• CTF Player
• Lover
• Quick learner
• boniyeamin.cse@gmail.com
• linkedin.com/in/boniyeamin/
Introduction
• The Cybersecurity Analyst career guide is intended
to help you take the first steps toward a lucrative
career in cybersecurity. The guide provides an in-
depth overview of the skills you should learn, the
best training options, career paths in cybersecurity,
how to become a Cybersecurity Analyst, and more
What is a Cybersecurity
Analyst?
• A Cybersecurity Analyst enacts cybersecurity
measures designed to protect and secure IT
infrastructure including networks, hardware, and
software from threats, attacks, and malicious
actors.
Cybersecurity Analyst
• To become a Cybersecurity Analyst, you need to understand
information systems and networks, gain hands-on technical
experience, and stay up-to-date in cybersecurity training.
• Cybersecurity is a relatively new field compared to other
technology careers. This means that there are a variety of paths
you can take to become a Cybersecurity Analyst. Many
Cybersecurity Analyst jobs require a bachelor’s degree in computer
science, programming, or a similar field.
• However, as the demand for cybersecurity increases, companies
are more focused on hiring people with the right skills and technical
experience, which can be gained through training and practice.
A cybersecurity analyst will help
protect a company and its
infrastructure from:
• Phishing, which often takes the form of fraudulent emails,
calls, and other communications that aim to steal
information including bank accounts, login information,
and credit card numbers.
• Malware or other malicious computer software can take
forms including viruses, Trojans, or spyware.
• Denial-of-service attacks where criminals try to
overwhelm servers and a network with bogus traffic that
locks out legitimate users.
• SQL injections into an application’s database that give
criminal actors access to sensitive data
Why Is Cybersecurity
Important?
• Cybersecurity is important because it protects all categories
of data from theft and damage. This includes sensitive data,
personally identifiable information (PII), protected health
information (PHI), personal information, intellectual property,
data, and governmental and industry information systems.
• Cyber-attacks are among the world’s fastest-growing crimes
and are becoming more innovative each year
• Sensitive online information stored such as personal data,
intellectual property, and government infrastructure is
vulnerable and need to be protected
• Cyber-attacks can affect any entity, from personal identity theft
to enterprise-level data breaches
Cybersecurity
Analyst Benefits
• There are many benefits to
seriously investing in
cybersecurity, including
protecting company data
against unauthorized
access, improving business
performance, and building
customer confidence. There
is also a steep potential cost
if cybersecurity isn’t taken
seriously enough.
Career growth
opportunities
cyber security
• The global cyber security
market size was valued at
USD 167.13 billion in 2020
and is expected to register
a CAGR of 10.9% from
2021 to 2028.
Here are just a few of the
benefits that cybersecurity can
bring to a business:
• Protects cyber attacks
• Saves time and money
• Improves employee productivity
• Boosts customer confidence
• Prevents PR disasters
• Helps companies recover from a breach
• Risk management.
Cybersecurity
Analyst roles and
responsibilities
• A cybersecurity analyst is a
trained cyber professional
who specializes in network
and IT infrastructure
security. The cybersecurity
analyst thoroughly
understands cyberattacks,
malware, and the behavior
of cybercriminals, and
actively seeks to anticipate
and prevent these attacks.
As a Cyber Security Analyst, you need to perform
various responsibilities while working in an
organization. Some of the significant and general
responsibilities that you will have as a professional in
this domain are mentioned below:
 Network monitoring
 Access monitoring
 Software management
 Reporting
 Development of security plans
 Avoiding breaches
 Ensuring compliance
 Dealing with disaster recovery and incident
response
 Research advancements and renewing skills
How to Become a
Cybersecurity Analyst in
Five Steps
I. Learn cybersecurity
fundamentals.
II. Practice technical
cybersecurity skills.
III. Earn a cybersecurity
certificate.
IV. Research the industry.
V. Apply to relevant
cybersecurity jobs.
1. Learn Cybersecurity
Fundamentals
• When thinking about how to become a Cybersecurity Analyst, your first
step should be to learn about the current threat landscape. As
technologies change and evolve, it’s important to know how to identify
vulnerabilities and threats.
• It’s also important to learn cybersecurity fundamentals, including how
information systems may be threatened, and how to anticipate and
detect threats. You should also get familiar with key elements important
to cybersecurity, such as network architecture and protocol, routing and
switching, firewalls, and more.
Cybersecurity Fundamentals
• Information system vulnerabilities
• Anticipating and detecting threats
• Network architecture and protocol
• Routing and switching
• Firewalls
• Networking.
• Programming and scripting.
• Testing.
• Threat detection.
• Hacking skills.
• Threat intelligence.
2. Practice Cybersecurity
Technical Skills
• After learning cybersecurity fundamentals, it’s
important to apply your knowledge and practice
common cybersecurity tasks, like performing
security audits, analyzing network traffic, and
securing information through encryption.
Cybersecurity Technical Skill
A FUNCTIONAL
UNDERSTANDING
HOW OPERATING
SYSTEMS ARE
BUILT AND
MANAGED.
A FIRM
UNDERSTANDING
THE
FUNDAMENTALS OF
COMPUTER
NETWORKING &
CLOUD
COMPUTING.
AN ABILITY TO
BEING ABLE TO
BUILD AND
EVALUATE
NETWORK
ARCHITECTURE
PERFORMING
SECURITY AUDITS
ANALYZING
NETWORK TRAFFIC
SECURING
INFORMATION
THROUGH
ENCRYPTION
Fews soft skills
• Apart from a college degree and
a training certificate, a few soft
skills will help one grow in a
cybersecurity career. To shine in
the cybersecurity career, I
recommend you get some
practical training during
internships and follow these key
steps ( and add on as per your
need ).
Skills
• Problem Solving
• Fail Fast, Learn &
Repeat
• Professor
• Enthusiasm
• Be an Avenger
3. Earn a Cybersecurity Certificate
• Taking a cybersecurity certificate course is a great way to learn about
cybersecurity, the current threat landscape, and the related technology
and tools used to detect and protect against threats.
• The best of these courses will allow you to earn a cybersecurity
certificate, which can help you stand out on the job market when applying
for a Cybersecurity Analyst job. This is particularly helpful if you don’t
have an extensive technical background.
Top
certifications
• Certified Information Systems
Security Professional (CISSP) ...
• Certified Information Systems Auditor
(CISA) ...
• Certified Information Security
Manager (CISM) ...
• CompTIA Security+ ...
• Certified Ethical Hacker (CEH) ...
• GIAC Security Essentials Certification
(GSEC) ...
• Systems Security Certified
Practitioner (SSCP)
4. Research the Cybersecurity
Industry
• Cybersecurity has to constantly evolve. Technology is always innovating
and, in turn, cyber attackers are coming up with new tactics and
workarounds.
• To be a successful Cybersecurity Analyst, it is important to stay on top
of new developments in the cybersecurity and cybercrime world.
• By understanding new trends in security and information technology, you
can ensure your knowledge and skills match current needs.
5. Apply to
Cybersecurity
Jobs
• Cybersecurity professionals are in
high demand. Cybersecurity
Ventures reports that there are up
to 3.5 million unfulfilled
cybersecurity jobs globally.
• Here are some of the most in-
demand roles in cybersecurity:
• As you can imagine, there are
many other positions and job
titles in cybersecurity, and they
will likely evolve and grow as
technology and the threat
landscape change.
Cybersecurity
Other Roles
• Security Manager or
Administrator
• Vulnerability Analyst
• Penetration Tester
• Cybersecurity
Consultant
• Forensic Computer
Analyst
• Chief Information
Security Officer
• Cybersecurity Analyst
• Cybersecurity Engineer
• Systems Analyst
• Systems Engineer
• Systems Administrator
• Network Engineer or
Architect
Cyber Security
Analyst salary
internationally
• The salary trajectory of a
Cyber Security Analyst
ranges between locations
and employers. The
salary starts at $75,994
per year and goes up to
$145,135 per year for the
highest level of seniority.
Salary to cybersecurity professionals
Bangladesh
The End

Mais conteúdo relacionado

Mais procurados

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Florian Roth
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report Morane Decriem
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightDeep Shankar Yadav
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...Chris Gates
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersInfosec
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 

Mais procurados (20)

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Maturity Model of Security Disciplines
Maturity Model of Security Disciplines Maturity Model of Security Disciplines
Maturity Model of Security Disciplines
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Blue Team
Blue TeamBlue Team
Blue Team
 
Soc
SocSoc
Soc
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 

Semelhante a cybersecurity analyst.pptx

Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxCS50Bootcamp
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael JosephiuvoTechnologies
 
What type of training is required for cyber security.pdf
What type of training is required for cyber security.pdfWhat type of training is required for cyber security.pdf
What type of training is required for cyber security.pdfBytecode Security
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Harry McLaren
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 

Semelhante a cybersecurity analyst.pptx (20)

Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Ppt information security
Ppt information securityPpt information security
Ppt information security
 
Ethical Hacking Workshop.pptx
Ethical Hacking Workshop.pptxEthical Hacking Workshop.pptx
Ethical Hacking Workshop.pptx
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!Ceh vs Cissp difficulty, Salary, Job!
Ceh vs Cissp difficulty, Salary, Job!
 
CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?CEH Vs CISSP: Which one is better?
CEH Vs CISSP: Which one is better?
 
What type of training is required for cyber security.pdf
What type of training is required for cyber security.pdfWhat type of training is required for cyber security.pdf
What type of training is required for cyber security.pdf
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 

Mais de Boni Yeamin

Mastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessMastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessBoni Yeamin
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBoni Yeamin
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabBoni Yeamin
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxBoni Yeamin
 
Structures in C.pptx
Structures in C.pptxStructures in C.pptx
Structures in C.pptxBoni Yeamin
 
Effective note keeping
Effective note keepingEffective note keeping
Effective note keepingBoni Yeamin
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)Boni Yeamin
 
Open Source Cybersecurity Tools
Open Source Cybersecurity ToolsOpen Source Cybersecurity Tools
Open Source Cybersecurity ToolsBoni Yeamin
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware WorkstationBoni Yeamin
 
How to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxHow to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxBoni Yeamin
 
Boni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOCBoni Yeamin
 

Mais de Boni Yeamin (13)

Mastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessMastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking Success
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-Lab
 
security onion
security onionsecurity onion
security onion
 
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptxCareer in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
 
Structures in C.pptx
Structures in C.pptxStructures in C.pptx
Structures in C.pptx
 
Effective note keeping
Effective note keepingEffective note keeping
Effective note keeping
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)
 
Open Source Cybersecurity Tools
Open Source Cybersecurity ToolsOpen Source Cybersecurity Tools
Open Source Cybersecurity Tools
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware Workstation
 
How to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxHow to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptx
 
Boni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdf
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
 

Último

Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negronnegronf24
 
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........deejay178
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jonesjonesyde302
 
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...gynedubai
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制yynod
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.GabrielaMiletti
 
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一ozave
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...nirzagarg
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaonmeghakumariji156
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Juli Boned
 
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制yynod
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNBruce Bennett
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfDeepak15CivilEngg
 

Último (20)

Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negron
 
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In daman [ 7014168258 ] Call Me For Genuine Models We ...
 
Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jones
 
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
 
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Raipur [ 7014168258 ] Call Me For Genuine Models We...
 
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
怎样办理哥伦比亚大学毕业证(Columbia毕业证书)成绩单学校原版复制
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.
 
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
如何办理堪培拉大学毕业证(UC毕业证书)成绩单原版一比一
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Shivamogga [ 7014168258 ] Call Me For Genuine Model...
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
 
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWN
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
 

cybersecurity analyst.pptx

  • 3. • Introductions • Become a Cybersecurity Analyst • Cybersecurity Other Roles • Cyber Security Analyst salary • The End
  • 4. $ Who I am ? • Work in defensive Security • Cyber Security Analyst • CTF Player • Lover • Quick learner • boniyeamin.cse@gmail.com • linkedin.com/in/boniyeamin/
  • 5. Introduction • The Cybersecurity Analyst career guide is intended to help you take the first steps toward a lucrative career in cybersecurity. The guide provides an in- depth overview of the skills you should learn, the best training options, career paths in cybersecurity, how to become a Cybersecurity Analyst, and more
  • 6. What is a Cybersecurity Analyst? • A Cybersecurity Analyst enacts cybersecurity measures designed to protect and secure IT infrastructure including networks, hardware, and software from threats, attacks, and malicious actors.
  • 7. Cybersecurity Analyst • To become a Cybersecurity Analyst, you need to understand information systems and networks, gain hands-on technical experience, and stay up-to-date in cybersecurity training. • Cybersecurity is a relatively new field compared to other technology careers. This means that there are a variety of paths you can take to become a Cybersecurity Analyst. Many Cybersecurity Analyst jobs require a bachelor’s degree in computer science, programming, or a similar field. • However, as the demand for cybersecurity increases, companies are more focused on hiring people with the right skills and technical experience, which can be gained through training and practice.
  • 8. A cybersecurity analyst will help protect a company and its infrastructure from: • Phishing, which often takes the form of fraudulent emails, calls, and other communications that aim to steal information including bank accounts, login information, and credit card numbers. • Malware or other malicious computer software can take forms including viruses, Trojans, or spyware. • Denial-of-service attacks where criminals try to overwhelm servers and a network with bogus traffic that locks out legitimate users. • SQL injections into an application’s database that give criminal actors access to sensitive data
  • 9. Why Is Cybersecurity Important? • Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems. • Cyber-attacks are among the world’s fastest-growing crimes and are becoming more innovative each year • Sensitive online information stored such as personal data, intellectual property, and government infrastructure is vulnerable and need to be protected • Cyber-attacks can affect any entity, from personal identity theft to enterprise-level data breaches
  • 10. Cybersecurity Analyst Benefits • There are many benefits to seriously investing in cybersecurity, including protecting company data against unauthorized access, improving business performance, and building customer confidence. There is also a steep potential cost if cybersecurity isn’t taken seriously enough.
  • 11. Career growth opportunities cyber security • The global cyber security market size was valued at USD 167.13 billion in 2020 and is expected to register a CAGR of 10.9% from 2021 to 2028.
  • 12. Here are just a few of the benefits that cybersecurity can bring to a business: • Protects cyber attacks • Saves time and money • Improves employee productivity • Boosts customer confidence • Prevents PR disasters • Helps companies recover from a breach • Risk management.
  • 13. Cybersecurity Analyst roles and responsibilities • A cybersecurity analyst is a trained cyber professional who specializes in network and IT infrastructure security. The cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of cybercriminals, and actively seeks to anticipate and prevent these attacks.
  • 14. As a Cyber Security Analyst, you need to perform various responsibilities while working in an organization. Some of the significant and general responsibilities that you will have as a professional in this domain are mentioned below:  Network monitoring  Access monitoring  Software management  Reporting  Development of security plans  Avoiding breaches  Ensuring compliance  Dealing with disaster recovery and incident response  Research advancements and renewing skills
  • 15. How to Become a Cybersecurity Analyst in Five Steps I. Learn cybersecurity fundamentals. II. Practice technical cybersecurity skills. III. Earn a cybersecurity certificate. IV. Research the industry. V. Apply to relevant cybersecurity jobs.
  • 16. 1. Learn Cybersecurity Fundamentals • When thinking about how to become a Cybersecurity Analyst, your first step should be to learn about the current threat landscape. As technologies change and evolve, it’s important to know how to identify vulnerabilities and threats. • It’s also important to learn cybersecurity fundamentals, including how information systems may be threatened, and how to anticipate and detect threats. You should also get familiar with key elements important to cybersecurity, such as network architecture and protocol, routing and switching, firewalls, and more.
  • 17. Cybersecurity Fundamentals • Information system vulnerabilities • Anticipating and detecting threats • Network architecture and protocol • Routing and switching • Firewalls • Networking. • Programming and scripting. • Testing. • Threat detection. • Hacking skills. • Threat intelligence.
  • 18. 2. Practice Cybersecurity Technical Skills • After learning cybersecurity fundamentals, it’s important to apply your knowledge and practice common cybersecurity tasks, like performing security audits, analyzing network traffic, and securing information through encryption.
  • 19. Cybersecurity Technical Skill A FUNCTIONAL UNDERSTANDING HOW OPERATING SYSTEMS ARE BUILT AND MANAGED. A FIRM UNDERSTANDING THE FUNDAMENTALS OF COMPUTER NETWORKING & CLOUD COMPUTING. AN ABILITY TO BEING ABLE TO BUILD AND EVALUATE NETWORK ARCHITECTURE PERFORMING SECURITY AUDITS ANALYZING NETWORK TRAFFIC SECURING INFORMATION THROUGH ENCRYPTION
  • 20. Fews soft skills • Apart from a college degree and a training certificate, a few soft skills will help one grow in a cybersecurity career. To shine in the cybersecurity career, I recommend you get some practical training during internships and follow these key steps ( and add on as per your need ).
  • 21. Skills • Problem Solving • Fail Fast, Learn & Repeat • Professor • Enthusiasm • Be an Avenger
  • 22. 3. Earn a Cybersecurity Certificate • Taking a cybersecurity certificate course is a great way to learn about cybersecurity, the current threat landscape, and the related technology and tools used to detect and protect against threats. • The best of these courses will allow you to earn a cybersecurity certificate, which can help you stand out on the job market when applying for a Cybersecurity Analyst job. This is particularly helpful if you don’t have an extensive technical background.
  • 23. Top certifications • Certified Information Systems Security Professional (CISSP) ... • Certified Information Systems Auditor (CISA) ... • Certified Information Security Manager (CISM) ... • CompTIA Security+ ... • Certified Ethical Hacker (CEH) ... • GIAC Security Essentials Certification (GSEC) ... • Systems Security Certified Practitioner (SSCP)
  • 24. 4. Research the Cybersecurity Industry • Cybersecurity has to constantly evolve. Technology is always innovating and, in turn, cyber attackers are coming up with new tactics and workarounds. • To be a successful Cybersecurity Analyst, it is important to stay on top of new developments in the cybersecurity and cybercrime world. • By understanding new trends in security and information technology, you can ensure your knowledge and skills match current needs.
  • 25. 5. Apply to Cybersecurity Jobs • Cybersecurity professionals are in high demand. Cybersecurity Ventures reports that there are up to 3.5 million unfulfilled cybersecurity jobs globally. • Here are some of the most in- demand roles in cybersecurity: • As you can imagine, there are many other positions and job titles in cybersecurity, and they will likely evolve and grow as technology and the threat landscape change.
  • 26. Cybersecurity Other Roles • Security Manager or Administrator • Vulnerability Analyst • Penetration Tester • Cybersecurity Consultant • Forensic Computer Analyst • Chief Information Security Officer • Cybersecurity Analyst • Cybersecurity Engineer • Systems Analyst • Systems Engineer • Systems Administrator • Network Engineer or Architect
  • 27. Cyber Security Analyst salary internationally • The salary trajectory of a Cyber Security Analyst ranges between locations and employers. The salary starts at $75,994 per year and goes up to $145,135 per year for the highest level of seniority.
  • 28. Salary to cybersecurity professionals Bangladesh
  • 29.