>> The information security roles that you're gonna fulfill as somebody who's taking
Security Plus, are very important. So let's talk a little bit, take a step back and talk about
some of the things in the world that you're gonna be living in. At CompTIA, we've kind of
identified for fundamental pillars, and these pillars have to do with the ability to develop
code, infrastructure such as the cloud or data centers, things like that.
Managing of data information and then of course security or cybersecurity as they talk
about it. So cybersecurity is one of the four essential pillars of IT. And what you can do is
use the Security Plus certification that you're studying as a way to organize your thoughts
and your study around this absolutely fascinating field of cybersecurity.
Now these are the Security Plus 601 domains here that you're taking a look at here. Each of
these five domains was created by literally thousands of subject matter experts. I'm not sure
people really have a perspective on this. It's not like a few folks got together and created
Security Plus or what have you.
This is actually, in essence, crowd-sourced peer information about cybersecurity that you
need to know. So it's a great way to go about organizing all of your understanding about
cybersecurity. Now CompTIA, because we work with thousands of subject matter experts
for any of our exams. These domains again are put together by professional so that you too
can get a professional level of understanding of cybersecurity.
That's the whole goal, because our certification really is focused on specific job roles and the
skills involved in those job roles. So there are various job roles such as network
administrator, and network administrator is a job role that's been around awhile. It's been
morphing for sometime for decades, really.
But with a network administrator, it's basically the person in charge of making sure that
information in transit remains secure. That's one way of looking at it. Another way of
looking at a network administrator though, is not so much from the security perspective,
but just, does the network operate well?
Are the switches in the routers, all those elements, edge network devices, are they all
working and playing well together? But a network administrator has to make sure that he
or she is putting together systems that are secure. When it comes to systems administrator,
that somebody who's working with various endpoints.
When I say endpoints, I'm not necessarily talking about your mobile phone. I'm not
necessarily talking about the PC or the notebook computer that you use or whatever the IoT
devices. I'm talking about the servers, the servers that operate in the cloud, the services that
operate in the cloud, or the servers in the data center.
The idea is, as a systems administrator, you're putting together information technology
systems that enable a research department to do research. That enable a sales department
to manage their relationships with their customers, that enable a business to do business.
As a systems administrator, you have to understand cybersecurity because you have to
build cybersecurity from the ground up.
Otherwise you're always kinda chasing security or you're dealing with what they call
downstream issues. By downstream issues, I simply mean that somebody's caused a
problem upstream and you've got to deal with it later. But if you build from ground up for
cybersecurity, it would be a lot better shape.
There are security operations center support professionals for example, and these people
basically work in a center, these days, much more distributed than even a year ago. But they
work to make sure that they monitor network administrators, the systems administrators
an their systems to make sure that there is no attack going on, things like that.
There are incident responders. It's a very important job role because as an attack happens,
we need people who can say, okay, I can recognize that there's an attack. I can then find a
policy-based way, a good way to respond to that attack. These are specific job roles, all
having to do with CompTIA Security Plus.
Contractors, there's so many contractors out there that basically help create incident
response policies, or there are people who say I can help you with that, a security
operations center. There are also security analysts. They are the people that kinda look for
attacks and listen for attacks. All of these folks, at a junior level to moderate level, are the
people that will work As cyber security professionals now what they do is they basically will
do all sorts of things that have to do with visualizing traffic.
What you're seeing here is a log in for something called kibana, It's something that's part of
the Elk Stack. I won't go into the details, but it's the idea that instead of just reading,and
obscur little log file, you can actually visualize it, and you could actually make it so that you
bus, that she would understand exactly what you're talking about.
The other things that you'll be doing it, you should be doing all sorts of risk assessments and
helping along with those you may not be in charge of that risk assessment. But you'll be a
central person, that provides the technology ,that provides the understanding of the
network so that you can conduct, scanning reports and scans, that will basically help an
organization understand it's cybersecurity stature.
You could put together network maps, for example and you can basically help understand
how the network elements are operating with each other. Now when it comes to security
operations center, it's often seen as a central resource, where they call it a soc, all right? But
here's the deal, nowadays they are much more distributed.
By distributed, I simply mean you're gonna have workers that might be working out of their
home, but nevertheless, you are coordinating with various people, help desks with analysts,
with cloud providers, various teams to turn data into information. So it with the security
operations center you're basically working with cyber threat intelligence, with security
analysts, with all sorts of individuals to basically allow the organization to understand it's
security stature.
More and more, the security worker today is gonna be working in the areas of privacy,
information security privacy, and also cybersecurity. And there are various areas in various
laws that you're gonna have to know and learn about, and these laws and frameworks and
regulations, there's so many of them, but they're all part of governance and risk
management and compliance.
And all of these different elements, work together to make sure that as you work in an IT
department that you're gonna be working as maybe with infrastructure individuals to say,
let's see how we can keep things working properly. You'll also be working with cyber
security professionals to say, well it may be working properly, but it's not really secure and
then you're gonna be working with governance people to make sure that your compliant to
various standards and frameworks, and there are so many of these standards and
frameworks out there.
If your company accepts credit cards, it might be that you'll be doing the PCI compliance, if
your organization that could be a bank, for example, or somebody working for the federal
government, you might be following a standard called the NIST cyber security framework.
In the state of California, has the California consumer Privacy Act when it comes to the
European Union, there's GDP.
Are all of these frameworks, they can be very confusing and it can be a little much, but if you
go back to those CompTIA 601 objectives, they help put things very much in context, so that
you have the technical know how, an the business know how, to support these kinds of
frameworks and laws and things like that.
Not gonna go into detail about the NIST cybersecurity framework, but the whole idea
behind this, is that it allows you to identify and protect and detect systems, enter detect
hackers as they're going along. The thing that's really important understand is that with
CompTIA security plus you have the ability to put all of these things to work.
Finally, there are all sorts of attack frameworks that you're gonna be learning about, the
Lockheed Martin cybersecurity killed chain, for example, the Mitre Attack Model, there's
also the diamond model. All of these different kinds of frameworks and all these different
kinds of laws things like that. These are things that are going to enable you to understand
how to properly secure a system.
Before we get to all that, though, I think it's really important to network, as you're learning
about a security, find peers to help you learn. You can use LinkedIn for example, if you don't
have an account, grab one, but use some sort of platform that allows you to get people to
help you learn.
So you can get ideas for hands on learning, the more you can get practical and hands-on
with all of these concepts and best practices, that better they can help you get through
rough spots in your learning, whatever those might look like. And peers can recommend
employment for each other, so these are some of the things to think about as you get into
the cybersecurity profession.