Posted on May 24, 2016
8
8
0
There’s an ever-increasing focus on cybersecurity, along with cyber-warfare in the military. This is a step in the right direction because it can translate into better job opportunities outside of the military. But why?
First, a little history may be in order. In 1988, Robert Tappen Morris (son of the NSA’s former head of the National Computer Security Center) unleashed what is now known as a worm on the internet. This brought down thousands of computers, and took weeks to clean from computer systems. Morris was the first person prosecuted under the new Computer Fraud and Abuse Act. He served time and is now a respected computer engineer/scientist. There was no criminal defense at the time for the sort of attack Morris inflicted. In the 90’s, viruses became the weapon of choice for those looking to disrupt systems. Malware later replaced viruses as the primary threat to our computers.
Malware is a catchall term for computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is one of the top threats to any organization using computer technology in today’s world. Couple this with various attacks such as DDOS (Distributed Denial of Service), Man-in-the-Middle, and other vectors, any organization, from the military to a local business, is at risk.
So how does this translate to securing a job after military life? According to a recent survey conducted by Kaplan University, job opportunities for IT graduates are greatest in cybersecurity, followed by information security and forensics. An interview in “Business Wire” of Kaplan University’s Thomas Boyd, PhD, revealed, “a combination of globalization and innovation make business and IT two of the most dynamic workforce sectors today.” Boyd elaborated, explaining that, “the ever-changing challenges and opportunities in these sectors prompted us to revisit perspectives about current career outlooks and the key steps students should consider to maximize their career choices.”
One of the best ways to get into the security and forensic career paths is to earn certifications. Today, there are many certification companies; some of the top organizations are ISC2 (International Information System Security Certification Consortium, Inc.), ISACA (Information Systems Audit and Control Association®), IACRB (Information Assurance Certification Review Board), EC-Council and GIAC (Global Information Assurance Certification).
Additionally, the Department of Defense Directive 8570 has been replaced by the DoDD 8140; 8570 is now a part of a larger initiative that falls under the guidelines of 8140. DoDD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct information assurance functions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CND, and IASAE classifications.
Obtaining certifications adds to your overall marketability. The training you receive, along with your experiences in the military regarding InfoSec and OpSec, are very valuable to civilian organizations. Certifications from GIAC, ISC2 and ISACA tend to be the most coveted ones around.
Armed with one or more of these certifications, you can propel yourself into a new career in cybersecurity or computer forensics. I can attest to this firsthand; I have received my CISSP (Certified Information System Security Professional) from ISC2 , my CISM (Certified Information Security manager) from ISACA, and my CCFE (Certified Computer Forensic Examiner) from IACRB. Trust me - my employer has rewarded me accordingly. It has been worth the time, money and effort to get these certifications, even though I did pay for them out of pocket.
There’s a lot to learn about cybersecurity certifications, and the questions you might have can be very niche in nature. Feel free to message me through RallyPoint if you need some assistance with civilian cybersecurity questions - I would love to help you get started!
First, a little history may be in order. In 1988, Robert Tappen Morris (son of the NSA’s former head of the National Computer Security Center) unleashed what is now known as a worm on the internet. This brought down thousands of computers, and took weeks to clean from computer systems. Morris was the first person prosecuted under the new Computer Fraud and Abuse Act. He served time and is now a respected computer engineer/scientist. There was no criminal defense at the time for the sort of attack Morris inflicted. In the 90’s, viruses became the weapon of choice for those looking to disrupt systems. Malware later replaced viruses as the primary threat to our computers.
Malware is a catchall term for computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is one of the top threats to any organization using computer technology in today’s world. Couple this with various attacks such as DDOS (Distributed Denial of Service), Man-in-the-Middle, and other vectors, any organization, from the military to a local business, is at risk.
So how does this translate to securing a job after military life? According to a recent survey conducted by Kaplan University, job opportunities for IT graduates are greatest in cybersecurity, followed by information security and forensics. An interview in “Business Wire” of Kaplan University’s Thomas Boyd, PhD, revealed, “a combination of globalization and innovation make business and IT two of the most dynamic workforce sectors today.” Boyd elaborated, explaining that, “the ever-changing challenges and opportunities in these sectors prompted us to revisit perspectives about current career outlooks and the key steps students should consider to maximize their career choices.”
One of the best ways to get into the security and forensic career paths is to earn certifications. Today, there are many certification companies; some of the top organizations are ISC2 (International Information System Security Certification Consortium, Inc.), ISACA (Information Systems Audit and Control Association®), IACRB (Information Assurance Certification Review Board), EC-Council and GIAC (Global Information Assurance Certification).
Additionally, the Department of Defense Directive 8570 has been replaced by the DoDD 8140; 8570 is now a part of a larger initiative that falls under the guidelines of 8140. DoDD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct information assurance functions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CND, and IASAE classifications.
Obtaining certifications adds to your overall marketability. The training you receive, along with your experiences in the military regarding InfoSec and OpSec, are very valuable to civilian organizations. Certifications from GIAC, ISC2 and ISACA tend to be the most coveted ones around.
Armed with one or more of these certifications, you can propel yourself into a new career in cybersecurity or computer forensics. I can attest to this firsthand; I have received my CISSP (Certified Information System Security Professional) from ISC2 , my CISM (Certified Information Security manager) from ISACA, and my CCFE (Certified Computer Forensic Examiner) from IACRB. Trust me - my employer has rewarded me accordingly. It has been worth the time, money and effort to get these certifications, even though I did pay for them out of pocket.
There’s a lot to learn about cybersecurity certifications, and the questions you might have can be very niche in nature. Feel free to message me through RallyPoint if you need some assistance with civilian cybersecurity questions - I would love to help you get started!
Posted >1 y ago
Responses: 2
I can hole heartedly agree with you on this. Just look at the certs I earned so far through the Army. The only one not listed is the CPT by the IACRB next is CISSP. I tell all of my soldiers if your staying in get certified and if your getting out get certified. The field is always changing and always growing. It takes someone who can learn fast and adapt to the ever changing cyber security world to make a difference.
(2)
(0)
PO2 Todd Voge
Excellent to hear SSG Derek Scheller. I agree wholeheartedly that it takes someone who can learn and adapt quickly. And unfortunately (or fortunately), this is going to be an ever-expanding field.
(0)
(0)
Read This Next