Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Lab - Becoming a Defender

Objectives
Research and analyze what it takes to become a network defender.
Part 1: Conduct search of Certifications.
Part 2: Investigate positions available within cybersecurity

Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one
of the fastest growing and most in-demand professions. Individuals in this field perform a wide variety of jobs
including, but not limited to, consultation, investigation, and program management services to mitigate risks
from both internal and external sources. Cybersecurity professionals are required to evaluate, design and
implement security plans, conduct in-depth fraud investigation, perform security research and risk
assessment, and propose solutions to potential security breaches.
Individuals with good security skills have a great earning potential. To be considered for one of these high
paying jobs, it is very important to have the proper qualifications. Because of this, it is important to consider
the industry certifications available for this career path. There are many certifications to choose from.
Selecting the right certification(s) for you requires careful consideration.
Note: You can use the web browser in the virtual machine that was installed in a previous lab to research
security-related issues. By using the virtual machine, you may prevent malware from being installed on your
computer.

Required Resources
 PC or mobile device with internet access and virtual machine (optional).

Instructions

Step 1: Conduct search of Certifications.


a. Use your favorite search engine to conduct a search for the most popular cybersecurity-related
certifications. List them below with the organization that provides the certification.
Certified Information Systems Security Professional (CISSP) - (ISC)²

Certified Ethical Hacker (CEH) - EC-Council

CompTIA Security+ - CompTIA

Certified Information Security Manager (CISM) - ISACA

 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Lab - Becoming a Defender

Certified Information Security Auditor (CISA) - ISACA

Offensive Security Certified Professional (OSCP) - Offensive Security

Certified Cloud Security Professional (CCSP) - (ISC)²

GIAC Security Essentials (GSEC) - Global Information Assurance Certification (GIAC)

Cisco Certified CyberOps Associate - Cisco

Certified Network Defender (CND) - EC-Councile

b. Pick three certifications from the list above and provide more detail about the certification requirements
and knowledge gained i.e.: vendor specific or neutral, number of exams to gain certification, exam
requirements, topics covered etc.
Certified Information Systems Security Professional (CISSP):

Organización: (ISC)²

Requisitos: Mínimo cinco años de experiencia laboral remunerada acumulativa en dos o más de
los ocho dominios del CISSP CBK (Cuerpo Común de Conocimiento de CISSP).

Examen: El examen CISSP consta de 100-150 preguntas de opción múltiple e innovadoras


avanzadas. Los candidatos tienen hasta tres horas para completar el examen.

 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Lab - Becoming a Defender

Temas cubiertos: Seguridad y gestión de riesgos, Seguridad de activos, Arquitectura y diseño de


seguridad, Comunicación y seguridad de redes, Identidad y gestión de acceso (IAM), Evaluación y
pruebas de seguridad, Operaciones de seguridad, Seguridad del desarrollo de software, entre
otros.

Certified Ethical Hacker (CEH):

Organización: EC-Council

Requisitos: No hay requisitos específicos, aunque se recomienda tener al menos dos años de
experiencia laboral en el ámbito de la seguridad de la información.

Examen: El examen CEH consta de 125 preguntas de opción múltiple, y los candidatos tienen
cuatro horas para completarlo.

Temas cubiertos: Introducción al hacking ético, Rastreo y reconocimiento, Escaneo de redes,


Enumeración, Hackeo de sistemas, Amenazas de malware, Sniffing, Ingeniería social, Denegación
de servicio, Secuestro de sesión, Hackeo de servidores web, entre otros.

CompTIA Security+:

Organización: CompTIA

Requisitos: No hay requisitos previos, aunque CompTIA recomienda tener al menos dos años de
experiencia en administración de IT con enfoque en seguridad.

 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Lab - Becoming a Defender

Examen: El examen Security+ (SY0-601) consta de un máximo de 90 preguntas, y los candidatos


tienen 90 minutos para completarlo.

Temas cubiertos: Amenazas, ataques y vulnerabilidades; Tecnologías y herramientas;


Arquitectura y diseño; Identidad y gestión de acceso; Gestión de riesgos; Criptografía y PKI.ype
your answers here.

Step 2: Investigate positions available within cybersecurity


Glassdoor is one of the largest job sites worldwide. Using your browser of choice, access glassdoor.com and
search to find cybersecurity jobs available that were posted within the last two weeks. Adjust the search as
you would like. You can search for jobs in your area or an area that you would like to live and work in.
Questions:

a. How many new job listings were posted within the last two weeks?
numero de ofertas de Nuevo trabajoType your answers here.

b. What is the salary range for the top 10 listings?


Rango salarial de las mejores 10 ofertas

c. What are the most common qualifications required by employers?


Calificaciones mas communes requeridas
d. What industry certifications are required by these employers?
Certificaciones de la industria requerida
e. Do any of the certifications match the ones that you found in Step 1a?
Certificaciones coincidentes
f. Investigate online resources that allow you to legally test your hacking skills. These tools allow a novice
with limited cyber security experience to sharpen their penetration testing skills. One such site is Google
Gruyere (Web Application Exploits and Defenses). What kinds of challenges can you find?
TXSS (Cross-Site Scripting)* Client-State Manipulation* Cross-Site Request Forgery (XSRF)*
Cross Site Script Inclusion (XSSI)* Path Tranversal* DoS (Denial of Service)* Code Execution*
Configuration Vulnerabilities* AJAX Vulnerabilities* SQL injection

End of document

 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com

You might also like