Book now with code EOY2025
YuckTheFankees wrote: » If you are wanting to go down the penetration/vulnerabilities assessment career path, I have a few questions for you? * Can you program? If so, which languages? Do you have a computer science degree? They really love those for pentesting. * Can you script? If so, which languages? * Do you know ASM? * Are you familiar with PHP, HTML, SQL, LINUX, etc.. * Do you know how to use and have experience with nmap, nessus, dsniff, libnet, netcat, and network sniffers and fuzzers? If anything I would say go for the OSCP and see if you can complete the course/gain the certifications. The senior penetration tester I know, says gaining the OSCP would definitely prepare you for a junior pentesting position.
jasong318 wrote: » ASM is assembly. It looks like you're on a good track as it is, if you can get a Jr. Pentester job, go for it. If not, try the Network/Sysadmin route to get some real world experience and learn why people often make the mistakes they do that make pentesting a reality In the meantime, read this article: Getting a Start in the Security Industry - SpiderLabs AnteriorSet up your own lab and play with it. It doesn't even have to be a real, physical lab. Put virtualbox on your laptop with a copy of OWASP broken web apps, Metasploitable (v1 & v2) and backtrack. Setup Security Onion to monitor them while you attack, learn lots Try hooking up with local groups in your area (2600, Defcon, OWAP, etc.), these are invaluable resources not just for learning but for networking. Also, you can go ahead and test for the CISSP without the required experience, you'll just be a 'associate of isc2' until you get the full 5 years and then become a full fledged CISSP. And to echo what others have said, the OSCP would be most valuable in terms of learning/value. Having the CISSP is nice and will get past the HR screen but the guys doing the acrtual hiring love the OSCP
Use code EOY2025 to receive $250 off your 2025 certification boot camp!