NovaHax wrote: » That's a long road to travel my friend. I've been doing this for a while...and I still wouldn't consider myself a "cyber security expert"
NovaHax wrote: » A professional is very different than an expert. Honestly, its a pretty broad question. Any idea what are of cybersecurity you are looking to get into? Compliance / Audits Digital Forensics Incident Response Security Engineering Pentesting Malware Analysis Secure Software / Web Development Exploit Development
docrice wrote: » Not late, but one thing I will caution you is that your potential as a security professional is highly dependent on your ability to research on your own. This forum has tons of threads on career advice in the infosec space. Spend some days going through them.
Samy909 wrote: » Do you think it is late for me to start learning after my ug ?
Khaos1911 wrote: » if you don't give a crap about configuring switches and routers it is not necessary with you wanting to be in InfoSec, but knowing the in and outs of how a network works is vital to your goal of being in InfoSec.
Khaos1911 wrote: » As you can tell with a brief browsing of this site, CEH is "frowned" upon around here, but I personally learned quite a bit from the official study material which goes pretty in depth in alot of cases. It's overkill for the actual exam, but if you want to learn some interesting aspects of InfoSec and Malware and such, the official study materials are pretty awesome.
Khaos1911 wrote: » Also, obtaining the CEH with Sec +will also give you a leg up in job searches, believe me.
Khaos1911 wrote: » Finding an "entry level"or introductory job or internship into InfoSec isn't as impossible as many around here would make you believe.
NovaHax wrote: » Does this seem like a contradiction to anyone else? So it is not critical to understand configurations for switches and routers...but it is critical to understand the ins and outs of how a network works.
NovaHax wrote: » To excel in this field, however, you are going to need more than certs or training programs. You are going to need to love it...even when you hate to love it. And even when you eat, sleep and breathe security...you sill will always feel like you are never going to catch up. And if you can learn to love that too...then you might be a good candidate for the field.
NovaHax wrote: » Does this seem like a contradiction to anyone else? So it is not critical to understand configurations for switches and routers...but it is critical to understand the ins and outs of how a network works. What do you think networks are built on??? I'll give you a hint...it rhymes with retworks and nouters. I don't think anyone here would argue that you will get some benefit out of taking the course. Its not a question of whether you will learn something...its a question of what you are paying for. 1. You can pay $600 just to take a test. And a test written by an organization that apparently lacks enough self-respect to even hire some quality-assurance guys to make sure that the entire test isn't laden with spelling errors, grammatical errors and accuracy errors. 2. Even worse, you can do what I did and pay $5,000 to get a whole bunch slide shows and recordings of someone reading you the slides. Yeah...they list some good tools...but for the most part, don't tell you how to use them. **One year later, I spent $900ish on OSCP and then $700ish on eWPT and learned 100x as much with each of those, than I did with EC-Council. And I paid EC-Council more than 5x as much money** There is a reason why people on these forums try to steer other people away from EC-Council. And that is because the value that you get relative to the amount that you spend is not worth it...compared to many other industry alternatives. Its not because we are just jumping on an EC-Council bashing bandwagon. No disagreement here. But just because something looks good to HR...doesn't mean it actually provides any real world skills. Sometimes you have to make a choice between the cert that's going to get you the job, and the cert that you are going to get something out of. Throughout my career, I've tried to do a fair balance of each of these. Everybody has to play the HR game from time to time. I will never judge someone for getting a cert because its an HR expectation...and if that's the reason you want CEH...then more power to you. But when somebody asks me where they can learn good InfoSec skills (rather than just fluff their resume)...I'm not going to point them to EC-Council. I hope you aren't referring to my earlier comments on this. The guy asked how he could become a "cybersecurity expert", not how he could grab an "entry level" position. I would never discourage anyone from trying to get into InfoSec. To excel in this field, however, you are going to need more than certs or training programs. You are going to need to love it...even when you hate to love it. And even when you eat, sleep and breathe security...you sill will always feel like you are never going to catch up. And if you can learn to love that too...then you might be a good candidate for the field.
Khaos1911 wrote: » I'm not trying to read all that, but from a brief glance you appear to be getting quite emotional.
Khaos1911 wrote: » But if you really paid $5000 for some training that didn't come from SANS, you're a fool.
NovaHax wrote: » But when somebody asks me where they can learn good InfoSec skills (rather than just fluff their resume)...I'm not going to point them to EC-Council.
kMastaFlash wrote: » Getting some experience with scripting languges is key. Learning Python or Perl would be a great start! In regards to certificaions to get you a good leap into the industry.
NovaHax wrote: » Sometimes you have to make a choice between the cert that's going to get you the job, and the cert that you are going to get something out of. Throughout my career, I've tried to do a fair balance of each of these.
GarudaMin wrote: » You are interested in incident response/management, security engineering, pentesting and exploit development. That's a long and deep road to walk, especially security engineering. Start from the basic. I am going way above your head now and recommend you Ross Anderson's Security Engineering book (Security Engineering - A Guide to Building Dependable Distributed Systems). But it may be better for you to start with reading materials for Security+ certification to give you a foundation.
Samy909 wrote: » thank you Sir .. Yes have decided to start with sec+ And cissp
emerald_octane wrote: » Don't do it. You will gain little traction without the necessary experience. I've seen interviewers raise the bar straight out of the gate because the candidate was a CISSP.
NovaHax wrote: » No kidding. Technical vetting can get pretty brutal in this industry. I recently got asked a XSS (cross site scripting) question about injecting javascript code into already existing HTML script tags if double quotations are escaped and you are injecting inside a double quotation string. Apparently (and I didn't know this...but researched it afterwards), when your browser evaluates HTML content, it runs through everything with an HTML parser first, and then afterwards goes through with a separate parser that interprets any javascript. So you actually don't even have to escape the string with a second double quotation because the HTML parser is oblivious to the operational content within the script tags. That is to say...you can close the script </script> without closing the double-quote and the HTML parser will interpret it as if you weren't even inside a string...then you can inject new script content from there. By far...the most specific scenario based question I have ever been asked. In my experience though...even if you don't know the exact answer to the question, you can still impress by relating to the subject matter with what you do know (assuming you are still knowledgeable about the topic).
GarudaMin wrote: » What were you interviewing for? The most I have seen is what is XSS, how to protect, etc... just standard.
NovaHax wrote: » Lead pentesting role for a team of about 10 web-app and mobile pentesters for a big financial firm. They gave me a list of about 5 different scenarios. Different controls for each...and reflection into different locations on each. Then the question was...what payload to use on each to exploit XSS. I got all of them except the one above.