CompTIA Cybersecurity Certifications

Security in Cloud Computing

Expect the cloud to play a larger role in CompTIA Security+ (SY0-601) and CompTIA CySA+ (CS0-002) in 2020. The core technical cybersecurity skills are largely the same (e.g., a firewall is a firewall), but the infrastructure environment will differ. Data is either on site or it’s in the cloud. The main difference will be policy. When storing your data on third-party systems, there must be rules of ownership and agreement about security in the cloud and how you’ll work on the systems.

A few years ago, Cynthia Armstrong attended a conference for women in IT. During one of the sessions, the speaker asked how many women worked in the IT field and she saw hands shoot up everywhere. The speaker then asked how many were in management positions and she saw she was just one in a handful. At that moment she realized that she was a minority of a minority of a minority – and she wanted to do more.

Armstrong joined the Hampton Roads Women in IT Communication Committee to contribute her voice to the efforts to change the business world’s perspective on women in IT and later enrolled at WGU to earn her degree in information technology.

In addition to encouraging women to pursue STEM careers, Armstrong advocates on behalf of hiring individuals with disabilities like Asperger’s Syndrome.

2. More Cybersecurity Threats, Attacks and Vulnerabilities

The list of cybersecurity threats, attacks and vulnerabilities continues to grow, and cybersecurity professionals need a new understanding to defend against them.

Newer attacks, such as drone reconnaissance, use drones to fly over facilities to collect data for eventual attacks. One of the IT technicians I spoke with flew a drone over his company’s enterprise campus to identify vulnerabilities. The drone scanned computer networks as it flew over, and the technician was alarmed by the weaknesses it found. In response, his company set up surveillance systems and cameras to identify low-flying objects entering its airspace. The risk was too great to ignore for its national defense work.

More Info: comptia project jobs

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis