• Home
  • Resources and Tips
    • Digital Resources
    • Physical Resources
    • Hints and Tips
  • Education
  • IT
  • Learning in the future
  • Schools
  • Students
  • Tech in education
What's hot

Latino teachers share how their communities can reshape education – if given the chance

July 25, 2023

Preparing for the IBR “tax bomb” and student loan forgiveness

July 25, 2023

2 unions vote ‘no confidence’ for Hampshire Regional School Superintendent – Western Massachusetts News

July 25, 2023

Standing Shoulder to Shoulder – ED.gov Blog – Department of Education (.gov)

July 25, 2023
Facebook Twitter Instagram
  • Home
  • Contact us
  • Privacy policy
  • Terms & Conditions
Facebook Twitter Instagram
Teaching Resources Pro
  • Home
  • Resources and Tips
    • Digital Resources
    • Physical Resources
    • Hints and Tips
  • Education

    Standing Shoulder to Shoulder – ED.gov Blog

    July 25, 2023

    Florida approves controversial set of black history standards

    July 23, 2023

    Summer Reading Contest Week 6: What caught your eye in The Times this week?

    July 21, 2023

    These are the effects of talking to yourself

    July 19, 2023

    Risk Mitigation and Security Enhancement

    July 17, 2023
  • IT

    What is DevOps Automation? | TechRepublic.com

    July 23, 2023

    Future Cyber ​​Threats: The Four “Horsemen of the Apocalypse”

    July 21, 2023

    Splunk’s New AI Tools Aim to Make Security and Observability Tasks Easier

    July 19, 2023

    Navigating through directories in Java | TechRepublic

    July 15, 2023

    Civil society groups call on EU to put human rights at center of AI law

    July 13, 2023
  • Learning in the future

    Standing Shoulder to Shoulder – ED.gov Blog – Department of Education (.gov)

    July 25, 2023

    The future of free breakfast and lunch for all college students in Pennsylvania… – Pittsburgh Post-Gazette

    July 23, 2023

    Halıcıoğlu Data Science Institute at UC San Diego: Pioneering … – Datanami

    July 21, 2023

    Empowering Africa’s Future Through Collaboration – Commonwealth

    July 19, 2023

    In memory: Larry Pryor | USC Annenberg School for… – USC Annenberg School for Communication and Journalism |

    July 17, 2023
  • Schools

    2 unions vote ‘no confidence’ for Hampshire Regional School Superintendent – Western Massachusetts News

    July 25, 2023

    Council rejects ‘gut instinct’ proposal to close disciplinary school near Baker – The Advocate

    July 23, 2023

    Man, 26, impersonated 17-year-old student for 54 days at Nebraska high schools, police say – USA TODAY

    July 21, 2023

    Top Schools Begin Dropping Legacy Admissions After Affirmative Action Decision – Yahoo! Voice

    July 19, 2023

    Lake County: Back-to-School Students to Return to New Schools, Programs and Leadership in August – WFTV Orlando

    July 17, 2023
  • Students

    Preparing for the IBR “tax bomb” and student loan forgiveness

    July 25, 2023

    8 things to do in the summer that will make college easier

    July 23, 2023

    Fun things to do with teens before college

    July 21, 2023

    Moving into the halls of the University of Dundee – Student Blog

    July 19, 2023

    Attendance at ALA’s annual conference was “absolutely invaluable” – SJSU

    July 17, 2023
  • Tech in education

    Latino teachers share how their communities can reshape education – if given the chance

    July 25, 2023

    Best FIFA World Cup Activities and Lessons

    July 23, 2023

    Cybersecurity tips for students

    July 21, 2023

    Microsoft Forms tutorials for teachers

    July 19, 2023

    The power of quality class sound

    July 17, 2023
Teaching Resources Pro
Home»IT»Security Think Tank: Finding the Right Combination of Training and Development
IT

Security Think Tank: Finding the Right Combination of Training and Development

February 2, 2023No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

What training do we need to provide cybersecurity professionals to be one step ahead of the bad guys? And how do we retain talented security professionals in such a competitive recruitment market? These two important questions may seem different, but they are intrinsically linked. Both relate to the statement we always hear at the start of a vendor pitch: “The cyber threat landscape is constantly changing.”

The truth is that we rely on the fact that we work in an industry where a large percentage of the workforce is made up of highly motivated and motivated people who complete their work and then often sit down to create or try to new tools. They investigate new sources, participate in “capture the flag” events and debate in online forums. But that’s not possible for everyone due to a myriad of reasons.

This level of dedication and constant occasional learning can also make the career transition quite scary for some. Keeping up with innovations, technology, and the ever-changing threat landscape is certainly daunting. However, there are now fantastic resources available, many of them free, to make it easier for cybersecurity professionals to train and hone their skills, with certified proof.

One of the most important things we need to do as an industry is to create the time, space, environment and budget for talent to continuously improve. Where some industries push continuous development for people to become more experienced or certified, we in cybersecurity must do so too – because “the cyber threat landscape is constantly changing”.

Personally, I love resources like Immersive labs and hack the box. Why? Because they can quickly reflect the real world threat landscape, with hands-on labs that can test defensive and offensive skills against the latest techniques, quickly aligning an individual’s skills with real-life situations.

Many of these platforms also align with career development and certification pathways – so the work is mostly done for us. That said, variety is the spice of life. There will always be a place for intensive classroom training, led by a tutor.

It’s about getting the recipe right for the individual, which also helps with retention.

The psychological build of the average cybersecurity professional means that they place a high value on their employers caring about their training, knowing that they have a dedicated training budget and a detailed training plan laid out. for him. The more effort we put into our talent training and development plans, the more effort they will put into the role and our businesses.

It doesn’t have to cost the earth.

A training plan should not only contain large expensive courses, but subscriptions to platforms, academies and even free online tutorials and webcasts, for example. Training offerings don’t have to be a “one type fits all” scenario, we need to keep in mind that different people learn in different ways and everyone benefits from the variety.

Although lab training such as HTB and Immersive have recently strengthened cybersecurity skills and certification bodies such as Crest have ensured that these skills are used in a safe, professional, ethical and legal manner, for the future, I’m excited to see what virtual and mixed reality is can bring to cybersecurity training.

Some of us are very visual or auditory learners. Labs where we can learn with the help and support of friends and strangers, pointing to visual representations of networks and network traffic, will bring whole new understanding and perhaps even new people to our industry. It will also merge the separation between classroom, tutor-led training and hands-on labs.

The evolution of AI-based chatbots, many of which have recently made headlines. These bots have the ability to act as tutors and “sounding boards”. This allows students to ask questions, clarifications and seek advice, for example with the development of scripts and rules.

Overall, the cybersecurity training environment is strong and continues to grow. What’s more important is making sure individuals have the time, support, plan, and budget to make it happen. Want to keep your staff? Do the above. Want to be at the forefront of an ever-evolving threat? Do the above. Want to do the right thing for the individual and the industry? Then do the above.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

What is DevOps Automation? | TechRepublic.com

July 23, 2023

Future Cyber ​​Threats: The Four “Horsemen of the Apocalypse”

July 21, 2023

Splunk’s New AI Tools Aim to Make Security and Observability Tasks Easier

July 19, 2023
Add A Comment

Leave A Reply Cancel Reply

Latest

Latino teachers share how their communities can reshape education – if given the chance

July 25, 2023

Preparing for the IBR “tax bomb” and student loan forgiveness

July 25, 2023

2 unions vote ‘no confidence’ for Hampshire Regional School Superintendent – Western Massachusetts News

July 25, 2023

Standing Shoulder to Shoulder – ED.gov Blog – Department of Education (.gov)

July 25, 2023

Subscribe to Updates

Get the latest creative news from teachingresourcespro.

We are social
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't miss

Latino teachers share how their communities can reshape education – if given the chance

July 25, 2023

Preparing for the IBR “tax bomb” and student loan forgiveness

July 25, 2023

2 unions vote ‘no confidence’ for Hampshire Regional School Superintendent – Western Massachusetts News

July 25, 2023

Subscribe to Updates

Get the latest creative news from teachingresourcespros.

  • Home
  • Contact us
  • Privacy policy
  • Terms & Conditions
© 2023 Designed by teachingresourcespro .

Type above and press Enter to search. Press Esc to cancel.