Intro to Careers In Cybersecurity
Getting started in cybersecurity can be tough, and the number of careers seems endless. This course will get you hands-on with six of the most common cybersecurity roles, including penetration tester, digital forensics, cloud security, governance, security analyst, and security engineer. Decide which career is right for you today!
Already have an account? Sign In »
![Hero](http://images.ctfassets.net/kvf8rpi09wgk/1BUZ7fMHyJLdonPTMYrhDE/69b0c29b493863f157eebca78fcff595/Noobz_Course_Draft_Designs___46_.png?w=500&q=55&fm=webp)
Module 1: Introduction
Module 2: Security Analyst
2.2Log Review
Module 3: Security Engineer
3.2Software Vetting
Module 4: Governance, Risk, and Compliance
4.2Cyber Risk Analysis
Module 5: Cloud Security Engineer
5.2AWS S3
Module 6: Digital Forensics and Incident Responder
6.2Registry Analysis
Module 7: Penetration Tester
7.2Password Cracking
Breaking into cybersecurity can be challenging at the best of times. The industry has so many different roles and disciplines. Don’t let that keep you from getting started. This course will get you up close to six major fields in cybersecurity: Penetration Testing; Digital Forensics and Incident Response (DFIR); Cloud Security Engineering; Governance, Risk and Compliance (GRC); Security Engineering; and Security Analyst. You’ll hear from subject matter experts in each of these fields discussing what a day in the life is like for each of them. Discover what led them to these careers and what still excites them today.
In addition, you’ll have the chance to get hands-on with activities each of these roles is likely to perform regularly. Ever wanted to crack a password? No problem, dive into the Penetration Tester lab. Ever wanted to evaluate whether a software solution is truly secure? We’ve got you covered in the Security Engineer lab. At the end of this course, you’ll have a great idea of what field in cybersecurity you could make your goal.
![Matthew Mullins](http://images.ctfassets.net/kvf8rpi09wgk/4eXrzWPmMxDxG0yjf7yH9K/1abf3cc8031160a14a187739513d7e85/Screen_Shot_2022-08-26_at_12.50.00_PM.png?w=80&h=80&fit=thumb)
Matthew Mullins
Security Researcher - Adversary Emulation
![Marc Balingit](http://images.ctfassets.net/kvf8rpi09wgk/5iblyRRQybT8dTuBUA8Eis/06dfa0e7d19543b6050ddaa5d4802c62/IMG_7641__1_.jpg?w=80&h=80&fit=thumb)
Marc Balingit
Security Researcher - Incident Response
![Tony Vinson](http://images.ctfassets.net/kvf8rpi09wgk/Kswwk5nFDnBEaFlnG2xi1/3ecc58e52c41a8cb21a14516530dba66/Tony_Vinson_Headshot.jpeg?w=80&h=80&fit=thumb)
Tony Vinson
Cloud Security Architect
![Danielle Pompa](http://images.ctfassets.net/kvf8rpi09wgk/akRoHVG3sZMlOnwKnSQtu/ad40967ebb320c3659448307e8ffe5bb/Danielle_Pompa.jpg?w=80&h=80&fit=thumb)
Danielle Pompa
Infrastructure Vulnerability Remediation Engineer
![Owen Dubiel](http://images.ctfassets.net/kvf8rpi09wgk/4QvacniRzvVDuXEHFyXVVP/4ca5226e1cefa81512eb40f61d4d9e43/Owen_Dubiel_Headshot.png?w=80&h=80&fit=thumb)
Owen Dubiel
Security Engineer
![Chris Daywalt](http://images.ctfassets.net/kvf8rpi09wgk/3MtnvKfp1MtTjJegCgRON9/4951f0cfa3511a81ed441c3ad7b85095/Chris_Daywalt_Pic.jpg?w=80&h=80&fit=thumb)
Chris Daywalt
Security Freelancer
![Cybrary](http://images.ctfassets.net/kvf8rpi09wgk/6zC8AKNycm1GL0hxRxUPu1/37b33c7059bdf7bd3992bc7cb7d24537/Cybrary_Logo_2019-BlackCybrary.png)
![Certificate Of Completion](http://images.ctfassets.net/kvf8rpi09wgk/7a9Hi5dmSSnzuNJqMTcqUC/5264b28124e7ec8087d82c771a3f84bb/Cybrary-Cert.png?w=220&q=100)
Complete this entire course to earn a Intro to Careers In Cybersecurity Certificate of Completion
Domains