Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
      • Information security definition
      • Confidentiality, integrity, and availability of information
      • Risk, threat, vulnerability
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
    • Network devices and their functions
    • The Open Systems Interconnection (OSI) model
    • Host to host communication in networking
    • How switches facilitate communication
    • How routers facilitate communication
    • Network protocols and their functions
    • OSI model layers and security threats
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
    • Hashing algorithms and message integrity
    • Cryptographic encryption and confidentiality
    • The SSL/TLS handshake
    • Message signing using asymmetric keys
    • Authentication methods
    • Replay attacks and anti-replay methods
    • Generating and applying an RSA key
    • IEEE 802.11 authentication methods
    • IEEE 802.11 privacy and integrity methods
    • Authentication and encryption in WPA, WPA2, and WPA3
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • What is professional ethical hacking
    • The perils of unethical hacking
    • Defensive security vs offensive security
    • Defensive cybersecurity technologies
    • Phases of the penetration testing process
    • Types of penetration testing
    • Pentesting methodologies, frameworks, and technologies
    • Common attack targets
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  • Learning objectives
  • Topics covered in this section
  • IT industry employers
  • Getting into IT
  • Career path: IT Support (Technical Support)
  • Career path: Systems
  • Career path: Networking
  • Career path: ­Database
  • Career path: Development
  • Career path: Information Security
  • IT career landscape
  • IT training resources
  • Free IT training resources
  • Key lesson takeaways
  • References
  1. 1. IT career planning

IT career paths – everything you need to know

This section outlines the various IT career paths, each with a brief explanation of their relevant job roles and job titles

PreviousIntroduction - IT career planningNextJob roles in IT and cybersecurity

Last updated 9 days ago

Learning objectives

• Identify the various IT industry sectors • Describe key IT career paths, skills, and industry certifications • Identify key IT and cybersecurity training resources

– everything you need to know to plan, kick-start, and level up your IT career: job roles, job titles, specializations, skills, certifications, salaries, and training resources, from entry level positions to senior level positions.

Topics covered in this section

  • IT industry employers

  • Getting into IT

  • Career path: IT Support (Technical Support)

  • Career path: Systems

  • Career path: Networking

  • Career path: ­Database

  • Career path: Development

  • Career path: Information Security

  • IT career landscape

  • IT training resources

An IT analyst with 1-5 years IT job experience makes between US$67,580 and US$87,250 per year.

IT industry employers

  • Manufacturers of IT equipment (Cisco, Dell, Arista, Microsoft, etc.) that sell to large businesses such as Walmart, Amazon, etc.

  • Value added resellers that sell IT products and services to smaller businesses

  • MSPs – Managed Service Providers (for companies that do not want to hire IT specialists)

  • ISPs – Internet Service Providers (AT&T, COMCAST, Verizon, etc.)

  • IT recruiters

  • Businesses, nonprofits, school systems, and government organizations

  • Freelancing platforms (Upwork, Fiverr, Freelancer, Toptal, etc.)

Getting into IT

Career path: IT Support (Technical Support)

There are 400,000 U.S. job openings in IT and a $52,000 median entry-level salary in IT support, according to U.S. Burning Glass Labor Insight Report (data for 4/01/2021 – 3/31/22).

IT support is all about troubleshooting and problem solving, and providing great customer service along the way. This includes setting up computers for users within an organization, overseeing computer systems, and debugging whenever a problem arises. A job in IT can mean in-person or remote help desk work in a range of organizations across many different industries. (Google IT Support Professional Certificate)

There are generally three tiers or levels of IT support or “tech support” roles that level up to tech support management. Level one tech support is typically a customer service role set in a retail or call center environment. As the first line of support the focus is on helping the customer troubleshoot software and hardware issues. Related job titles include Technical Support Coordinator, Computer Specialist, Computer Support Specialist, Computer Technician, Help Desk Analyst, Support Specialist, and Technical Support Specialist.

Level two tech support typically requires more specialized product knowledge and does not involve taking front line calls. Related job titles include Technical Support Level 2, Help Desk Level 2, Desktop Systems Specialist ­ Level 2, Information Technology Specialist 2, and Help Desk Tier 2.

Level three IT support positions tend to be specialized and are considered to be part of product development rather than general support. Related job titles include Technical Support Level 3, Help Desk Level 3, Desktop Systems Specialist ­Level 3, Information Technology Specialist 3, and Help Desk Tier 3.

Technical support managers train and coordinate the company’s technical service staff. Tech support managers typically work with product development teams to improve and build documentation and support procedures.

Career path: Systems

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi­user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she manages meet the needs of the users, without exceeding the budget. To meet these needs, a system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train and/or supervise staff; or technical support in projects. (MicroTrain Technologies)

Systems administration is the field of IT that’s responsible for maintaining reliable computer systems in a multi-user environment. Sysadmins have a solid grasp of infrastructure services as well as cloud infrastructure setups and management of cloud resources. Sysadmins manage and configure servers and know how to use industry tools to manage computers, user information, and user productivity.

Systems Administrator related job titles include System Admin, Server Administrator, IT Systems Administrator, and IT Administrator.

Systems Architect related job titles include Solution Architect, System Architect, Computer Systems Architect, Security Architect, Knowledge Architect, and Enterprise Architect.

Systems security analysts “plan, implement, upgrade, or monitor security measures for the protection of computer systems. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses” (MicroTrain Technologies).

Systems Security Analyst related job titles include Information Security Administrator, Information Security Analyst, Data Security Analyst, Security Analyst, Security Engineer, and Systems Security Information Technology Specialist.

Career path: Networking

Network administrators, engineers, and architects are responsible for implementing, maintaining, supporting, developing and, in some cases (engineers and architects), designing communication networks within an organization or between organizations.

Network admins analyze and resolve end user hardware and software computer problems, and provide end user training where required. Network admins “ensure the stable operation of the in­house computer network and all connected PCs and peripherals, including planning, developing, installing, configuring, maintaining, supporting, and optimizing all network hardware, software, and communication links” (MicroTrain Technologies).

Network Administrator related job titles include Network Admin, Cisco Network Engineer, LAN Systems Administrator, Network Support Administrator, Network Support Coordinator, Network Engineer, and Network Manager.

Network Architect related job titles include Network Systems Consultant, Network Systems Integrator, Network/Telecom Engineer, Networking Engineer, Networking Systems and Distributed Systems Engineer, Telecommunication Systems Designer, and Design Engineer.

Network security analysts “plan, implement, upgrade, or monitor security measures for the protection of computer networks. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses” (MicroTrain Technologies).

Network Security Analyst related job titles include Network Security Administrator, Network Security Engineer, Network Security Officer, Security Analyst, Security Engineer, and Systems Security Information Technology Specialist.

Key computer networking skills include (Google IT Support Professional Certificate): ● Knowledge of computer networks in terms of a five-layer model, ● comprehension of all of the standard protocols involved with TCP/IP communications, ● understanding of network troubleshooting tools and techniques, ● understanding of network services like DNS and DHCP that help make computer networks run, and ● understanding of cloud computing, everything as a service, and cloud storage.

Career path: ­Database

A database professional is responsible for the performance, integrity and security of a database. They will also be involved in the planning and development of the database as well as troubleshooting any issues on behalf of the users. Job roles vary depending on the needs of the organization, type of database, business process and the capabilities of the database management system in use. (MicroTrain Technologies)

Jr. Database Administrator related job titles include Database Administrator, Database Technician, Database Tester, Database Analyst, and Database Coordinator.

Database Administrator related job titles include Database Administrator, Database Developer, Oracle Developer, Oracle DBA, and MySQL Administrator.

Sr. Database Administrator related job titles include Data Warehousing Engineer, Sr. MySQL Administrator, Database Administration Manager, Database Developer, Database Engineer, DBMS Specialist, and Databases Software Consultant.

Database Architect related job titles include Artificial Intelligence Specialist, Database Architect, Information Architect, Information Engineer, Knowledge Architect, Consultant, Strategic Business and Technology Intelligence, Systems Development Manager, and Security Architect.

Database security analysts “plan, implement, upgrade, or monitor security measures for the protection of database systems. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses” (MicroTrain Technologies).

Database Security Analyst related job titles include Information Security Administrator, Application Systems Administrator, Information Security Analyst, Data Security Analyst, Security Analyst, Security Engineer, and Systems Security Information Technology Specialist.

Career path: Development

Developers are the brains behind the design, installation, testing and maintenance of software systems. Development is a cross­-disciplinary career path typically requiring hardware, systems, database and programming knowledge. (MicroTrain Technologies)

Jr. Developer related job titles include Systems Engineer, Web Developer, Applications Developer, Programmer, Internet Programmer, Systems Programmer, .Net Developer, Jr LAMP Stack Developer, Jr. Full Stack Developer, and Jr. Openstack Developer.

Developer related job titles include Systems Engineer, Web Developer, Applications Developer, Programmer, Internet Programmer, Systems Programmer, .Net Developer, LAMP Stack Developer, Full Stack Developer, and Openstack Developer.

Sr. Developer related job titles include Systems Engineer, Web Developer, Applications Developer, Programmer, Internet Programmer, Systems Programmer, .Net Developer, Sr. LAMP Stack Developer, Sr. Full Stack Developer, Sr. Openstack Developer, and Lead Developer.

Master: variables, functions, conditional statements, loops, lists, dictionaries, objects, and interfaces.

2. Web development: HTML, CSS, Git, JavaScript, Portfolio Site, Node.js backend, React framework, Database Firebase/MongoDB, Crud Apps.

3. Learn the common data structures: lists, stacks, queues, linked lists, trees, graphs, tries, and hash tables.

4. Do some LeetCode problems (interview prep).

Career path: Information Security

Information security analysts “plan, implement, upgrade, or monitor security measures for the protection of computer networks, systems, applications and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses” (MicroTrain Technologies).

Information Security Analyst related job titles include Computer Security Specialist, Computer Specialist, Data Security Administrator, Information Security Analyst, Information Security Manager, Information Security Officer, Information Security Specialist, Information Systems Security Analyst, Information Technology Security Analyst, and Information Technology Specialist.

IT career landscape

IT Career Paths and Roles

Skills/Technologies

#Ads on LinkedIn (Canada) Sep. 2022

Salary

*IT Support/Technical Support

CompTIA A+

*Systems/System

System Administrator

Azure Administrator Associate, Network+, Linux+, Security+, VMWare Certified Professional, RHCSA

Linux, Windows Server – Active Directory: database and services (IAM), DNS Server, DHCP Server, and Group Policy; Windows 365 Cloud PC

2215

The national average salary for a Systems Administrator is C$73,040 (Glassdoor)

Cloud System Administrator

Amazon AWS, Microsoft Azure, Google Cloud, Oracle

943

System Engineer Builds and manages Windows/Linux servers

2768

C$83,574 per year (Glassdoor)

System Architect

9103

Systems Analyst

Systems Security Analyst

SSCP – Systems Security Certified Practitioner (ISC)²

Cloud security

2378

The national average salary for a Security Analyst is C$73,700 (Glassdoor)

*Networking

Network Administrator

Network+, CCNA, AWS Certified Solutions Architect – Associate, Azure Network Engineer Associate, Palo Alto PCNSA, JNCIA-Junos

1892

The national average salary for a Network Administrator is C$68,908 (Glassdoor)

Network Engineer Builds and manages computer networks

Network+, CCNA, CCNP Enterprise, Cisco DevNet Associate, AWS Certified Advanced Networking – Specialty

Python network programming

6962

C$76,751 per year (Glassdoor)

Network Security Engineer

Network+, Security+, CCNA, CCNP Enterprise, CCNP Security, AWS Security

Networking, Active Directory, server technologies, firewalls, light pen testing, scripting

The national average salary for a Network Security Engineer is C$95,419 (Glassdoor)

Network Architect

Network Analyst

ITIL, A+, Network+, CCNA

Routing, Switching, Wireless, VoIP, Security

1172

The national average salary for a Network Analyst is C$71,149 (Glassdoor)

Network Security Analyst

ITIL, A+, Network+, Security+, CCNA

The U.S. Department of Labor (DOL) classifies this job role as Information Systems Security Analyst 15­1122.00. Expected starting annual salary between $89,643 and $111,280.

*Database

Database Administrator

Microsoft SQL Server, MySQL, Oracle, Linux

5350

The national average salary for a Database Administrator is C$79,523 (Glassdoor)

1282

The average salary for a Database Engineer is C$113,437 (Glassdoor)

*Development

Frontend Developer

HTML, CSS, JavaScript, React (library), Angular (framework), TypeScript, WordPress, Shopify, SEO

Backend Developer

Java/Spring, Python/Django, PHP LAMP stack, Data Structures and Algorithms, APIs, Git

Fullstack Web Developer

HTML, CSS, JS, jQuery, PHP, Node.js (runtime environment that executes JavaScript code outside a web browser), Python, MySQL (database management system), Linux (server administration), git (version control system), gulp and grunt (task runners), webpack (module bundler)

Mobile Engineer

Data Engineer

Design data collection and analysis pipelines; Apache Hadoop

Game Developer

QA Engineer

Network+, CCNA, CCNP Enterprise, Cisco DevNet Professional

Python network programming; Linux administration; Infrastructure as a Code (Ansible – puppet – terraform); Containers; Kubernetes; CI/CD (Git and Jenkins); Monitoring tools (grafana and prometheus); Cloud Computing (e.g., AWS or Azure)

*GRC (Governance, Risk Management, and Compliance) The GRC approach to managing cybersecurity (the GRC analyst/manager role)

*Information Security Entry-level cyber security roles: MSSP: *SOC Analyst *Cyber Defense Incident Responder (Blue Team) *Cyber Forensics Expert *Cyber Operator (Red Team/Ethical Hacker) Enterprise: *Jr. Cyber Security Engineer *Vulnerability Assessment Analyst *Penetration Tester/Ethical Hacker

Security+, CySA+, Pentest+, OSCP, CEH, CISSP, CISM

IT training resources

Free IT training resources

Key lesson takeaways

• Key IT industry employers include hardware manufacturers, software vendors, and MSPs • Key IT career paths include systems, networking, development, and security • IT and cybersecurity training resources include commercial and free resources

References

In the absence of a university degree, entry into the IT field can be accomplished through entry level support roles. Holding a bachelor degree (especially in computer science/information systems disciplines) becomes more relevant the more senior is the position. With a four-year degree one should be able to skip entry level support roles and move straight into a junior level role. With the right combination of IT industry certification and lab (hands on) experience gained through completed learning projects and/or demonstrated talent, a university graduate should be able to land an admin/analyst position as their first job in IT. See .

As articulated in the course , a system administrator is able to (after completing the course): ● Utilize best practices for choosing hardware, vendors, and services for your organization, ● understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers, ● understand how to make the most of the cloud for your organization, ● manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP, ● choose and manage the tools that your organization will use, ● backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster, and ● utilize systems administration knowledge to plan and improve processes for IT environments.

1. Learn Python from freeCodeCamp’s Python in 4 hours Full Course:

Information security is not as much a career path as it is a specialization within various IT career paths. Information security specialists within organizations often take the role of analysts. Information security is a sub-area of IT security within organizations. A cybersecurity role is likely a second IT job at the earliest, but do exist.

In the words of course , key IT security skills/knowledge include: ● How various encryption algorithms and techniques work as well as their benefits and limitations, ● various authentication systems and types, ● the difference between authentication and authorization, ● how to evaluate potential risks and recommend ways to reduce risk, ● best practices for securing a network, and ● how to help others to grasp security concepts and protect themselves.

Certifications

Database Developer/Designer/Architect/Engineer

*DevOps

Training for the most sought-after . All the you need. Check out their training packages/stacks (US$59 monthly subscription)

Hands on training for cybersecurity career paths “mapped down to the specific skill level you will need” laid out in three categories: Beginner, Intermediate, and Advanced (US$59 monthly subscription)

Over 5 courses, this program will quality learners for IT support jobs such as help desk technician, systems analyst, support specialist, database administrator, and IT technician (US$39 monthly subscription)

“The world’s largest hacking community.” Kickstart and level up your career in cybersecurity through “the most captivating, gamified, hands-on training experience” (US$20 VIP Plus monthly subscription)

IT training to pass your IT certification tests and get a great job (US$59 premium monthly subscription)

Digital training products designed to help you reach your personal and professional goals successfully. – get immediate access to 30+ IT courses, labs, and practice exams for $29 per month (paid annually, at $348 per year). at $12.99 per course

Training to help you become a Network, Cloud, DevOps, or Cyber Security Engineer and achieve an income of US$130,000+ in record time ()

Learn “the right skills in the right order.” “combine specific courses and tools into one experience to teach you any given skill from start to finish” (US$29 premium monthly subscription)

“Absolutely no filler” information security courses. Purchase a course and gain lifetime access to it at US$29.99 or subscribe to an All-Access Membership to access all courses at US$29.99 per month

Hands on cyber security training through real-world scenarios for all skill levels ()

(SANS) This course covers the three foundation areas of information security – operating systems, networking, and system administration

Free online courses offered by Cisco. Certification-aligned training for Network Technician (70 hours) and Junior Cybersecurity Analyst (120 hours) career paths. Earn a digital badge after completing the training

(Coursera)

(Cybrary course)

Information Technology Career Pathways by MicroTrain Technologies (Chicago, IL)
Google IT Support Professional Certificate
System Administration and IT Infrastructure Services
How to become a software engineer with no experience (Self-taught Roadmap 2022)
Learn Python – Full Course for Beginners [Tutorial]
entry level cybersecurity positions
Google IT Support Professional Certificate
IT Security: Defense against the digital dark arts
CBT Nuggets
Cisco certifications and skills
cybersecurity training
IT Paths
Cybrary
Google IT Support Professional Certificate
Hack The Box
ITProTV (ACI Learning)
KWTrain (Kevin Wallace Training, LLC)
All-Access Pass
KWTrain at Udemy
Network Engineer Academy
US$77 monthly membership
Pluralsight
Paths
TCM Security Academy
TryHackMe
£8 premium monthly subscription
Cyber Aces Free Cyber Security Training Course
Skills for All (Networking Academy)
Google IT Support Professional Certificate
Information Technology Career Pathways by MicroTrain Technologies (Chicago, IL)
Introduction to IT & Cybersecurity
Security Certification Roadmap (Paul Jerimy Media)
The database development life cycle (The Open University free course)
Meta Database Engineer Professional Certificate
Meta Front-End Developer Professional Certificate
Meta Back-End Developer Professional Certificate
YouTube links to learn DevOps
IT career paths
IT-career-paths-uncle scrooge-1200x675px