Companies Home Search Profile

Introduction to Cyber Security Careers

Focused View

Ken Underhill, CCSK, CEH, CHFI

4:38:18

18 View
  • 1 - Introduction to the Course.mp4
    02:11
  • 2 - GRC Analyst Career.mp4
    12:20
  • 2 - GRC-analyst-transcript.pdf
  • 3 - Privacy Analyst Career.mp4
    10:30
  • 3 - Privacy-Analyst-Transcript.pdf
  • 4 - Information Security InfoSec Auditor Career.mp4
    11:26
  • 4 - Information-Security-Auditor-Transcript.pdf
  • 5 - Cybersecurity-Technical-Writer-Transcript.pdf
  • 5 - Technical Writer Career.mp4
    11:24
  • 6 - Cybersecurity Marketing Career.mp4
    10:02
  • 6 - Cybersecurity-Marketer-Transcript.pdf
  • 7 - Cybersecurity-Sales-Engineer-Transcript.pdf
  • 7 - Sales Engineer Career.mp4
    06:44
  • 8 - Cybersecurity Sales Professional Career.mp4
    19:04
  • 8 - Sales-Professional-Transcript.pdf
  • 9 - Claims Specialist Career.mp4
    10:23
  • 9 - Cybersecurity-Claims-Specialist-Transcript.pdf
  • 10 - Cybersecurity-Product-Manager-Transcript.pdf
  • 10 - Product Manager Career.mp4
    14:09
  • 11 - Product Security Engineer Career.mp4
    08:53
  • 11 - Product-Security-Engineer-Transcript.pdf
  • 12 - Cyber-Software-Engineer-Transcript.pdf
  • 12 - Software Engineer Career.mp4
    09:54
  • 13 - Cybersecurity Analyst Career.mp4
    10:26
  • 13 - Cybersecurity-Analyst-Transcript.pdf
  • 14 - Cybersecurity Engineer Career.mp4
    09:06
  • 14 - Cybersecurity-Engineer-Transcript.pdf
  • 15 - IAM-Engineer-Transcript.pdf
  • 15 - Identity and Access Management IAM Engineer Career.mp4
    07:58
  • 16 - Threat Hunter Career.mp4
    11:50
  • 16 - Threat-Hunter-Transcript.pdf
  • 17 - Threat Intelligence Threat Intel Analyst Career.mp4
    10:38
  • 17 - Threat-Intel-Analyst-Transcript.pdf
  • 18 - IAM-Administrator-Transcript.pdf
  • 18 - Identity and Access Management IAM Administrator Career.mp4
    08:03
  • 19 - Cloud Security Engineer Career.mp4
    08:59
  • 19 - Cloud-Security-Engineer-Transcript.pdf
  • 20 - Digital Forensic Analyst Career.mp4
    12:08
  • 20 - Digital-Forensic-Analyst-Transcript.pdf
  • 21 - OT-Cybersecurity-Analyst-Transcript.pdf
  • 21 - Operational Technology OT Cybersecurity Analyst Career.mp4
    08:39
  • 22 - Penetration Tester Ethical Hacker Career.mp4
    09:54
  • 22 - Penetration-Tester-Transcript.pdf
  • 23 - OSINT Analyst Career.mp4
    07:44
  • 23 - OSINT-Analyst-Transcript.pdf
  • 24 - Vulnerability Management Analyst Career.mp4
    08:19
  • 24 - Vulnerability-Management-Analyst-Transcript.pdf
  • 25 - Cybersecurity-Program-Manager-Transcript.pdf
  • 25 - Program Manager Career.mp4
    18:25
  • 26 - Cybersecurity Project Manager.mp4
    11:32
  • 26 - Cybersecurity-Project-Manager-Transcript.pdf
  • 27 - Cybersecurity Manager.mp4
    07:37
  • 27 - Cybersecurity-Manager-Transcript.pdf
  • Description


    Find the right cyber security career for YOU

    What You'll Learn?


    • Identify non-traditional cyber security career paths
    • Identify common salary ranges for the U.S., UK, and India for each career
    • Identify some of the common job responsibilities for each career
    • Identify alternate job titles for each career to help you in your job search

    Who is this for?


  • People curious about cybersecurity careers
  • Career changers looking for an exciting new career path
  • Veterans and transitioning military looking for their next adventure
  • Single parents looking for flexible and rewarding careers
  • What You Need to Know?


  • No prior experience is needed. This course will introduce you to over 20 cybersecurity careers that you can do.
  • More details


    Description

    Are you ready to embark on a journey into the exciting world of cybersecurity but confused about what job you should pursue?

    Look no further.  This course will introduce you to over 20 cybersecurity career paths.


    You will learn about different cybersecurity career paths, like:


    GRC Analyst - Gain insights into Governance, Risk Management, and Compliance, and learn how GRC Analysts ensure organizations meet regulatory standards.


    Information Security Auditor - Learn how security auditors help organizations evaluate security controls to protect valuable data assets.


    Technical Writer - Many cybersecurity professionals started their career as technical writers for cybersecurity product or service companies.  This career is a hidden gem that most people don't know about.



    Why Choose this Course?


    This course covers an overview of each career path, including salary expectations based on geographic location (United States, UK, and India) and what to expect in your career.


    Built by a real cybersecurity professional with decades of experience who has hired thousands of people over the years, instead of watching a course built by someone in human resources or marketing.


    For each career, you learn about possible certifications and if you really need any certifications or college degrees to get a job in that career path.


    If you have been struggling to figure out which career path in cybersecurity you should start with, this course can provide information to help you make a decision.


    And you have nothing to lose because Udemy provides a 30 day money back guarantee.


    Enroll today!


    Who this course is for:

    • People curious about cybersecurity careers
    • Career changers looking for an exciting new career path
    • Veterans and transitioning military looking for their next adventure
    • Single parents looking for flexible and rewarding careers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Ken Underhill, CCSK, CEH, CHFI
    Ken Underhill, CCSK, CEH, CHFI
    Instructor's Courses
    Cheers!I have helped hundreds of thousands of people just like you over the years get started in their cybersecurity career.I am the Founder of Cyber Life and the Cyber Life School. Around 2 million people each year participate in my online cybersecurity courses across different platforms.I help and sit on the board of several cybersecurity startups and the nonprofit advisory boards for Breaking Barriers Women in Cybersecurity (BBWIC) and the Whole Cyber Human Initiative.I recently completed my first book, "Hack the Cybersecurity Interview" which is available at Amazon and other retailers all over the world. WHAT DO OTHERS SAY ABOUT ME? “I find his lectures and teaching style tremendously accommodating and helpful to those with a learning disability like myself. Ken successfully breaks down complex cyber security-related topics into bite- sized nuggets of gold that the average person can understand." - Karen V. (Penetration Tester)“I found your LinkedIn course was perfect for me… Your course has shown me how much work my LinkedIn profile will need if I am to be successful…” – Peter J."I just wanted to thank you for your LinkedIn course...I was recently retrenched, so this course was really helpful in getting my profile up to scratch." - Jason M. (Cybersecurity Professional)“Hi Ken, I would like to express my deep gratitude for your help and support, as your course & notes was very helpful for me, just now I passed my exam. You make me day. Shokran (arabic) = Thank you.” --- Abdurhman M. (Udemy student)“Ken Underhill is constantly supporting and giving props to others… Ken is the real deal and one of the most authentic people I have met.” – Phil W. (Senior Penetration Tester and Professor)“I passed my CHFI and your training and class was very helpful.” – Jeree S. (Analyst)“Ken’s lectures are great!” – Marcus B. (Ethical Hacker)“Thanks to your material, I passed my last course and wrapping up my Masters.  Thank you again.” – Michael M.“Great course about Fortinet with hands on learning and use cases.  Thank you, Ken.” – Mohamed D. (IT Professional)“I recently completed Ken’s pentesting course as preparation for the CEH… really a great prep course for the certification…” – Adhirath K. (IT Professional)
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 27
    • duration 4:38:18
    • Release Date 2023/12/25

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness

    Subtitle
    Practical Cybersecurity Fundamentals
    LiveLessonsPractical Cybersecurity Fundamentals
    14:19:23
    English subtitles
    02/20/2024
    Subtitle
    Security Tips: Digital Legacy