Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Educating The Cyberwarriors Of The Future
Newest First  |  Oldest First  |  Threaded View
Wolf29
50%
50%
Wolf29,
User Rank: Apprentice
7/6/2015 | 7:59:49 AM
Schools Can't Teach Novelty
I used to be acting chair of a computer networking department in an Atlanta college.  My school was just like every other.  We were all too busy teaching click-paths and memorization to teach troubleshooting and dealing with novelty.  The school had a BS in Info Sec, and it was certainly a lot better than nothing.  Some of the students went very far and are going farther.  They are hitting a wall at company HR departments, however.  Now that they have the diploma, they have to be able to get into something to learn how networks work.  Without the diploma, they are dropped from the search altogether, but even with the diploma, they are not getting useful experience, as part of the course of studies.

I would like to see courses that prepared students for some of the more basic security certs, and that were based on troubleshooting and logical real-world problem solving.  Children are being taught how to use computers at a very young age, but they are generally not being taught how to hack and counter-hack.  That would be a fun class, and promote better thinking.  This would lead to a more useful applicant pool.
Chambers
50%
50%
Chambers,
User Rank: Apprentice
3/30/2015 | 11:44:51 PM
Combat Informatics
I'd been looking for a security practitioners tradecraft canon to at least provide me with some idea as to what to master but couldn't find one.  Operational security has a tendency to be very wide and deep so it's tough to nail down what aspects make up a quality operative or analyst.  Over the years I naturally began outlining and organizing my work and acquired training.  I recently started posting things to my homepage. I call it Combat Informatics.  It's a living web document.  
bandrews750
50%
50%
bandrews750,
User Rank: Apprentice
3/30/2015 | 6:02:10 PM
Why Not Both?
You make good points that the modern education system has serious flaws, but advocating a switch to only specific skills has longer term dangers.

Some may be able to learn a specific system.  A few of those will be able to transfer skills between systems, but the lack of mastery of the underlying concepts will lead to many dangers in the future.

Which system should a student train on?  What happens when the company shifts its IPS or directory system?  Can someone who knows AD, but not core access control concepts, switch to the new system?

I would fully agree with an apprentice system, but then we would have to admit that some workers are not worth the money we are required to pay them.  That will not happen until something external (read politics) forces it to happen.

I am constantly telling students I teach that getting hands on skill is vital in today's world.  Is encouraging them to completely skip the degree really of value?  Not to the smart ones.  Nothing says they have to only have academic or hands on experience.

No one today has an excuse to not have both!
JosephD817
0%
100%
JosephD817,
User Rank: Apprentice
3/30/2015 | 12:20:21 PM
Start it early, build success!
One thing that I think would benefit everyone would to incorporate Computer Science in the public school K-12.

As a society, we teach Physical Science, Social Science, and other sciences that, in my opinion, are less used/needed than Computer Science.

I am located near Augusta, GA and with the new US ARMY Cyber Brigade coming to Fort Gordon, the loacl school systems has added cyber classes to the High School curriculum. I would like to see this introduced much earlier to build a lifetime of understanding in Computer Science. Locally, I am involved with some programs that teach young kids, but this needs to be MANDATORY.

 

Joseph Dain, CISSP
Jeff.schilling
50%
50%
Jeff.schilling,
User Rank: Author
3/30/2015 | 11:32:03 AM
Re: Apprentice to Master
I think no one strategy will scale to 200,000 open positions.  We have to re-engineer how we build the security professional pipeline in all of the ways I describe in the article.  

However, I think an Apprentice to Master approach will help most of us who are looking to bring in folks with great IT skills who now just need to learn how to apply that knowledge base to security operations.  
cprofitt
50%
50%
cprofitt,
User Rank: Apprentice
3/30/2015 | 11:17:51 AM
Employers need to be willing to hire and train talent
First, I agree with adding this to all comp-sci related degrees. I also think that current employers need to bite the bullet and be willing to hire and train talent. There are systems administrators, network professionals, etc that would be willing to make the jump that lack the formal training. If the situation is so dire then hire and train, and stop expecting trained people to fall from the sky.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/26/2015 | 4:47:57 PM
Apprentice to Master
This seems to me like a great option but wondering can it scale to fill 200,000 jobs? How can  apprentices find  masters and vice versa? 
Jeff Stebelton
0%
100%
Jeff Stebelton,
User Rank: Strategist
3/25/2015 | 10:14:10 AM
Re: Informal and formal training opportunties
SANS and ISC2 don't belong in the same list as ISACA, ISSA and OWASP. Though ISSA and ISACA offer their own certifications, and OWASP does offer training, they are professional organizations. SANS and ISC2 are training orgnaizations. There's no membership in SANS except as an alumni of their training. 
Jeff.schilling
100%
0%
Jeff.schilling,
User Rank: Author
3/24/2015 | 3:31:30 PM
Re: Informal and formal training opportunties
Thanks for the feedback and additional discussion.  Great thoughts.  I would say some of the certifications below you mention as not helpful I have found to provide pretty good quality training as long as it is complemented by an in house training program or apprentice/master relationship.  
andregironda
50%
50%
andregironda,
User Rank: Strategist
3/24/2015 | 3:05:26 PM
Informal and formal training opportunties
Great article -- great way forward!!!

Personally, I have to balance new kinds of training from a variety of sources. Some academic, such as Coursera and American Public University's Intelligence Studies courses. Some "hands-on" such as the Offensive Security PenTesting with Kali Linux Online course and labs. Some for both on-going and referential treatments, such as Books24x7, SafariBooksOnline, Lynda, and TeamTreeHouse. Others geared towards question and answer forums, such as Security.StackExchange.com, ReverseEngineering.StackExchange.com ServerFault, NetworkEngineer.StackExchange.com, and StackOverflow -- or even Quora. I find that networking with professionals on LinkedIn is also higher order -- there are many groups to start up a conversation or read the daily news (although TechMeme and other sites tend to aggregate these better). My go-to resource for everything tech, for the past decade, has been my full-content searchable RSS feed collection.

There are things that I do not find useful or conducive to learning: Facebook, infosec conferences, colleges and universities (even the ones that cater to netsec, cyber security, forensics, et al), and professional organizations (e.g., SANS, ISACA, ISC2, ISSA, OWASP, etc). Not all of these are quite as unequal as I'd suggest. It requires a balance. For example, I did mention some online formal learning to kick off my previous paragraph (not many undergrad/grad programs measure up to my needs, however). I think some OWASP chapters (e.g., Austin, which also has Austin Hackers Anonymous -- an excellent model to build on a local chapter setting because every attendee must present their ideas to the community) and some certifications (e.g., CISSP and Security+ for resume filtering) can lead to meaningful conversations and good, local networking. Occasionally, I will attend a Toorcon, DerbyCon, or GrrCon. Sometimes I'll even proctor a CISSP exam. Do these activities pop off the top of my priority list? Never, but they can be useful.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.