Soumettre la recherche
Mettre en ligne
Kickstart your infosec career
•
Télécharger en tant que PPTX, PDF
•
1 j'aime
•
202 vues
Saumya Vishnoi
Suivre
This talk was presented in InfoSec girls's first meetup in Delhi on 18 January 2020.
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 9
Télécharger maintenant
Recommandé
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
North Texas Chapter of the ISSA
Does the "The Internet of Everything" work?
Does the "The Internet of Everything" work?
imec
CeBIT SCALE 11 pitch
CeBIT SCALE 11 pitch
Eric Larcheveque
Siganl messaging
Siganl messaging
Yuvaraj R
Tizen os
Tizen os
Venkata Sreeram
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Pro Mrkt
Is Security Optional20100608
Is Security Optional20100608
aljapaco
Lycons Big Boss
Lycons Big Boss
Marco Antonio Salazar Moreno
Recommandé
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
North Texas Chapter of the ISSA
Does the "The Internet of Everything" work?
Does the "The Internet of Everything" work?
imec
CeBIT SCALE 11 pitch
CeBIT SCALE 11 pitch
Eric Larcheveque
Siganl messaging
Siganl messaging
Yuvaraj R
Tizen os
Tizen os
Venkata Sreeram
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Pro Mrkt
Is Security Optional20100608
Is Security Optional20100608
aljapaco
Lycons Big Boss
Lycons Big Boss
Marco Antonio Salazar Moreno
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
Sanjeev Kumar Jaiswal
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Lucideus Tech
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdf
Steven Carlson
Application Security within Agile
Application Security within Agile
Netlight Consulting
cybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Sebastian Taphanel CISSP-ISSEP
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
Mark Szewczul, CISSP
Starting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
Asaf Nakash
Cloud Security - the egregious 11 cloud security threats
Cloud Security - the egregious 11 cloud security threats
Moshe Ferber
Steering a Bullet Train: Owasp Latam Tour BA 2015
Steering a Bullet Train: Owasp Latam Tour BA 2015
skantos
Securing Applications
Securing Applications
Mark Harrison
AppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture Change
Priyanka Aash
Defining DevSecOps
Defining DevSecOps
Uchit Vyas ☁
The New Security Practitioner
The New Security Practitioner
Adrian Sanabria
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
amallblitz0
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
ananthakrishnansblit
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen
Privacy frameworks 101
Privacy frameworks 101
Saumya Vishnoi
GDPR for Security Professionals
GDPR for Security Professionals
Saumya Vishnoi
Contenu connexe
Similaire à Kickstart your infosec career
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
Sanjeev Kumar Jaiswal
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Lucideus Tech
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdf
Steven Carlson
Application Security within Agile
Application Security within Agile
Netlight Consulting
cybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Sebastian Taphanel CISSP-ISSEP
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
Mark Szewczul, CISSP
Starting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
Asaf Nakash
Cloud Security - the egregious 11 cloud security threats
Cloud Security - the egregious 11 cloud security threats
Moshe Ferber
Steering a Bullet Train: Owasp Latam Tour BA 2015
Steering a Bullet Train: Owasp Latam Tour BA 2015
skantos
Securing Applications
Securing Applications
Mark Harrison
AppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture Change
Priyanka Aash
Defining DevSecOps
Defining DevSecOps
Uchit Vyas ☁
The New Security Practitioner
The New Security Practitioner
Adrian Sanabria
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
amallblitz0
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
ananthakrishnansblit
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen
Similaire à Kickstart your infosec career
(20)
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdf
Application Security within Agile
Application Security within Agile
cybersecurity analyst.pptx
cybersecurity analyst.pptx
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
Starting your Career in Information Security
Starting your Career in Information Security
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
Cloud Security - the egregious 11 cloud security threats
Cloud Security - the egregious 11 cloud security threats
Steering a Bullet Train: Owasp Latam Tour BA 2015
Steering a Bullet Train: Owasp Latam Tour BA 2015
Securing Applications
Securing Applications
AppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture Change
Defining DevSecOps
Defining DevSecOps
The New Security Practitioner
The New Security Practitioner
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
Cyber security course in Kerala, Kochi
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Plus de Saumya Vishnoi
Privacy frameworks 101
Privacy frameworks 101
Saumya Vishnoi
GDPR for Security Professionals
GDPR for Security Professionals
Saumya Vishnoi
PCI DSS Compliance
PCI DSS Compliance
Saumya Vishnoi
Taming the compliance beast in cloud
Taming the compliance beast in cloud
Saumya Vishnoi
Security Ecosystem of Digital Wallets
Security Ecosystem of Digital Wallets
Saumya Vishnoi
Introduction to PCI DSS
Introduction to PCI DSS
Saumya Vishnoi
Beyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importance
Saumya Vishnoi
Plus de Saumya Vishnoi
(7)
Privacy frameworks 101
Privacy frameworks 101
GDPR for Security Professionals
GDPR for Security Professionals
PCI DSS Compliance
PCI DSS Compliance
Taming the compliance beast in cloud
Taming the compliance beast in cloud
Security Ecosystem of Digital Wallets
Security Ecosystem of Digital Wallets
Introduction to PCI DSS
Introduction to PCI DSS
Beyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importance
Dernier
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
Selcen Ozturkcan
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Dernier
(20)
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Slack Application Development 101 Slides
Slack Application Development 101 Slides
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Kickstart your infosec career
1.
KICKSTART YOUR INFOSEC CAREER BY SAUMYA
VISHNOI
2.
WELCOME TO THE
WORLD OF INFORMATION SECURITY
3.
VARIOUS DOMAINS OF CYBER
SECURITY
4.
INFOSEC DOMAINS • Offensive • Defensive •
Operations • Regulations • etc………………………………………
5.
6.
VARIOUS JOB PROFILES Application security engineer Penetration Tester Chief
Information Security Officer (CISO) Risk Analyst Malware Analyst Security Auditor Security Researcher Incident Responder Reverse Enginee r Security Engineer Program Manager, Infosec Compliance manager Security PR Security Marketing Information security consultant Infosec trainer Physical security auditor Product manager, Infosec Vulnerability researcher Information security manager Security architect DevSecOps Engineer Cloud Security Engineering SOC responder
7.
WHERE TO FIND THE
JOBS • Null jobs : https://jobs.null.co.in/ • Linkedin • Other avenues
8.
OTHER AVENUES • Attend local
meets • Conferences • Active online on CTFs • Blogging + mailing lists • Certifications
9.
THANK YOU •
@saum98
Notes de l'éditeur
Image by Henry Jiang of Oppenheimer & Co.
Télécharger maintenant