PO2 Todd Voge 1556219 <div class="images-v2-count-1"><div class="content-picture image-v2-number-1" id="image-90649"> <div class="social_icons social-buttons-on-image"> <a href='https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.rallypoint.com%2Fanswers%2Fget-started-post-military-options-expand-with-cybersecurity-training%3Futm_source%3DFacebook%26utm_medium%3Dorganic%26utm_campaign%3DShare%20to%20facebook' target="_blank" class='social-share-button facebook-share-button'><i class="fa fa-facebook-f"></i></a> <a href="https://twitter.com/intent/tweet?text=Get+Started%3A+Post-Military+Options+Expand+with+Cybersecurity+Training&amp;url=https%3A%2F%2Fwww.rallypoint.com%2Fanswers%2Fget-started-post-military-options-expand-with-cybersecurity-training&amp;via=RallyPoint" target="_blank" class="social-share-button twitter-custom-share-button"><i class="fa fa-twitter"></i></a> <a href="mailto:?subject=Check this out on RallyPoint!&body=Hi, I thought you would find this interesting:%0D%0AGet Started: Post-Military Options Expand with Cybersecurity Training%0D%0A %0D%0AHere is the link: https://www.rallypoint.com/answers/get-started-post-military-options-expand-with-cybersecurity-training" target="_blank" class="social-share-button email-share-button"><i class="fa fa-envelope"></i></a> </div> <a class="fancybox" rel="87e4723469c047adb7bf74926308f5e3" href="https://d1ndsj6b8hkqu9.cloudfront.net/pictures/images/000/090/649/for_gallery_v2/e40d9f0c.jpg"><img src="https://d1ndsj6b8hkqu9.cloudfront.net/pictures/images/000/090/649/large_v3/e40d9f0c.jpg" alt="E40d9f0c" /></a></div></div>There’s an ever-increasing focus on cybersecurity, along with cyber-warfare in the military. This is a step in the right direction because it can translate into better job opportunities outside of the military. But why?<br /><br />First, a little history may be in order. In 1988, Robert Tappen Morris (son of the NSA’s former head of the National Computer Security Center) unleashed what is now known as a worm on the internet. This brought down thousands of computers, and took weeks to clean from computer systems. Morris was the first person prosecuted under the new Computer Fraud and Abuse Act. He served time and is now a respected computer engineer/scientist. There was no criminal defense at the time for the sort of attack Morris inflicted. In the 90’s, viruses became the weapon of choice for those looking to disrupt systems. Malware later replaced viruses as the primary threat to our computers.<br /><br />Malware is a catchall term for computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is one of the top threats to any organization using computer technology in today’s world. Couple this with various attacks such as DDOS (Distributed Denial of Service), Man-in-the-Middle, and other vectors, any organization, from the military to a local business, is at risk. <br /><br />So how does this translate to securing a job after military life? According to a recent survey conducted by Kaplan University, job opportunities for IT graduates are greatest in cybersecurity, followed by information security and forensics. An interview in “Business Wire” of Kaplan University’s Thomas Boyd, PhD, revealed, “a combination of globalization and innovation make business and IT two of the most dynamic workforce sectors today.” Boyd elaborated, explaining that, “the ever-changing challenges and opportunities in these sectors prompted us to revisit perspectives about current career outlooks and the key steps students should consider to maximize their career choices.” <br /><br />One of the best ways to get into the security and forensic career paths is to earn certifications. Today, there are many certification companies; some of the top organizations are ISC2 (International Information System Security Certification Consortium, Inc.), ISACA (Information Systems Audit and Control Association®), IACRB (Information Assurance Certification Review Board), EC-Council and GIAC (Global Information Assurance Certification). <br /><br />Additionally, the Department of Defense Directive 8570 has been replaced by the DoDD 8140; 8570 is now a part of a larger initiative that falls under the guidelines of 8140. DoDD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct information assurance functions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CND, and IASAE classifications.<br /><br />Obtaining certifications adds to your overall marketability. The training you receive, along with your experiences in the military regarding InfoSec and OpSec, are very valuable to civilian organizations. Certifications from GIAC, ISC2 and ISACA tend to be the most coveted ones around.<br /><br />Armed with one or more of these certifications, you can propel yourself into a new career in cybersecurity or computer forensics. I can attest to this firsthand; I have received my CISSP (Certified Information System Security Professional) from ISC2 , my CISM (Certified Information Security manager) from ISACA, and my CCFE (Certified Computer Forensic Examiner) from IACRB. Trust me - my employer has rewarded me accordingly. It has been worth the time, money and effort to get these certifications, even though I did pay for them out of pocket. <br /><br />There’s a lot to learn about cybersecurity certifications, and the questions you might have can be very niche in nature. Feel free to message me through RallyPoint if you need some assistance with civilian cybersecurity questions - I would love to help you get started! Get Started: Post-Military Options Expand with Cybersecurity Training 2016-05-24T11:50:40-04:00 PO2 Todd Voge 1556219 <div class="images-v2-count-1"><div class="content-picture image-v2-number-1" id="image-90649"> <div class="social_icons social-buttons-on-image"> <a href='https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.rallypoint.com%2Fanswers%2Fget-started-post-military-options-expand-with-cybersecurity-training%3Futm_source%3DFacebook%26utm_medium%3Dorganic%26utm_campaign%3DShare%20to%20facebook' target="_blank" class='social-share-button facebook-share-button'><i class="fa fa-facebook-f"></i></a> <a href="https://twitter.com/intent/tweet?text=Get+Started%3A+Post-Military+Options+Expand+with+Cybersecurity+Training&amp;url=https%3A%2F%2Fwww.rallypoint.com%2Fanswers%2Fget-started-post-military-options-expand-with-cybersecurity-training&amp;via=RallyPoint" target="_blank" class="social-share-button twitter-custom-share-button"><i class="fa fa-twitter"></i></a> <a href="mailto:?subject=Check this out on RallyPoint!&body=Hi, I thought you would find this interesting:%0D%0AGet Started: Post-Military Options Expand with Cybersecurity Training%0D%0A %0D%0AHere is the link: https://www.rallypoint.com/answers/get-started-post-military-options-expand-with-cybersecurity-training" target="_blank" class="social-share-button email-share-button"><i class="fa fa-envelope"></i></a> </div> <a class="fancybox" rel="035511852f4c6286039e91c63216cf3c" href="https://d1ndsj6b8hkqu9.cloudfront.net/pictures/images/000/090/649/for_gallery_v2/e40d9f0c.jpg"><img src="https://d1ndsj6b8hkqu9.cloudfront.net/pictures/images/000/090/649/large_v3/e40d9f0c.jpg" alt="E40d9f0c" /></a></div></div>There’s an ever-increasing focus on cybersecurity, along with cyber-warfare in the military. This is a step in the right direction because it can translate into better job opportunities outside of the military. But why?<br /><br />First, a little history may be in order. In 1988, Robert Tappen Morris (son of the NSA’s former head of the National Computer Security Center) unleashed what is now known as a worm on the internet. This brought down thousands of computers, and took weeks to clean from computer systems. Morris was the first person prosecuted under the new Computer Fraud and Abuse Act. He served time and is now a respected computer engineer/scientist. There was no criminal defense at the time for the sort of attack Morris inflicted. In the 90’s, viruses became the weapon of choice for those looking to disrupt systems. Malware later replaced viruses as the primary threat to our computers.<br /><br />Malware is a catchall term for computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is one of the top threats to any organization using computer technology in today’s world. Couple this with various attacks such as DDOS (Distributed Denial of Service), Man-in-the-Middle, and other vectors, any organization, from the military to a local business, is at risk. <br /><br />So how does this translate to securing a job after military life? According to a recent survey conducted by Kaplan University, job opportunities for IT graduates are greatest in cybersecurity, followed by information security and forensics. An interview in “Business Wire” of Kaplan University’s Thomas Boyd, PhD, revealed, “a combination of globalization and innovation make business and IT two of the most dynamic workforce sectors today.” Boyd elaborated, explaining that, “the ever-changing challenges and opportunities in these sectors prompted us to revisit perspectives about current career outlooks and the key steps students should consider to maximize their career choices.” <br /><br />One of the best ways to get into the security and forensic career paths is to earn certifications. Today, there are many certification companies; some of the top organizations are ISC2 (International Information System Security Certification Consortium, Inc.), ISACA (Information Systems Audit and Control Association®), IACRB (Information Assurance Certification Review Board), EC-Council and GIAC (Global Information Assurance Certification). <br /><br />Additionally, the Department of Defense Directive 8570 has been replaced by the DoDD 8140; 8570 is now a part of a larger initiative that falls under the guidelines of 8140. DoDD 8140 provides guidance and procedures for the training, certification, and management of all government employees who conduct information assurance functions. These individuals are required to carry an approved certification for their particular job classification. GIAC certifications are among those required for Technical, Management, CND, and IASAE classifications.<br /><br />Obtaining certifications adds to your overall marketability. The training you receive, along with your experiences in the military regarding InfoSec and OpSec, are very valuable to civilian organizations. Certifications from GIAC, ISC2 and ISACA tend to be the most coveted ones around.<br /><br />Armed with one or more of these certifications, you can propel yourself into a new career in cybersecurity or computer forensics. I can attest to this firsthand; I have received my CISSP (Certified Information System Security Professional) from ISC2 , my CISM (Certified Information Security manager) from ISACA, and my CCFE (Certified Computer Forensic Examiner) from IACRB. Trust me - my employer has rewarded me accordingly. It has been worth the time, money and effort to get these certifications, even though I did pay for them out of pocket. <br /><br />There’s a lot to learn about cybersecurity certifications, and the questions you might have can be very niche in nature. Feel free to message me through RallyPoint if you need some assistance with civilian cybersecurity questions - I would love to help you get started! Get Started: Post-Military Options Expand with Cybersecurity Training 2016-05-24T11:50:40-04:00 2016-05-24T11:50:40-04:00 SSG Derek Scheller 1556235 <div class="images-v2-count-0"></div>I can hole heartedly agree with you on this. Just look at the certs I earned so far through the Army. The only one not listed is the CPT by the IACRB next is CISSP. I tell all of my soldiers if your staying in get certified and if your getting out get certified. The field is always changing and always growing. It takes someone who can learn fast and adapt to the ever changing cyber security world to make a difference. Response by SSG Derek Scheller made May 24 at 2016 11:55 AM 2016-05-24T11:55:46-04:00 2016-05-24T11:55:46-04:00 1stSgt Private RallyPoint Member 1556236 <div class="images-v2-count-0"></div>Good scoop, thanks Response by 1stSgt Private RallyPoint Member made May 24 at 2016 11:56 AM 2016-05-24T11:56:02-04:00 2016-05-24T11:56:02-04:00 2016-05-24T11:50:40-04:00