Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Information Security Training

Posted on 2011-09-15
2
418 Views
Last Modified: 2012-05-12
I am a Technical Support Specialist working for DOD and I am interested in moving to Information Security environment, where do I start. I already have my Security + certification.
0
Comment
Question by:unix32
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 400 total points
ID: 36547724
With your technical background, I believe you had the fundamental of security concepts. Since you are working in DoD, you may want to check out more on DoDD 8570. It would be a good start off to the baseline roadmap training and spawn off based on the direction you are planning to further progress

http://www.eccouncil.org/about_us/dod_8570.aspx
http://www.giac.org/certifications/dodd-8570/

Actually open community forum are good way to get involved and listened out to the experienced and incumbents. See SAN Internet storm centre (http://isc.sans.org/) and they quite a few like news, online training etc that would be beneficial. Of course if you are into the incident response type, check out the FIRST which is the groups of global CERTS. The security conference such as Blackhat/Defcon has good information as well....  
0
 
LVL 38

Assisted Solution

by:younghv
younghv earned 100 total points
ID: 36548215
Have you used the USAJOBS site to check the listings?

Create an account here: http://www.usajobs.gov/ and search for this job title:
IT Specialist (Network Services/Security)

You can set up an email alert to receive notification of exactly the type of job/location you're looking for. Your best chances are going to be jobs in the DC area - or if you're willing to work overseas for a couple of years.

I spent many years working for DoD, with the last 15 in network security. To break into the field, I had to accept a first assignment that was under less than ideal conditions. The good news is that once you're in and doing a good job you will have a lot of flexibility over where you work and can pretty well target your specific area of interest.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Suggestions on remote printing. 3 38
How do You Stop a DDoS Attack 7 47
google exe file 5 68
Using GMail for Scanning 5 27
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question