Solved

Information Security Training

Posted on 2011-09-15
2
411 Views
Last Modified: 2012-05-12
I am a Technical Support Specialist working for DOD and I am interested in moving to Information Security environment, where do I start. I already have my Security + certification.
0
Comment
Question by:unix32
2 Comments
 
LVL 61

Accepted Solution

by:
btan earned 400 total points
ID: 36547724
With your technical background, I believe you had the fundamental of security concepts. Since you are working in DoD, you may want to check out more on DoDD 8570. It would be a good start off to the baseline roadmap training and spawn off based on the direction you are planning to further progress

http://www.eccouncil.org/about_us/dod_8570.aspx
http://www.giac.org/certifications/dodd-8570/

Actually open community forum are good way to get involved and listened out to the experienced and incumbents. See SAN Internet storm centre (http://isc.sans.org/) and they quite a few like news, online training etc that would be beneficial. Of course if you are into the incident response type, check out the FIRST which is the groups of global CERTS. The security conference such as Blackhat/Defcon has good information as well....  
0
 
LVL 38

Assisted Solution

by:younghv
younghv earned 100 total points
ID: 36548215
Have you used the USAJOBS site to check the listings?

Create an account here: http://www.usajobs.gov/ and search for this job title:
IT Specialist (Network Services/Security)

You can set up an email alert to receive notification of exactly the type of job/location you're looking for. Your best chances are going to be jobs in the DC area - or if you're willing to work overseas for a couple of years.

I spent many years working for DoD, with the last 15 in network security. To break into the field, I had to accept a first assignment that was under less than ideal conditions. The good news is that once you're in and doing a good job you will have a lot of flexibility over where you work and can pretty well target your specific area of interest.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now