Solved

Information Security Training

Posted on 2011-09-15
2
417 Views
Last Modified: 2012-05-12
I am a Technical Support Specialist working for DOD and I am interested in moving to Information Security environment, where do I start. I already have my Security + certification.
0
Comment
Question by:unix32
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 400 total points
ID: 36547724
With your technical background, I believe you had the fundamental of security concepts. Since you are working in DoD, you may want to check out more on DoDD 8570. It would be a good start off to the baseline roadmap training and spawn off based on the direction you are planning to further progress

http://www.eccouncil.org/about_us/dod_8570.aspx
http://www.giac.org/certifications/dodd-8570/

Actually open community forum are good way to get involved and listened out to the experienced and incumbents. See SAN Internet storm centre (http://isc.sans.org/) and they quite a few like news, online training etc that would be beneficial. Of course if you are into the incident response type, check out the FIRST which is the groups of global CERTS. The security conference such as Blackhat/Defcon has good information as well....  
0
 
LVL 38

Assisted Solution

by:younghv
younghv earned 100 total points
ID: 36548215
Have you used the USAJOBS site to check the listings?

Create an account here: http://www.usajobs.gov/ and search for this job title:
IT Specialist (Network Services/Security)

You can set up an email alert to receive notification of exactly the type of job/location you're looking for. Your best chances are going to be jobs in the DC area - or if you're willing to work overseas for a couple of years.

I spent many years working for DoD, with the last 15 in network security. To break into the field, I had to accept a first assignment that was under less than ideal conditions. The good news is that once you're in and doing a good job you will have a lot of flexibility over where you work and can pretty well target your specific area of interest.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now