@christophercahall3092 should we go after top cleared positions if we have the clearance but less skill? I'm trying to career pivot and don't have a degree but I do have great clearance, coding bootcamp grad and taking google cybersecurity course.
very informative piece with a ALOT of in depth "meat n potatoes" in such a small pack. MOS DEF we need security measures in all sectors especially healthcare!!
Useful topic. I wanted to ask that as a non-IT background person, should i start with Google cybersecurity professional certification and simultaneously study for comptia A+ & network+ without giving the exam. And after all this, head over to study security+ and give exam for it. As I'm looking for an entry point in IT & interested in blue team jobs
As a non IT bg person yes that’s a good starting point. For blue you’ll want to start there but also complement it with hands on labs around siem/edr/log analysis/threat intel
Thanks for sharing your review. The gist was a long talk over multiple areas w an anchor on working in industry. I hope others don’t see my comments as BS but def respect your opinion.
Sometimes it's just about finding someone who will share their fries with you without hesitation. Now that's true love, right?
@christophercahall3092 should we go after top cleared positions if we have the clearance but less skill? I'm trying to career pivot and don't have a degree but I do have great clearance, coding bootcamp grad and taking google cybersecurity course.
Is there a full length video somewhere??
very informative piece with a ALOT of in depth "meat n potatoes" in such a small pack. MOS DEF we need security measures in all sectors especially healthcare!!
Useful topic. I wanted to ask that as a non-IT background person, should i start with Google cybersecurity professional certification and simultaneously study for comptia A+ & network+ without giving the exam. And after all this, head over to study security+ and give exam for it. As I'm looking for an entry point in IT & interested in blue team jobs
As a non IT bg person yes that’s a good starting point. For blue you’ll want to start there but also complement it with hands on labs around siem/edr/log analysis/threat intel
Threat actors are actually from within. most of them only get collaborators from outside to get this done .
#catchingup
😃👍
How did you manage to have the captions displayed before you, actually, uttered the words? Was it not a livestream?
Thanks 😊
This was a recorded live conversation by Clearance Jobs, then they produced it and sent it over. Its on their site too.
Ok everybody, so 5 minutes of him discussing how to break in and the rest is bullshit.
Thanks for sharing your review. The gist was a long talk over multiple areas w an anchor on working in industry. I hope others don’t see my comments as BS but def respect your opinion.
@@SimplyCyber thanks Gerry, you’re inspiring to me :)
14:12 Whose datacenters are/were on Ukrainian territory? 🤨
TeamSC_Replay