SlideShare a Scribd company logo
By
Ahmed Abdel Hamid
Mohamed Alwy
Outlines
• What’s Information Security ?
• General Paths of Security.
• How to Start your Information Security Path.
• Roles in information Security.
• Information Security Market Need .
• Opportunities in Middle East.
• Roadmap to Information Security.
• Hints in your Roadmap
• First Step why CompTIA Security + is the Main Gate.
• Q & A
Your Presenter in few Bullets Points
• 14 Years of Experience in Information Technology field .
• Technical Certificate :
 Microsoft® Certified exchange 2013(MCSE)
 Microsoft® Certified Solutions Associate (MCSA)
 Microsoft® Certified IT Professional: Enterprise Administrator (MCITP)
 Microsoft® Certified IT Professional: Server Administrator (MCITP)
 Microsoft® Server Virtualization (Windows Server Hyper-V )
 Microsoft® Certified TRAINER (MCT)
 Infrastructure Library Foundation (ITIL v3)
 VMware Certified Associate(VCA)
 VMware Certified Associate – Cloud(VCA)
• Information Security & Penetration Testing
 CompTIA Security (Sys401)
 E-learn Security Junior Penetration Tester (EJPT)
Your Presenter in few Bullets Points
• 14 Years of Experience in Information Technology Security ,
Management and Administration .
• Technical Certificate :
• Systems & Storage
 Microsoft Certified System Engineer (MCSE)
 SAP Basis Administration (TDM10, 12)
 IBM Midrange Storage Specialist.
 Information Technology Infrastructure Library Foundation (ITIL v3)
 VMware Certificated Data Center Virtualization (VCP-DCV)
 Veeam Certified Engineer (VMCE)
• Network & Wireless
 Cisco Certified Network Associate(CCNA R&S).
 Aruba Certified Mobility Professional (ACMP)
• Information Security & Penetration Testing
 CompTIA Security (Sys401)
 E-learn Security Junior Penetration Tester (EJPT)
 E-learn Security Certified Professional Penetration Tester(eCCPT)
 Certified Information Systems Security Professional (CISSP- In progress)
 Fortinet Network Security Expert 1, 2, 4, (NSE 1, 2, 4)
 Ruby Development
 Linux Kali , Arch , Black Arch .
• Academic Certificate
 BSc of Computer Science
 Master of Business Administration.
Current Positon : Senior information Security Consultant .
What’s Information Security ?
 Information security (infosec) is a set of strategies for
managing the processes.
 tools and policies necessary to prevent, detect, document
and counter threats to digital and non-digital information
 Infosec responsibilities include establishing a set of
business processes that will protect information assets.
 Infosec programs are built around the core objectives of
the CIA trading: maintaining the confidentiality, integrity and
availability of IT systems and business data.
 Is there a difference between cyber security and
information security?
• Information Security (also known as InfoSec) guarantees that the data,
including both physical and digital is safeguarded from unauthorized use,
access, disruption, inspection, modification, destruction or recording. In
case a business is beginning to generate a security program, Information
Security is where they should start; since, it is the data security foundation.
• Cyber security guarantees that the computers, data, and network of the
organization is defended from the unauthorized digital attack, access or
damage by the mean of implementing several processes, practices, and
technologies. This security is to prevent the data, network, and reputation
of the company against the attack.
Security Paths General Path
1-Network Security Path
• Network security roles and responsibilities
• Most common certificate
Network security roles and responsibilities
• Guarantee network security best practices are executed through
auditing: router, change control, switch, firewall configurations, and
monitoring.
• Coordinate and oversee log analysis for company managed
services offerings to ensure customer policy and security
requirements are met
• Maintain network security devices to enable pro-active defense of
networks within a managed service SOC environment, providing
protective monitoring to multiple commercial customers
• efficient on-boarding and understanding of varying customer log
sources into SIEM environments
Most common certificate
2-Penetration Testing
1- What’s the penetration testing ?
2- What’s the job of penetration tester?
3- What’s the types of hackers ?
4- Most common certificate.
What’s the penetration testing ?
 Penetration testing (also called pen testing) is the practice of testing a
computer system, network or Web application to find vulnerabilities that an
attacker could exploit.
What’s the job of penetration tester?
• Plan and prepare
• Conduct discovery
• Attempt penetration
• Analyze and report
• Clean up
• Be prompt with the patch
What’s the types of hackers ?
Most common certificates
How to Start your Information Security Path.
• Many Roads to Go Down and they always Converged.
• Even you Start your career as Network Engineer , System
Administrator , web Developer you can still be Info Sec .
• The Experience you can Gain being in one or more these roles
can result a huge advantages over your Security .
• SOC Manager (Security Operation Center Managers ) Should
have Basic knowledge on all Systems and Application to
manage it’s Vulnerabilities and Security .
• Not all information Security Roles is Hacking but it’s related
to Knowledge Base.
Roles in information Security
- Penetration Testing .
- Web Application Security
- Cryptography .
- Security Analyst .
- Security Architecture.
- Vulnerability Management & Assessment.
- Compliance & Standers Auditing.
- Digital Forensics.
- Policy Development .
- Business Continuity.
- Incident Response .
- Systems Security .
Starting your Career in Information Security
Information Security Market Need
Year of the Mega Breach
Starting your Career in Information Security
Starting your Career in Information Security
Starting your Career in Information Security
Starting your Career in Information Security
Opportunities in Middle East
Opportunities in Saudi Arabia
Roadmap to Information Security
Hints in your Roadmap
• Choose a Roadmap Plan with Certificates .
• Learn To Hack And Then Learn To Automate using Programming
Language
• Try Your Hand At Security Research .
• Participate In Team Activities Like Capture The Flag Information
Security.
• Pay attention to information security news web sites.
• Don’t break into anything without permission.
First Step why CompTIA Security + is the Main Gate.
• It Gives you the Security Mind Set and terminologies.
• It provides proof of professional achievement.
• It increases your marketability.
• It provides opportunity for advancement.
• It fulfills training requirements.
• It raises customer confidence.
Starting your Career in Information Security
• Introduction About CompTIA Security +
• What To Expect From This Course
• Course Overview
• About The Security+ Exams
Module 1 -Introduction
Module 2 Understanding The Risks
• Risk Assessment
• Risk Calculation
• Policies Standards And Guidelines
• Understanding Control Types
• Risk Management
Module 3 AAA Concept
• Understanding The AAA Concept
• Authentication
• Authentication Protocols
• Authentication Services
• Access Control
• Access Control Methods
• Access Controlling Best
Practices
• Trusted OS
• Understanding TCP/IP
• Protocols And Services
• Firewalls
• Routers And Switches
• Load Balancing
Module 4 -Network Devices
Module 5 Network Design Elements
• Layering For Security
• DMZ
• VLANs
• NAT
Module 6 Security Threats
• Understanding Malware
• Viruses
• Virus Types
• Antivirus Software
• Attack Types
• Common Attacks
• Application Attacks
• Proxy Servers
• IDS Versus IPS
• UTM Devices
• Protocol Analyzers
• Wireless Network Basics
• Wireless Protocols
• Encryption Options
• WAP Basics
• Extensible Authentication Protocol
• Wireless Vulnerabilities
Module 7 -Wireless Networks
Module 8 Application Security
• Application Hardening
• Databases
• Patches And Updates
• Secure Coding
Module 9 Host Security
• Host Security Basics
• ACLs And Permissions
• Software Baselining
• Email And Web Server Security
• DHCP Security
• DNS Security
• Authorizing A DHCP Server
• Fault Tolerance Basics
• Media Storage
• RAID
• Clustering & Load Balancing
• The Backup Plan
Module 10 -Data Security
Module 11 Security In The Cloud
• Understanding Social Engineering
• Social Engineering Types
• Dealing With Social Engineering
• Physical Security
Module 12 Social Engineering And Physical
Security
• Virtualization
• Understanding Cloud Computing
• Four Cloud Types
• SaaS, PaaS And IaaS
• Security In The Cloud
Module 13 -Disaster Recovery
• Disaster Recovery Plans
• Incident Response Policies
• Forensics Producers
• Working With Vendors
• Security Testing
• Cryptography Basics
• PKI Basics
• X.509
• Viewing Certificates
• CAs And RAS
• SSL And TLS
Module 14 -Cryptography
Module 15 Monitoring Networks
• Security Awareness
• Information Classification
• Information Access
• Security Regulation Compliance
Module 16 Security Administration
• Network Monitoring Basics
• Event Viewer
• Hardening Basics
• Detection Versus Prevention
• Security Monitoring
• Hard And Soft Encryption
• Encrypting Files
• Web Server Certificate Request
• Mobile Devices
• BYOD
Starting your Career in Information Security

More Related Content

PPTX
Hiring for cybersecurity
PPTX
ISA Toronto Chapter Presentation-March 2017
PDF
Career in Cyber Security
PPTX
Career in cyber security
PDF
Toward Continuous Cybersecurity with Network Automation
PDF
The future of cyber security
PPTX
cyber security
PPTX
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Hiring for cybersecurity
ISA Toronto Chapter Presentation-March 2017
Career in Cyber Security
Career in cyber security
Toward Continuous Cybersecurity with Network Automation
The future of cyber security
cyber security
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification

What's hot (20)

PDF
Cyber Security
PPTX
Bl cybersecurity z_dooly
PPTX
Cyber Security Professionals Viewed via Supply Chain
PDF
Cybersecurity concepts & Defense best practises
PPTX
Cyber security ppt
PPTX
Cyber security
PDF
IBM Cybersecurity Analyst
PPTX
Cyber security
PPTX
Cybersecurity - Introduction and Preventive Measures
PPTX
Masters in cyber security
PPTX
Cyber Security –PPT
PPTX
Cyber Threat Simulation
PPTX
Cybersecurity
PPTX
A military perspective on cyber security
PPTX
Cyber Security
PPTX
Cybersecurity training seminars, courses, cybersecurity laws
PPTX
The Importance of Cybersecurity in 2017
PPTX
Cyber awareness program
PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PDF
Cyber Security_Presentation_KTH
Cyber Security
Bl cybersecurity z_dooly
Cyber Security Professionals Viewed via Supply Chain
Cybersecurity concepts & Defense best practises
Cyber security ppt
Cyber security
IBM Cybersecurity Analyst
Cyber security
Cybersecurity - Introduction and Preventive Measures
Masters in cyber security
Cyber Security –PPT
Cyber Threat Simulation
Cybersecurity
A military perspective on cyber security
Cyber Security
Cybersecurity training seminars, courses, cybersecurity laws
The Importance of Cybersecurity in 2017
Cyber awareness program
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cyber Security_Presentation_KTH
Ad

Similar to Starting your Career in Information Security (20)

PPTX
It security cognic_systems
PPTX
Aligning Application Security to Compliance
PDF
Careers in Cyber Security
PDF
How to Build a Secure IT Infrastructure in 2025.
PDF
ITCA Cyber Security Training - MS PPT.pdf
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
IBM Messaging Security - Why securing your environment is important : IBM Int...
PPTX
3433 IBM messaging security why securing your environment is important-feb2...
PPTX
New Horizons SCYBER Presentation
PPTX
Software Security Training
PPTX
How to Build a Winning Cybersecurity Team
PPTX
CyberKnight capabilties
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Managed security services
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PPTX
Career In Information security
PDF
Advanced IT and Cyber Security for Your Business
PPTX
Web Security Overview
PDF
Protecting microservices using secure design patterns 1.0
It security cognic_systems
Aligning Application Security to Compliance
Careers in Cyber Security
How to Build a Secure IT Infrastructure in 2025.
ITCA Cyber Security Training - MS PPT.pdf
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
IBM Messaging Security - Why securing your environment is important : IBM Int...
3433 IBM messaging security why securing your environment is important-feb2...
New Horizons SCYBER Presentation
Software Security Training
How to Build a Winning Cybersecurity Team
CyberKnight capabilties
Today's Cyber Challenges: Methodology to Secure Your Business
Managed security services
Succeeding-Marriage-Cybersecurity-DevOps final
Career In Information security
Advanced IT and Cyber Security for Your Business
Web Security Overview
Protecting microservices using secure design patterns 1.0
Ad

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction

Starting your Career in Information Security

  • 2. Outlines • What’s Information Security ? • General Paths of Security. • How to Start your Information Security Path. • Roles in information Security. • Information Security Market Need . • Opportunities in Middle East. • Roadmap to Information Security. • Hints in your Roadmap • First Step why CompTIA Security + is the Main Gate. • Q & A
  • 3. Your Presenter in few Bullets Points • 14 Years of Experience in Information Technology field . • Technical Certificate :  Microsoft® Certified exchange 2013(MCSE)  Microsoft® Certified Solutions Associate (MCSA)  Microsoft® Certified IT Professional: Enterprise Administrator (MCITP)  Microsoft® Certified IT Professional: Server Administrator (MCITP)  Microsoft® Server Virtualization (Windows Server Hyper-V )  Microsoft® Certified TRAINER (MCT)  Infrastructure Library Foundation (ITIL v3)  VMware Certified Associate(VCA)  VMware Certified Associate – Cloud(VCA) • Information Security & Penetration Testing  CompTIA Security (Sys401)  E-learn Security Junior Penetration Tester (EJPT)
  • 4. Your Presenter in few Bullets Points • 14 Years of Experience in Information Technology Security , Management and Administration . • Technical Certificate : • Systems & Storage  Microsoft Certified System Engineer (MCSE)  SAP Basis Administration (TDM10, 12)  IBM Midrange Storage Specialist.  Information Technology Infrastructure Library Foundation (ITIL v3)  VMware Certificated Data Center Virtualization (VCP-DCV)  Veeam Certified Engineer (VMCE) • Network & Wireless  Cisco Certified Network Associate(CCNA R&S).  Aruba Certified Mobility Professional (ACMP)
  • 5. • Information Security & Penetration Testing  CompTIA Security (Sys401)  E-learn Security Junior Penetration Tester (EJPT)  E-learn Security Certified Professional Penetration Tester(eCCPT)  Certified Information Systems Security Professional (CISSP- In progress)  Fortinet Network Security Expert 1, 2, 4, (NSE 1, 2, 4)  Ruby Development  Linux Kali , Arch , Black Arch . • Academic Certificate  BSc of Computer Science  Master of Business Administration. Current Positon : Senior information Security Consultant .
  • 6. What’s Information Security ?  Information security (infosec) is a set of strategies for managing the processes.  tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information  Infosec responsibilities include establishing a set of business processes that will protect information assets.  Infosec programs are built around the core objectives of the CIA trading: maintaining the confidentiality, integrity and availability of IT systems and business data.
  • 7.  Is there a difference between cyber security and information security? • Information Security (also known as InfoSec) guarantees that the data, including both physical and digital is safeguarded from unauthorized use, access, disruption, inspection, modification, destruction or recording. In case a business is beginning to generate a security program, Information Security is where they should start; since, it is the data security foundation. • Cyber security guarantees that the computers, data, and network of the organization is defended from the unauthorized digital attack, access or damage by the mean of implementing several processes, practices, and technologies. This security is to prevent the data, network, and reputation of the company against the attack.
  • 9. 1-Network Security Path • Network security roles and responsibilities • Most common certificate
  • 10. Network security roles and responsibilities • Guarantee network security best practices are executed through auditing: router, change control, switch, firewall configurations, and monitoring. • Coordinate and oversee log analysis for company managed services offerings to ensure customer policy and security requirements are met • Maintain network security devices to enable pro-active defense of networks within a managed service SOC environment, providing protective monitoring to multiple commercial customers • efficient on-boarding and understanding of varying customer log sources into SIEM environments
  • 12. 2-Penetration Testing 1- What’s the penetration testing ? 2- What’s the job of penetration tester? 3- What’s the types of hackers ? 4- Most common certificate.
  • 13. What’s the penetration testing ?  Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
  • 14. What’s the job of penetration tester? • Plan and prepare • Conduct discovery • Attempt penetration • Analyze and report • Clean up • Be prompt with the patch
  • 15. What’s the types of hackers ?
  • 17. How to Start your Information Security Path. • Many Roads to Go Down and they always Converged. • Even you Start your career as Network Engineer , System Administrator , web Developer you can still be Info Sec . • The Experience you can Gain being in one or more these roles can result a huge advantages over your Security . • SOC Manager (Security Operation Center Managers ) Should have Basic knowledge on all Systems and Application to manage it’s Vulnerabilities and Security . • Not all information Security Roles is Hacking but it’s related to Knowledge Base.
  • 18. Roles in information Security - Penetration Testing . - Web Application Security - Cryptography . - Security Analyst . - Security Architecture. - Vulnerability Management & Assessment. - Compliance & Standers Auditing. - Digital Forensics. - Policy Development . - Business Continuity. - Incident Response . - Systems Security .
  • 21. Year of the Mega Breach
  • 29. Hints in your Roadmap • Choose a Roadmap Plan with Certificates . • Learn To Hack And Then Learn To Automate using Programming Language • Try Your Hand At Security Research . • Participate In Team Activities Like Capture The Flag Information Security. • Pay attention to information security news web sites. • Don’t break into anything without permission.
  • 30. First Step why CompTIA Security + is the Main Gate. • It Gives you the Security Mind Set and terminologies. • It provides proof of professional achievement. • It increases your marketability. • It provides opportunity for advancement. • It fulfills training requirements. • It raises customer confidence.
  • 32. • Introduction About CompTIA Security + • What To Expect From This Course • Course Overview • About The Security+ Exams Module 1 -Introduction Module 2 Understanding The Risks • Risk Assessment • Risk Calculation • Policies Standards And Guidelines • Understanding Control Types • Risk Management Module 3 AAA Concept • Understanding The AAA Concept • Authentication • Authentication Protocols • Authentication Services • Access Control • Access Control Methods • Access Controlling Best Practices • Trusted OS
  • 33. • Understanding TCP/IP • Protocols And Services • Firewalls • Routers And Switches • Load Balancing Module 4 -Network Devices Module 5 Network Design Elements • Layering For Security • DMZ • VLANs • NAT Module 6 Security Threats • Understanding Malware • Viruses • Virus Types • Antivirus Software • Attack Types • Common Attacks • Application Attacks • Proxy Servers • IDS Versus IPS • UTM Devices • Protocol Analyzers
  • 34. • Wireless Network Basics • Wireless Protocols • Encryption Options • WAP Basics • Extensible Authentication Protocol • Wireless Vulnerabilities Module 7 -Wireless Networks Module 8 Application Security • Application Hardening • Databases • Patches And Updates • Secure Coding Module 9 Host Security • Host Security Basics • ACLs And Permissions • Software Baselining • Email And Web Server Security • DHCP Security • DNS Security • Authorizing A DHCP Server
  • 35. • Fault Tolerance Basics • Media Storage • RAID • Clustering & Load Balancing • The Backup Plan Module 10 -Data Security Module 11 Security In The Cloud • Understanding Social Engineering • Social Engineering Types • Dealing With Social Engineering • Physical Security Module 12 Social Engineering And Physical Security • Virtualization • Understanding Cloud Computing • Four Cloud Types • SaaS, PaaS And IaaS • Security In The Cloud Module 13 -Disaster Recovery • Disaster Recovery Plans • Incident Response Policies • Forensics Producers • Working With Vendors • Security Testing
  • 36. • Cryptography Basics • PKI Basics • X.509 • Viewing Certificates • CAs And RAS • SSL And TLS Module 14 -Cryptography Module 15 Monitoring Networks • Security Awareness • Information Classification • Information Access • Security Regulation Compliance Module 16 Security Administration • Network Monitoring Basics • Event Viewer • Hardening Basics • Detection Versus Prevention • Security Monitoring • Hard And Soft Encryption • Encrypting Files • Web Server Certificate Request • Mobile Devices • BYOD

Editor's Notes

  • #33: How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • #34: How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • #35: How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • #36: How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
  • #37: How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.