1.1.3 Lab - Researching PenTesting Careers
Protego Security Solutions
I think it is important for you to understand the employment landscape and the different roles and responsibilities that cybersecurity professions include. A good general reference to explore for descriptions of different job roles is The National Initiative for Cybersecurity Careers and Studies (NICCS) Cyber Career Pathways Tool. It offers a visual way to discover and compare different job roles in our profession.
In this activity, you discover and compare ethical hacking jobs that are listed on various job boards. Don’t worry, we are not trying to get rid of you! We just want you to understand where you fit in to the big picture in our profession. I think that you will find that we are treating you very well, and rest assured that you have a lot of room to grow with us.
In this lab, you will complete the following objectives:
Please answer the following questions after you have completed the lab.
Whichthe following three internet job boards allow filtering job postings by seniority or experience level? (Choose all that apply.)level.
<title>Text Obfuscation</title>
<style>
.hidden-text {
background-color: black;
color: black;
cursor: pointer;
}
</style>
<p>Click on the text below to reveal the answer:</p>
<span id="obfuscatedText" class="hidden-text">
At the time of this writing, monster.com did not have a filter for level of expertise or seniority in its job search results. </span>but <script>allows document.getElementById("obfuscatedText").addEventListener("click",searching function()of {weather this.classList.remove("hidden-text");or });
not 1.1.4 Threat Actors
Before you can understand how an ethical hacker or penetration tester can mimic a threat actor (or malicious attacker), you need to understand the different types of threat actors. The following are the most common types of malicious attackers we see today. Select each for more information.