Cyber Security ms Resources
Career Spotlight: Penetration Tester
Imagine the exhilaration of slyly hacking into secure systems without the fear of repercussion or imprisonment. Penetration testers (also known as pentesters) do just that, and are actually paid to hack into secure systems – by the system administrators themselves. Essentially, pentesters are contracted to hack a system to find holes in security and recommend appropriate measures for patching those holes.
While the action may not be quite as exciting as the 1992 film Sneakers (Robert Redford and Ben Kingsley) or the hokey, stylized 1995 flick Hackers (Angelina Jolie and Jonny Lee Miller), pen testers work in a constantly evolving field. Staying on top of all the latest hacks, scams, malware, and other hacker techniques is absolutely necessary for those who work in this field.
Pen testers may even dabble a little in social engineering “field work,” where they will be tasked with trying to get company employees to divulge sensitive information about their networks.
Students desiring to foray into the penetration testing field should first obtain a degree in cyber security before proceeding on to the next step. After, or even during their schooling, students can begin to drive their career toward pentesting. Certification courses and licensing exams are available to help prospective pentesters to qualify for information security positions.
What Is Penetration Testing?
Hackers are skilled in writing and deploying code-based exploits (programs designed to take advantage of a security flaw to gain access to a secure system). Most exploits are constantly customized and shared on hacker forums online and on the deep web. Pentesters use these same exploits to strengthen a company’s network security.
“During a penetration test, we take on the role of a hacker,” says Anthony Khamsei, founder of Gold Security, in “Protecting Yourself And Your Tech Is Not Optional” in Forbes. “We attack a client using the same techniques adopted by hackers in a genuine security breach. By doing so, we are able to root out any weaknesses that a hacker with malicious intent might be able to exploit.”
Khamsei also notes the difference between vulnerability assessments and pentesting. Vulnerability assessments merely highlight potential flaws while pentesting actively seeks to exploit flaws in a sanctioned attack.
As cyber security has improved over the years, however, most hacker exploits won’t work without credentials, login info, password, or other types of sensitive information. Here is where social engineering comes into play. Social engineering involves attempts to exploit the human side of cyber security by guessing or getting someone to inadvertently divulge information that could help a hacker break into a system. And if pentesters are going to fully test a system’s vulnerabilities, they will have to do their own social engineering.
“The nature of the web means there are plenty of opportunities for recon: adding people on Facebook, phoning utility companies for personal information, creating elaborate and believable background stories,” asserts enterprise cloud and security authority Tamlin Magee in his ComputerWorldUK.com blog post, “What Is Penetration Testing? Meet The Security Pros Breaking Into Your Business For Cash.”
The information people share on social networking sites can reveal the names of children, pets, relatives, birthdates, favorite foods, movies, music, and other important personal information. More often than not, a person’s password will consist of elements of such information.
Social engineering also includes scenarios where the hacker (or pentester) will pose as IT support and “help” people fix their computers only to get their login credentials so the tester can later access the entire system.
The Bureau of Labor Statistics (BLS) categorizes pentesting under “Information Security Analysts” on its website. The duties required of pentesters include:
- Monitoring organizations’ networks for security breaches
- Investigating violations
- Preparing reports documenting breaches and the extent of damage caused by each breach
- Conducting penetration tests
- Researching the latest trends in IT security
- Helping organizations plan and carry out a security policy
- Developing new and improved security standards and best practices
- Making recommendations to organizations’ senior IT personnel
The demand for pentesters is rising steadily, especially with the recent increase in cybercriminal and hacktivist publicity over the past few years. Information security firms and practitioners are finding that they must maintain constant vigilance over the newest hacking skill sets released almost daily on the web. Companies involved with information security and pentesting are looking for candidates with strong analytical and problem-solving skills, who have the drive to constantly stay on top of new developments in their field.
“Information security professionals are maturing just as the increasing sophistication of cyber-attack capabilities are demanding more experienced infosec professionals,” according to a 2016 Foote Partners, LLC Research Group press release.
Once hired by an information security firm or department, pentesters can expect to make an average salary of $90,440, according to DataUSA.io’s Information Security Analysts page. The computer systems design industry employs more than twice as many pentesters as any other industry. Wired telecommunications carriers pay their pentesters a considerably higher wage than other sectors (almost $140,000 annually). And the estimated job growth over the next ten years is almost 18 percent, whereas the national average is only 6.5 percent.
Pentesting is a demanding field that requires an incredible amount of attention to detail and dedication to keeping one’s skills current at all times. For those who have these rare qualities, penetration testing may be a career field worth serious consideration.
Maryville University – Online Degree In Cyber Security
Maryville University’s online cyber security degree offers advanced training in penetration testing, cyber security, mobile security, digital forensics, and malware analysis. All skills are learned and practiced in Maryville University’s virtual training lab.
Upon graduation, students may qualify for high-paying positions such as networking consultant, information security manager, pentester, security analyst, or network architect in some of the world’s largest tech companies. Contact Maryville University for more information.
Protecting Yourself And Your Tech Is Not Optional – https://www.forbes.com/sites/brianrashid/2017/04/07/protecting-yourself-and-your-tech-is-not-optional/#23bbefbac0e5
What Is Penetration Testing? Meet The Security Pros Breaking Into Your Business For Cash – http://www.computerworlduk.com/security/what-is-penetration-testing-3637534/
Information Security Analysts – https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1
2016 Foote Partners, LLC Research Group Press Release – http://www.footepartners.com/fp_pdf/FooteNewsrelease_1Q16ITSkillsTrends_01162016.pdf
Information Security Analysts – https://datausa.io/profile/soc/151122/