Skip to main content

Author: Circadence

Transitions to the Cloud: Considerations for Cyber Training and Readiness

There many changes occurring in the cybersecurity sector and across all industries looking to adapt and harden posture in turbulent times; namely, shifts to cloud-based or hybrid cloud infrastructures poses new challenges and creates new opportunities for information security professionals. While business opportunities emerge and excite leaders, cyber professionals are often left seeking the latest knowledge, skills and abilities needed to execute tactics and techniques in these new environments.

We invite you to join Karl Gosset, VP of Content Development at Circadence for an overview of cloud security and cyber training.

 – FEATURED SPEAKER –

Karl Gossett
VP of Content Development
Circadence Corporation

Atendees will Learn

  • Top challenges to be aware of if shifting cybersecurity to the cloud
  • Ways to build skills and competencies (including agility and skills transfer)
  • First-hand stories (and lessons learned) of efforts to secure the cloud using live, interactive tools and knowledge sharing

8 Tips to Keep Your Small Business Cyber Safe this Holiday Season

The holiday season is a time of giving, however, for hackers it can be a time of swindling. We are all susceptible to cyberattacks, but small businesses can hurt the most from the fall out. With limited staff numbers, small IT departments (if any at all), and no money allocated toward remediation, it is of the utmost importance to protect your small business, especially over the holidays. So, what can you do to protect yourself?

  1. Understand your vulnerability by industry – While every industry can be targeted by scammers, there are some more at risk than others. Specifically, retail, automotive, manufacturing, and financial. Not only do these industries process a lot of sensitive data and large quantities of money, but they also use automated process and many interconnected devices which are vulnerable to cyber attacks. Assessing your risk is the first step in preventing it.
  2. Adopt a cybersecurity policy – Whether you’re a sole proprietor or a company with 5,000 employees, cyber criminals are targeting your business. Smaller businesses may not have controls, processes, or policies in place for cybersecurity defense and offense. There are several options for securing a comprehensive cybersecurity plan such as a managed service provider (MSP), a systems integrator or security system provider, or a cybersecurity consultant . Take the time to put together a comprehensive policy for your employees to learn and reference.
  3. Educate employees on cyber risks and prevention – It won’t do you any good to adopt a cyber policy if you don’t train your employees on risk awareness and staying safe online while working. Ensure you utilize persistent, hands-on learning, such as a cyber range , to keep employees abreast of the latest threats while building confidence in their abilities to recognize threats and suspicious activity.
  4. Beware of popular scam tactics used against small businesses – From overpayment scams to phishing emails, hackers will try just about anything to get to your money and sensitive information. Be wary of anything that looks or sounds suspicious such as calls from unknown persons, pop-ups, and unfamiliar websites, only open emails from trusted sources, and NEVER give your credit card or personal information to anyone you don’t know whether over the phone, by email, or in person.
  5. Secure WiFi Networks – These days all businesses require WiFi to operate, so you need to ensure your network is safe. Hide your network, which you can do by googling instructions or working with your internet provider, so that your router does not broadcast the network name (or SSID) and ensure that a password is required for access. Be sure you change the administrative password that was on the device when first purchased as well to a complex password only you will remember. Setting up a private network for employees and offering a guest network to customers is a great way to keep customers happy while ensuring your cyber safety.
  6. Make backup copies of important information – Regularly back up data on every computer used in your business including documents, spreadsheets, financial and personnel files, and more. You can do this through many channels from uploading files to an external hardrive, USB, the cloud, or using a paid data storage site.
  7. Install and update antivirus software – Every device you use for your business needs to be protected with antivirus, antispyware, and antimalware software. You will need to purchase this software either online or from a retail store and will need to assess your specific needs based on a variety of factors, such as the type of operating system you use (mac or PC) and your budget. Here is a handy guide for things to consider before purchasing antivirus software. Be sure you install and update antivirus software regularly to ensure the newest and best iteration is at work protecting your sensitive information.
  8. Install a VPN – A virtual private network (VPN) is a software that enables a mobile device to connect to another secure network via the internet and send and receive data safely. If you regularly use your smartphone to access secure information for your small business, it can be technology that is well worth investing in. Setting up a VPN is a simple task but depends on what operating system you use. Check out this great article that guides you through VPN set up for various systems.

By following these tips and tricks, you can ensure that your business stays protected and profitable. cybersecurity is an ever-changing field, and businesses must continually adapt to new attack methods and be able to defend themselves. Keep the latest in cyber training at your fingertips with Circadence’s inCyt security awareness game of strategy and if you have a small security team/IT professional, consider our flagship immersive, gamified cyber learning platform, Project Ares for advanced cyber training. We wish you a safe and happy holiday season!

Photo by Aryan Dhiman  on Unsplash 

Photo by You X Ventures  on Unsplash

Cyber Monday and Black Friday Tips to Prevent Holiday Hacks

If you’re anything like me, you get really excited when the holidays roll around. The music is cheerful (the Hallmark Channel is on 24/7–high five!), the fireplace is roaring, and I can curl up with my blanket and mobile phone to SHOP ONLINE (of course). Ah, the spirit of the holidays…But the bah humbug part about the scene I’ve just set, is I’m not the only one feeling “festive.” Cybercriminals LOVE when surges in online shopping occur because people are looking for the best deals on gifts, bargain hunting, and planning for the biggest online shopping days of the year: Black Friday and Cyber Monday. This means adversaries can more easily manipulate our holiday spirits with cyberattack methods like phishing and social engineering, credit card fraud, and more.

So while you prepare your winter festivities and “add to cart,” consider these 12 tips to keep your “digital dwelling” safe and warm during Cyber Monday and Black Friday, especially.

Shop from websites you know and trust.

Don’t click on those flashy “hot deals” that are likely too good to be true. Scammers deliver ads based on your interests, offering sweet discounts or great deals to get the click. Now is NOT the time to experiment with new retail websites and apps.

Don’t go “public.”

Avoid public Wi-Fi when using the Internet, especially when accessing sensitive data like your bank account balance or emails. Your personal information isn’t a “gift” you want to give a hacker this holiday season.

Update your operating systems.

With a little more downtime during the holidays, take a merry minute to keep your operating systems as current as possible. This also goes for apps on your phone.

Refresh your passwords.

Enter into the New Year with stronger, more secure passwords—something that will keep a criminal out of your personal property and prevent identity theft. Things like symbols and numbers to replace letters add a layer of complexity that make passwords harder to crack. Consider using a password manager to store all your different passwords so you don’t forget them!

To ensure you are protected from any precocious cyber predator, check our security awareness game inCyt , a fun way to learn cyber concepts and attack methods while cozying up on your couch with a hot toddy. You can practice proactive cyber readiness during the holidays—and year-round with this sweet resource.

Don’t click on suspicious links.

Scammers, like the Grinch, will impersonate real online retailers and stores to get you to open an email and click on links while you are holiday shopping. Don’t! This phishing email tactic opens the door for them to install malware on your computer and before you know it, your data is stolen and compromised.

Look for the lock.

Secure websites will often have a lock icon in the browser address bar to indicate it is a secure connection.

Get creative with security questions.

Your mother’s maiden name or favorite food can most likely be found online somewhere, so try getting creative with your security questions to access your accounts. Choose a motto you live by perhaps or choose an answer to a question that is completely opposite of what you would select.

Watch your bank and card activity.

Hackers can see your financial activity when you’re sleeping and when you’re awake if you’re not careful. Diligently monitor your bank account, online transactions, and card activity and notify your financial services provider if you observe any suspicious activity.

Disable auto-connect.

Some devices will auto-connect to available wireless networks. Ensure you are only connected to wireless and Bluetooth networks when devices are in use or about to be used. Unknowingly being connected is the opportune time for hackers to cause damage right under your nose.

Store devices when away.

If you’re a busy traveler, criminals seek out meal times to check hotel rooms for unattended laptops and mobile devices. Be especially wary when attending conferences or trade shows as guest networks tend to be more vulnerable to attacks (and allows hackers to access lots of data from lots of people, who are all in one convenient location).

Activate double authentication.

If you haven’t done so already, ensure all your apps have a double authentication factor so every time someone tries to log in to your online account, they need a code or key that is texted to your phone or sent to your email to gain access. That makes unintended access to things like social media accounts more difficult for cybercriminals.

to be more vulnerable to attacks (and allows hackers to access lots of data from lots of people, who are all in one convenient location).

Practice persistent protection.

Hackers aren’t just looking to exploit individual data, they also target businesses knowing many take extra time off this time of year to spend with loved ones. Ensure your company has a strong cybersecurity response plan in place and key members of your threat intelligence, analysis, and fraud teams are consistently practicing responding to threat scenarios. Our Project Ares platform runs on Microsoft Azure, so professionals can practice cyber offense and defense from anywhere, at any time on a gamified cyber range.

It’s important to practice safe online behavior all year-round but the holidays bring about an extra level of digital activity hackers love to exploit. Make sure you are taking proactive measures to ensure you are having the most wonderful online shopping day of the year—and cybercriminals aren’t.

Cybersecurity in the Age of Digital Transformation

Is your company doing through a digital transformation?

The age of digital transformation is prompting businesses to examine their increased threat surfaces and cyber risk. Circadence provides tips for how to ride the cybersecurity wave of digital transformation while keeping practices and preparedness efforts strong.

From unifying security architecture to automating routine security tasks to building a culture of continuous cyber training for professionals, Circadence helps businesses of all sizes upskill cybersecurity teams to fortify the vulnerable human element of cybersecurity.

6 Cybersecurity Teaching Best Practices To Show You How To Use Project Ares Labs Like A Gym

Welcome to the Project Ares Training Ground! Here, we believe in putting cyber readiness in the hands of learners – literally – with the hands-on, realistic labs found on Project Ares. Educators can use these labs to train their students to achieve killer cyber skills using Project Ares! Get ready to think of your classroom as a cyber gym and become your students’ personal trainer. Let’s hit it!

6 Routines to Use Project Ares Like a Gym

You, as the Project Ares Trainer, will assess your students’ abilities and evaluate their goals. Once that’s complete, offer a training plan to meet those goals. To help you train like the pro that you are, we’ve created the following cyber education training program best practices:

  1. Design a Training Plan with the Cyber Learning Catalog
  2. Master the motions in the Media Center
  3. Warm up with the Cyber
  4. Learning Games
  5. Lead group workouts in the Battle Rooms
  6. Complete obstacle courses in the Missions
  7. Track progress with
  8. Cybersecurity EdTech Tools

1. Design Your Cybersecurity Program with Project Ares’ Cyber Learning Catalog

In our cyber gym, your training group will start with our Cyber Learning Catalog . Think of it as your workout plan. This plan has three main categories – Cyber Learning GamesBattle Rooms, and Missions. In it, you’ll see which workouts will flex which cybersecurity muscles. Note that the Project Ares Cyber Learning Catalog offers two views:

  • student view where students can see their objectives. *
  • An instructor view where you will see step-by-step written and recorded solutions for every single scenario. **

*Note: This view is available to all, regardless of whether or not you’ve purchased Project Ares labs.**Note: Educators can access this view only after purchasing Project Ares labs. When designing your training plan, a.k.a. classroom curriculum, keep these five elements in mind:

  1. Define your student demographic
  2. Visualize your end goal
  3. Make a schedule
  4. Plan for student independence
  5. Choose your equipment

These elements will help you structure a plan that ensures you, as their trainer, are meeting their needs and helping them progress.

Project Ares Cybersecurity Training Ground

Once you’ve laid out your training program, the first action you’ll want your students to take is to learn how to use the equipment. Just like walking into a gym for the first time and meeting a front desk member, your students will meet our in-game advisor known as Athena. She’ll walk you through a step-by-step demonstration of each scenario upon launching the Project Ares platform. In addition to Athena, Project Ares has a dashboard where your students will see profile and progress data related to their scenario activity:

  • Username
  • Rank
  • Points towards their next promotion
  • Level

Below this, they’ll see their Profile, Badges, and Chat Room where they can communicate with you as well as their team members. Many gyms have adopted a competitive reward system for working out. We, too, have adopted a similar award system with Badges and Mission Coins.

Badges

Students can earn badges through their commitment and dedication to their learning journey. This kind of tangible evidence of progress fosters motivation and shows that the training they’re doing in the Project Ares gym translates to the work they’ll do in the professional world.

Mission Coins

Students can earn Mission Coins upon completing a real-world simulation of a cybersecurity crisis in Red and Blue Scenarios. No, these coins won’t get students free access to the smoothie bar, but they’ll keep them engaged and wanting to collect more and learn more! Just like a gym with a variety of equipment for all skill levels, Project Ares’ labs can train a wide range of students and professionals (Security Operations Center (SOC) team members, analysts, network teams, etc.) to build and maintain their skills.

2. Cybersecurity Fundamentals in the Media Center

Our Media Center is the second way we see educators using Project Ares as a gym:

“Welcome to the Media Center, where you will find reference material and videos based on certain cybersecurity and specialization topics.”

Similar to equipment instructions, we have a multitude of materials that expand on cybersecurity:

  • Fundamentals
  • Defensive methodologies
  • Offensive tools

Use the media center to build up your students’ muscle memory! Now that everyone is familiar with the gym and how we’ve organized our training floor to build up cyber muscles gradually, it’s time to get warmed up with the Cyber Learning Games!

3. Warm Up with Cyber Learning Games

To warm up your students, have them start with Cyber Learning Games . Here, they’ll find three virtual arcade-like cyber skill-building games that cover multiple genres and play styles.

Trivia Loot is our jeopardy-style game that covers a slew of topics such as the history of the internet, famous hackers, cyber movies, tools, tactics, and attacks. Students try to earn as much money as possible by wagering on a topic and then answering the multiple-choice topic question within the given time limit. Topic categories become increasingly difficult.

Play Trivia Loot!

This game helps with memory recall and validates the wealth of cybersecurity knowledge your students have learned in your classroom. Plus, they’ll nail it on trivia night should cybersecurity questions come up! Regexile challenges students’ knowledge of regular expressions while they learn to sequence their text screens to define search patterns when defending an army from attacking robots. This game is important because it highlights the need to accurately and quickly execute expressions on the first try. Even the smallest error can lead to expression disaster. Your students will train their brains and fingers to respond quickly under pressure. Cylitaire is similar to the solitaire game Klondike. The card layout and goal are the same. In Cylitaire, students assemble phases of the cyber kill chain in a particular hierarchy. Your group is warmed up. Now let’s go to the Project Ares’ Battle Rooms to define those muscles!

4. Defining Cyber Muscles in Project Ares Battle Rooms

Play RegExile!

Battle Rooms will test key cybersecurity skills. To help your students through these cyber scenarios, you, the instructor, have the opportunity to focus on three core strategies: contextualizationcollaboration, and competitionContextualization: Use our gamified learning platform to introduce students to new tools and concepts. It’s one way to ensure that students are improving their knowledge retention and executing specific tasks. Collaboration: Have your students work together or by themselves to figure out how to get out of these escape-style rooms. You can watch them in real-time and offer tips should they get stuck. Competition: Competition mode is great for in-class assignments and exams. Why? You can reuse them again and again. They also drive student motivation up. You have the option to allow your students to view the built-in leaderboard to see who has the highest scores and fastest times. With contextualization, collaboration, and competition, Battle Rooms allow you to incorporate different workout routines through repetitive motions to build muscle memory and define cybersecurity skills. Okay, your workout group’s muscles are warmed up and defined! You’re ready to take them to the obstacle course!

5. Real-World, Cyber Simulated Obstacle Courses

With our Missions, we really wanted to create something unique and engaging for instructors and students to showcase their skills in real-world simulations. So, if Battle Rooms reinforce skills, Missions challenge them. With every Mission, students have the opportunity to experience:

  • Real-world scenarios that require both offensive and defensive skills
  • Multiple storylines
  • Individual or team play roles
  • Hint options

When your students finish training for the day, they may end their Mission entirely or save their current progress. If students choose to save their Mission, they resume it within the next seven days. When the Mission ends, students can review their play to assess themselves and their progress.

6. Cybersecurity EdTech Tools

Congratulations! Your training group is now feeling the effects of that hard workout. The results from their hard work will prove that your training routine is worth the effort. Now it’s time to review your training plan and tools. Did they support your group’s goals and level of effort? In Project Ares, instructors have access to an additional mode called Trainer to view progress. Trainer Mode Trainer mode is critical to a well-rounded classroom experience. From this view, you can easily keep tabs on your students’ activities in one location. Upon first logging in, you’ll see a welcome screen that includes a live event board. This board reveals all of your organization’s current progress, history, and awarded points in any time range that you choose. You may choose to create custom leaderboards and share them with your students.

Personal trainers often join students in their routine to show their group how to perform or refine an exercise. In Project Ares, it’s no different. As a trainer, you have the ability to join any active mission that your students are playing so that you can observe or aid them in real-time. Does your group no longer need your aid during workouts? Are you ready to test their skills? Turn off hints and Athena, our in-game advisor, to create an exam-like environment. Web App Dashboard We have one more trainer location to review your group’s results. Take a look at your dashboard (found in our web app). Here, you’ll see your students’ progress in every scenario that is available.

You don’t need to go through individual accounts to view results unless you want to. If you do, log back into Project Ares to see individual scores, hints used, and actions taken. Use these cybersecurity EdTech tools to free up your time to focus on what you want to accomplish. Leave the general tasks to us!

Empowering Your Cybersecurity Curriculum

For many experts, building a homegrown cyber range to use the latest tools and technologies is incredibly time-consuming and very expensive. Now let’s add curriculum planning, teaching, grading, meetings, and researching on top of your day-to-day tasks. That’s a lot! Students need to have hands-on practice before they find themselves in high stake situations. That’s why we created Project Ares. We can act as an educator’s teaching assistant and aid in preparing learners for the professional world with realistic, challenging scenarios. At the end of the day, the most important belief is your commitment to your students. Project Ares embraces open-source tools, gamification, and supporting cloud services to empower everyone in the gym – instructors and students alike. We’re here to bring your cybersecurity goals within reach. See you on the training ground!

Project Ares Students: a conversation with Nicole Mendoza

A Cybersecurity Success Story from a Sacramento Cares Student

I had an excellent conversation with Nicole Mendoza – an alumna of the SacCARES (Sacramento Cares) Cybersecurity Accelerator from our Project Ares partners at Inteligenca. We discussed her cybersecurity learning journey that turned the COVID crisis into a time of opportunity.

Giuseppe Scalamogna from Project Ares and Nicole Mendoza talk about pursuing a cybersecurity education.

Nicole, what was the focus of the Sacramento Cares course that you participated in?

I was in the prep class that they were doing for CompTIA’s IT Fundamentals certification (opens new window). Project Ares was part of the learning supplements used for that course.

Did you have a lot of cybersecurity or computer science experience before getting started?

No, I hadn’t done anything with cybersecurity or computer sciences at all. I got into the SacCARES program because I was looking for a change. I had to quit my job during COVID and was stuck in lockdown. It was the perfect opportunity to learn something new, a skill that I could use moving forward.

How did you hear about the Sacramento Cares programs?

A news article I read mentioned how Sacramento was using its COVID supplement funds and that included job training programs. I applied to one program but is was full. They recommended Carmen Marsh’s program at Inteligenca, so I applied and was accepted.

Was there something that drew you to studying computer science?

I didn’t know a lot about it before joining the first program I was in with Inteligenca. Once I began to understand what cybersecurity means — what is going on in the background of our everyday lives on the Internet and what bad people are doing – it was fascinating. And scary.

I think it’s important that people have at least a little bit of knowledge about what’s going on so they can protect themselves.

What’s next as you continue planning your future learning goals?

I am working to find a fit of what might be the best reflection of who I am, what I can do, and what I’m passionate about.

I just had a meeting with one of my mentors from the program. We talked about finding the right path — that it is important to understand what you really want to do and then align that to a job which reflects those details.

My next step will most likely be a prep course for my Network certification. I believe that will give me a good basis for the next jobs that I want to get into.

What words of advice would you give to someone who wanted to study cybersecurity but might be nervous about taking the leap?

I suggest they find somebody they know or a community or a website forum and start asking questions. I think it’s a good first step to start getting some relevant information.

One of the most awesome things about the cybersecurity and tech community is that people are so willing to help. They’re welcoming and willing to share. Whenever I asked a question, it seemed like I got recommendations of like 5 articles and 4 people on Twitter to check out for more information.

That’s something I’ve never experienced in other professional communities. The people in the technology community are willing to be as helpful as they possibly can. It is super rad

You recently used Project Ares again. What did you think of it compared to when you were using it in your course?

I like some of the changes that have been made. It’s more user friendly, especially for people like me who might not know everything about how to arrive at the end results.

I was playing through a Linux Basics Battle Room, and it was rewarding to see what I remembered from my classes but I also used the hints to get tips when I needed them.

Project Ares Appreciation

We’re excited by our users’ passion, drive, and desire to be successful! Thank you Nicole, and best of success in your cybersecurity career journey.

Check out other success stories (opens new window) where we continue to explore what inspires and motivates Project Ares (opens new window) students and why cybersecurity is important to them.

Project Ares Students: a conversation with Ken Perez

A Cybersecurity Success Story with a Sacramento Cares Student

I had a fantastic chat with Ken Perez – an alum of the SacCARES (Sacramento Cares) Cybersecurity Accelerator from our Project Ares partners at Inteligenca. We discussed his learning journey from working for a finance audit company to following his dream of studying Cybersecurity

Giuseppe Scalamogna from Project Ares talks with Ken Perez about pursuing his cybersecurity education.

Can you tell us about the certificate program you pursued with Inteligenca?

I was involved the SacCARES Cybersecurity accelerator program. It ran from November 2020 till February 2021. We were primarily studying our CompTIA Security+ certification.

Did you have a lot of cybersecurity experience before pursuing your Security + certificate?

I did not honestly. My cybersecurity experience was limited to the end user roles at a major corporation. My user experience with cybersecurity was the traditional corporate IT training that they give you in terms of don’t open suspicious emails, password protection and not to be downloading stuff that you shouldn’t be downloading.

However, I’ve since learned that training is one of the most important parts of cybersecurity. It’s just so vital. A lot of problems that happen are because of people opening phishing emails.

When did you start to get interested in computers?

I’ve using the computer since the 2nd grade. I was using an Apple 2e and playing Oregon Trail with big old 5.25-inch floppy disks. I’m a child of the modern technological age.

Today, I have this computer here and I’ve changed up the hard drive, swapped out the memory and upgraded the power supply. I’m comfortable with the hardware and the software side now.

What made you interested in pursuing a career in cybersecurity?

I was initially an electrical engineering undergrad and I switched to business. Particularly, to focus on finance and numbers because I was attracted to Excel, and I just loved it. As I proceeded in my career, I became a subject matter expert and I started writing my own VBA scripts. Little programs. I started to write my own macros to help me get my job done faster.

So, when I started constructing these programs at work, I found myself drawn back to an electronic engineering mindset. I was producing reviewable, repeatable, and accurate work.

What’s your dream job in the Cybersecurity world?

I’m kind of torn right now, honestly, because I like forensics. However, I’m starting to see cyber risk audit as something that I think I’m going to find myself doing because I have experience in a similar field and it feels familiar, so that’s why I’m leaning towards what a lot of people call GRC, but I prefer to call it, cybersecurity risk auditing.

What did you enjoy most when you were working with Project Ares?

I like the game room a lot. I know it’s not the primary purpose of Project Ares but when you’re still learning those small games can be extremely helpful. The Portflow game was a big help in learning about ports and protocols. I may not have passed Security + if hadn’t have played that game as much. When you’re a newbie the cyber learning games are great.

Project Ares Appreciation

We’re excited by our users’ passion, drive, and desire to be successful! Thank you Ken, and best of success in your cybersecurity career journey.

Check out other success stories (opens new window) where we continue to explore what inspires and motivates Project Ares (opens new window) students and why cybersecurity is important to them.

Project Ares Students: a conversation with Robert Hogan

A Cybersecurity Success Story from a NexGenT Student

Leeann Ryder (left) & Giuseppe Scalamogna (lower right) of the Project Ares Team talk with Robert Hogan (top right) about his cybersecurity education pursuits.

What inspired you to learn cybersecurity?

I started at a retail job which is a very routine work environment and I didn’t think it was a great fit. I wanted more of a challenge and I thought IT was interesting. So, I pursued my Bachelor’s in Video Game Development at Full Sail University.

At the start of my job search, I felt that the job culture of game development was just not for me. Developers take on roles that quickly stop and have to find new ones. It’s not the best option for me because I really want job security in my career.

When did you decide you had an interest in cybersecurity?

I started an online software development program at the Lambda Academy of Computer Science.

During our application security studies, my class got an introduction to digital security and how to protect the applications that we developed. That sparked my interest in cybersecurity.

How did you find NexGenT and join their cybersecurity certificate programs?

I researched security programs with income share agreements where you can complete the program and pay the school back. I chose NexGenT where I was introduced to Project Ares and earned a Cybersecurity Associate (NCSA) & Cybersecurity Professional (NCSP) certificates.

Are you still studying Cybersecurity now?

I started a security plus certification and now my exam is in about 14 days. Once I take that exam, I’ll finish school for now.

What kind of roles are you interested in pursuing once you finish your CompTIA certification?

My first choice is to become a security analyst. Afterwards, I want to work on the defensive side for a few years and move into Red team.

After Cybersecurity Foundations and Networks, we got access to Project Ares so we could get hands on practice and manipulate things and do penetration tests.

It gave me hands-on tools as opposed to making my own labs with virtual machines. Project Ares was already mission ready and set up. I didn’t have to think about how to set it up and test it.

Is there a piece of Project Ares content that really resonates with you?

The Stop Terrorist Financing Mission is fun and feels like a real mission (opens new window)where I’m in control. Portflow (opens new window) is great too and helps students learn port numbers in a way that’s fun and easy.

What words of advice do you have for someone who’s thinking about studying cybersecurity?

For any complex topic, you need passion. If you don’t like a subject, you won’t sit through lectures to learn it. Break larger concepts into smaller ones and work your way up from there. That’s my advice to make the concepts less intimidating.

Would you encourage someone without an IT background to study cybersecurity?

Absolutely. I don’t feel there’s any subject in technology where you can’t start at zero and learn. If you’re interested then you can start as a beginner. You don’t need any foundational skills. There’s free and paid resources you can use. You can start on YouTube. There’s always a platform for you to start at no matter where you are.

Project Ares Appreciation

We’re excited by our users’ passion, drive, and desire to be successful! Thank you Robert, and best of success in your cybersecurity career journey.

Check out other success stories (opens new window) where we continue to explore what inspires and motivates Project Ares (opens new window) students and why cybersecurity is important to them.