No TS/SCI but not bad.I don't have one and the job (if I am being offered the one I applied for - like I said, no one interviewing me knew what I was applying for) requires Secret clearance.
No TS/SCI but not bad.I don't have one and the job (if I am being offered the one I applied for - like I said, no one interviewing me knew what I was applying for) requires Secret clearance.
Well, Linux whatever, MS ain't going anywhere and since most large places are windows focused for endpoints, you won't have a problem.Security and Linux are my weak points in IT, unfortunately.
Well, Linux whatever, MS ain't going anywhere and since most large places are windows focused for endpoints, you won't have a problem.
But having security as a weakpoint? C'mon man. Do one of the free online trainings for Security+ equivalency to learn it. Most of it is common sense, some of it is "oddball" that you probably won't ever need to learn ("What's the correct heigh of a fence designed to keep intruders out?" fuck that noise, I work on servers).
Set up a homelab and browse r/homelab on reddit for help with that.Like, I know the basics. I get that ACLs are important, chinese walls for permissions, I know what an IPS is an how to configure it..I just don't have any formal training/experience in it beyond basic sysadmin stuff. I'm far from a specialist, basically.
I dunno. Everywhere that I interviewed last year was running tons of shit on RHEL/Centos for their backend. Having a firm grip on the Linux environment will open up a ton of doors for you, especially if you know Windows enough to be dangerous.
Set up a homelab and browse r/homelab on reddit for help with that.
I did that a couple months ago and you are browsing a forum now based on a lot of the things I learned and fine tuned.
Both, start off with just linux and then make a VM for pen testing with that has metasploit or whatever else. Sure it is script kiddie stuff but you will learn with it.You're speaking of Linux, or Security? Cause for the homelab to have benefit for security I've gotta have a way to test if it worked.
Super dangerous?I'm a bit more than dangerous with Windows
He's right. Fuck around with it until you're comfortable. Then get a Security+ or CISSP. The "CISSP" experience requirements are in 'domains' that you should have experience with just from doing normal computer work (some domains, not all...).Both, start off with just linux and then make a VM for pen testing with that has metasploit or whatever else. Sure it is script kiddie stuff but you will learn with it.
Both, start off with just linux and then make a VM for pen testing with that has metasploit or whatever else. Sure it is script kiddie stuff but you will learn with it.
Super dangerous?
He's right. Fuck around with it until you're comfortable. Then get a Security+ or CISSP. The "CISSP" experience requirements are in 'domains' that you should have experience with just from doing normal computer work (some domains, not all...).
Go to one of the local security meetings for a few months, and after that see if someone in there will vouch for you. Or check if other people in your company have one.Yeah, I was responsible for DR for a long time--I just dont know a CISSP that can verify that shit to make it so I actually get the cert.
And yeah, I'd consider myself super dangerous with Windows. I can make it do what I want it to do pretty much without much issue.