generated from Code-Institute-Org/gitpod-full-template
-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathcyber-security.html
109 lines (93 loc) · 6.24 KB
/
cyber-security.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link rel="stylesheet" href="assets/css/style.css" />
<title>Cyber Security</title>
</head>
<body>
<h2 class="title">Ethical Hacker and Cyber Security </h2>
<div class="resources-card">
<section>
<div class="about-role">
<h3>Learn more about this role</h3>
<p>Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT jobs any person can be involved in. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested.
</p>
</div>
<ul>A ethical hackers role can include:
<li>Using port scanning tools like Nmap or Nessus to scan an organization’s systems and find open ports. The vulnerabilities with each of these ports can be studied and remedial measures can be taken.</li>
<li>Examining security patch installations and making sure that they can’t be exploited.</li>
<li>Employing other social engineering techniques like shoulder surfing to gain access to crucial information or playing the kindness card to trick employees to part with their passwords.</li>
<li>Understand software, hardware, and user interactions, integrations, and interfaces.</li>
<li>seeking to build in security during the development stages of software systems, networks and data centres
</li>
</ul>
</section>
<section>
<div class="women">
<h3>A women that inspires us!</h3>
<h4>Eliza-May Austin </h4>
<img src="assets/images/eliza.jpg" alt="Image of Eliza">
<p>
Eliza is the CEO of <a href="https://th4ts3cur1ty.company/" target="_blank" rel="noopener">th4ts3cur1ty.company</a>, an intelligence lead adversary emulation purple teaming
specialist organisation. </p>
<p>Eliza founded the <a href="https://llhs.com/home-1" target=_blank rel=noopener>Ladies of London Hacking Society (LLHS)</a> a social enterprise committed to teaching
and sharing technical knowledge among women in the infosec community. </p>
<p>She is passionate about improving the security of CNI, and works to make infosec more accessible by
actively addressing class based discrimination, nurodiversity challenges and gender bias. </p>
<p> Eliza Studied at Sheffield Hallam University
Degree Bachelor's in Computer Security with Forensics</p>
</p>Follow her on Linkedin at <a href="https://www.linkedin.com/in/elizamayaustin/?originalSubdomain=uk" rel="noopener"
target="_blank">@Eliza-May Austin</a>.
</p>
</div>
</section>
<section>
<div class="resources">
<h3>How to get into Systems Architecture</h3>
<p>There are a few different paths into becoming a Cyber specialist.</p>
<p>One path is to study a cyber security or forensics related degree</p>
<h5>Take a look at some of the top rated Universitys in Europe for student saticifaction offering
Computer Science related degrees</h5>
<ul>
<li><a href="https://www.uwl.ac.uk/course/undergraduate/computer-science?start=266&option=33"
target=_blank rel=noopener>University of West London</a></li>
<li><a href="https://www.aber.ac.uk/en/cs/">Aberystwyth University</a></li>
<li><a href="https://inf.ethz.ch/" target=_blank rel=noopener>ETH Zurich - Swiss Federal Institute
of Technology</a></li>
<li><a href="https://www.ed.ac.uk/studying/undergraduate/degrees/index.php?action=view&code=G400"
target=_blank rel=noopener>University of Edinburgh</a></li>
<li><a href="https://www.tum.de/en/studies/degree-programs/#" target=_blank rel=noopener>Technical
University Munich</a></li>
</ul>
<h5>University not for you?</h5>
<p>The great thing with cyber security is that it is a skill that is continually moving and developing. Check out some great training tools to get you started</p>
<ul>
<li><a href="https://th4ts3cur1ty.company/" target="_blank" rel="noopener">th4ts3cur1ty.company</a></li>
<li><a href="https://www.city.ac.uk/prospective-students/courses/short-courses/cyber-security-fundamentals" target=_blank rel=noopener>City of London University Short Course</a></li>
<li><a href="https://www.ncsc.gov.uk/information/certified-training" target=_blank rel=noopener>National Cyber Security Centre Training</a></li>
<li><a href="https://lesbianswhotech.org/codingscholarship/" target=_blank rel=noopener>Lesbians Who
Tech</a></li>
</ul>
<h5>Great organisations helping women get into tech</h5>
<ul>
<li><a href="https://llhs.com/home-1" target=_blank rel=noopener>Ladies Hacking Society</a></li>
<li><a href="https://girlswhocode.com/" target=_blank rel=noopener>Girls Who Code</a></li>
<li><a href="https://codeinstitute.net/5-day-coding-challenge/" target=_blank rel=noopener>Women Who
Code</a></li>
</ul>
</div>
</section>
<div class="buttons">
<div class="button-resources">
<a href="quiz.html" class="next-btn">Retake the quiz</a>
</div>
<div class="button-resources">
<a href="all-careers.html" class="next-btn">View all career paths</a>
</div>
</div>
</div>
<script src="assets/js/script.js"></script>
</body>
</html>