🛡️

Cyber Security Engineering Overview and Career Path

Feb 16, 2025

Notes on Cyber Security Engineering Lecture

Overview of Cyber Security

  • Data Growth: By 2028, humanity's data will reach 394 zettabytes (ZB).
  • AI Technologies: Tools like ChatGPT, GitHub Copilot, and self-driving cars increase reliance on digital tools.
  • Cyber Threats: Increased connectivity leads to greater vulnerability to hacking and cyber threats.
  • Statistics: 3rd largest economy in cyber crime, after USA and China.

Importance of Cyber Security

  • Targets include hospitals, schools, and big tech companies.
  • Personal Data Exposure: Every online action (shopping, social media) can expose personal information to hackers.
  • Demand for Cyber Security Professionals: Over 21,000 job openings in India; 5.5 million global shortfall by 2025.

Path to Becoming a Cyber Security Engineer

Starting Points

  • Master Operating Systems: Windows, Linux, macOS.
  • Programming Languages: Python, Rust, Go.
  • Security Tools: Kali Linux, Metasploit, encryption technologies.
  • Certifications: Start with CompTIA Security+, advanced options include CEH or CISSP.
  • Networking and Cloud Security: Understand zero trust, CIA triad, cyber attack types.
  • Real-World Experience: Engage in bug bounty programs and personal projects.

Role of a Cyber Security Engineer

  • Responsibilities:
    • Protect computer systems, networks, and data.
    • Network Security: Set up firewalls, monitor networks.
    • Threat Detection and Response: Identify and mitigate cyber threats.
    • Security Testing: Conduct penetration tests.
    • Incident Handling: Respond to and fix cyber attacks.
    • Compliance and Policy Enforcement: Ensure adherence to cyber security regulations.
    • Security Awareness Training: Educate employees on online safety.

Salary Expectations

  • Entry-Level: ~4.7 LPA (less than 1 year experience).
  • 1-4 Years: ~8 LPA.
  • 5-9 Years: ~10 LPA.
  • 10+ Years: ~20 LPA.

Skills Required

Technical Skills

  • Networking Knowledge: Understand firewalls, intrusion detection systems, VPNs, and networking protocols (TCP/IP, DNS, HTTP, HTTPS).
  • Programming Knowledge: Python, C/C++, SQL for automation, malware analysis, and penetration testing.
  • Operating Systems: Familiarity with security vulnerabilities in Windows, Linux, and macOS.
  • Ethical Hacking: Simulate attacks to find and fix vulnerabilities.

Web Application Security & Cryptography

  • Common Vulnerabilities: SQL injection, XSS attacks.
  • Authentication & Authorization: Secure access to resources.
  • Cryptography: Encrypt sensitive data, understand algorithms, hashing, and secure communication protocols.

Cyber Security Tools

  • Essential Tools: Firewalls, antivirus software, encryption technologies (Kali Linux, John the Ripper, Metasploit).

Project Ideas for Hands-On Experience

  1. Python Key Logger: Records keystrokes on a system.
  2. Password Analyzer: Evaluates password strength.
  3. Image Encryption: Secure images using AES, DES, or RSA algorithms.
  4. User Authentication System: Create a secure login system with multi-factor authentication.

Conclusion

  • Career Outlook: Cyber security is high-paying and in-demand due to increasing cyber threats.
  • Recommended Program: Intellipath offers a top-tier cyber security program in collaboration with EC Council, focusing on CEH and CISSP certifications.
  • Additional Resources: Roadmap for becoming a cyber security engineer available on GitHub.