When seeking to join the ever-growing field of information technology, two of the most common paths to competency are degrees and certifications. While both of these options can get you a job in IT, they are by no means created equal! In this blog, we’ll take a look at some of the important differences between these two routes (as well as a couple of ways that you may not have to choose at all).
College or Degree Program
In general, it takes about 4 years to earn a college degree. This is usually spread out over 8 semesters, with four courses per semester. This enables students to get a huge amount of information in their time at college and really process each individual class before moving on to additional learning materials. Especially determined students may be able to finish their major in 3 years (or less) if they take more than 4 classes per semester, or take classes during the summer.
In terms of time spent during the week, most courses are 3 credit hours. With four courses, that means about 12 hours per week spent in class. Additional time will of course be needed for homework, writing papers and exam-prep.
Certification Courses at LeaderQuest
Certification training at LeaderQuest is intensive and accelerated. We’ll take our Computer User Support Specialist program as an example, because it prepares students with enough certifications and knowledge to confidently enter the IT industry. This program includes training for four certifications: ITIL, CompTIA A+, CompTIA Security+, and CompTIA Network+. These courses take 5 days or 10 evenings each, except for A+ which is split into two courses. That gives us a total of 25 days of instruction, or 50 evenings.
For those taking the course during the day, instruction and labs comprise a 40-hour week. Each day is packed with instruction, hands-on labs, and time for questions and answers. Evening courses are spread out over twice as many days, with only 4 hours of instruction per evening. After instruction, students will need some time to review everything they’ve learned and take advantage of the additional materials offered by LeaderQuest. Most students complete their certification exams within the following month.
Cost of Training
College or Degree Program
According to LendEDU, for the 2019-2020 year, the average cost of tuition for a semester at a public 4-year in-state college or university was $5,220. For four years at that rate, one would expect to pay $41,760 for tuition. Of course, this doesn’t include other costs such as room & board, transportation, supplies and so on.
A college degree offers value that is above and beyond what certifications offer, which makes it difficult to compare these two items accurately.
Certification Courses at LeaderQuest
Our certification courses cost around $3,000 each (varies by course), with the total cost of our Computer User Support Specialist program coming in at $13,875 for five courses. That’s close to the cost of a single year at an in-state college or university! Included in the overall cost of tuition are the industry-recognized certification exam attempts.
The certifications included in our Computer User Support Specialist program do not offer the breadth and depth of knowledge that a Bachelor’s degree does, but they offer a more expedient path to employment in the Information Technology sector. As you’ll see in the next section, the tight focus of our training courses provides a huge benefit to their holders.
Most degree programs require students to take electives or general education credits to help ensure a well-rounded education. Even within their major, college graduates study a huge variety of
topics, not all of which will be useful in their career after school. General education requirements can take as much as one to two years to complete before students can really focus on technology skills.
Certification Courses at LeaderQuest
Certifications instead offer focused training designed to confirm skills in very specific areas that employers have a high demand for. These programs do not require students to take courses in other subject areas. Students are able to jump right into technology courses, each of which has a clear application and certification to show 3rd-party skills verification.
For those looking to start a career in IT as soon as possible, certifications offer a much more direct path to employment because of their increased focus.
Style of Training
College or Degree Program
Many college courses focus more on theory and the history of a subject than on its current practice. Textbooks may have been written years ago but still be in use until a new edition is released. Courses will vary in how much focus they offer on hands-on training depending on the instructor and the availability of lab facilities.
Certification Courses at LeaderQuest
All of our courses include a mixture of lecture time and hands-on labs. Labs are different for each class. In A+, you’ll be taking apart and putting back together computer hardware. Network+ and Security+ are more software focused, with students configuring network components and checking the security of connected virtual systems.
We want to make sure that our students get the experience they need, working with real computer systems and programs. We understand that it’s important for our students to get certified, but we also want to make sure that they have mastered the skills they’ll need to excel in the workplace.
Getting Hired after Training
College or Degree Program
The completion of a degree marks a huge milestone in one’s career and shows that they have the dedication and determination needed to complete their program. Degrees are respected all over the world as a sign of accomplishment and knowledge, but they don’t signify the same kind of skills-verification that a certification does. This is because certifications focus on very specific bodies of knowledge, while two graduates with Computer Science Bachelor’s degrees may have very different skill sets.
Certification Courses at LeaderQuest
One thing that many colleges lack is follow-through with students who’ve graduated. Once you’re done, you’re pretty much on your own when it comes to finding a job. At LeaderQuest, we make it our #1 priority to help you get hired in a job you’ll love. Each campus has a dedicated Career Services team that will work with you to optimize your resume, perfect your LinkedIn profile and practice interviewing. When you’re ready, we’ll connect you with our network of employer partners that are looking to hire entry-level It roles.
When applying to careers in the IT field, certifications can be a very persuasive credential. For example, if a company wants to hire a Network Engineer, knowing that a candidate has their Network+ and CCNA certifications may be valued over a degree that may or may not have covered the expertise they need. This is especially true of the IT careers in demand right now. If you look at a list of IT jobs, you’ll see certifications listed for almost every one of them. According to a survey conducted by CompTIA, 93% of hiring managers believe IT certifications are valuable in validating expertise. Not only that, but 80% of employers reward their staff for passing certification exams with an increase in salary or pay, public recognition, bonus or promotion!
Certifications vs. Degrees: Who is the Final Winner?
And the final winner is… *drumroll*
Really, we can’t say that one of these routes is superior to the other.
If you want a strong foundation and an unparalleled breadth of knowledge, a degree is the best path.
If you’re interested in quickly gaining skills and certifications that will get you employed in IT, certification training is a great option.
But did you know that at LeaderQuest you can do both?
With LeaderQuest, you don’t have to choose just one!
In 2018, the American Council on Education’s College Credit Recommendation Service (ACE CREDIT®) officially recommended 14 LeaderQuest courses for college credit. The American Council on Education (ACE), serves as the major coordinating body for the nation’s higher education institutions. Simply put, ACE CREDIT helps adults gain academic credit for courses and examinations taken outside traditional degree programs.
One can debate the merits of a degree or a particular certification endlessly, but there’s no doubt that having both a degree and the right certifications is a perfect recipe for career success! You can read more about which courses are approved and how many credits they’re recommended for on ACE’s website.
LeaderQuest also has formed a comprehensive partnership with Colorado State University-Global Campus (CSU-Global) to create career-relevant, continuing education pathways for technology professionals. This partnership includes an agreement for credit articulation, as well as a 10% tuition discount at CSU-Global for LeaderQuest students! CSU-Global is an online university, and students can attend from anywhere.
Are you interested in starting an IT career?
If you’re ready to get started in IT, LeaderQuest is a great choice. Our intensive training will quickly teach you everything you need to know to get hired in IT. Many students are employed in IT within 3 months of starting classes at LeaderQuest. Our classes are taught by expert instructors who hold the certification you’re training for. LeaderQuest covers the cost of one certification attempt per class, we also have onsite testing centers to make sitting for the exam easy and stress-free. Once you’ve completed your certifications, our Career Services team will work with you to get your resume and LinkedIn profile polished, and then connect you with local employers that are part of our Employer Partner network. That’s what makes us the experts when it comes to helping students start IT careers.
To find out more about how we can help you start an IT career, click the link below and get in touch with us!
When you think about starting a new career or advancing your career, a couple of things probably come to mind. Can I earn more money? Where is the best place to find a new job? Can anyone help me?
Depending on your situation you may or may not get the help you need in answering these questions. But why are these questions so hard in the first place?
Traditionally, those doing the hiring and those doing the teaching do not communicate effectively. Both are running businesses serving different markets. When a college helps you earn a degree, they aren’t concerned with what you can do with it or what kind of jobs are available. They leave that up to the student. At LeaderQuest, we do things a little differently.
Watch Stephen Wright, the Employment Development Manager for LeaderQuest Denver, talk about the Career Services Department, below.
The IT Employment Divide
Why is there such a divide when these two industries should be working together? The harsh reality for students attending four-year Bachelor’s or two-year Associate’s programs in Information Technology is that by the time they reach the end of their curriculum, much of the knowledge and skills developed in the early semesters become obsolete. This renders these students less desirable by employers looking for people with an understanding of the latest tools and techniques – particularly in practices that pertain to cyber intrusion detection, forensics, and ethical hacking. For some skills. the pace of change in the tech industry is making the two-year or four-year college journey less relevant. You can learn more about the differences in our blog Degrees vs. Certifications: Investing In your Future.
Institutions that focus on accelerated IT skills training, like LeaderQuest, are bound by strict employment guidelines. What does this mean exactly? To maintain our status as a training company and to be able to accept certain kinds of funding, our graduates must exceed state-set employment guidelines.
Faced with these regulations within the industry, we here at LeaderQuest had two options: we could train individuals and send them off to fend for themselves in the job market, or we could face the challenge head-on and develop a complete training-to-employment system. We decided to go with the latter.
LeaderQuest IT Training
In order to tackle this challenge we first had to align our goals with the needs of the industry. This was done by analyzing the IT industry and directly speaking with IT companies. We pinpointed what skills are in demand, what skills are most critical, and what exactly we can do to best prepare students for breaking into careers (or advancing their careers) in the IT industry.
After ensuring that our training programs and certification selection were aligned with the industry’s needs, we then had to build the bridge between students and employers. This is the purpose of our Career Services Department. This department was created to foster a symbiotic relationship between the IT industry and LeaderQuest while providing students with the optimal resources to confidently apply to and interview for their future jobs.
The Career Services Department provides a comprehensive path from professional development to employment. The process begins on the first day of training when students are introduced to their campus’ Employment Development Manager (EDM), the EDM is in charge of leading students through the Career Services process. This process is broken down into 5 steps.
The Career Services Process in 5 Steps
Step 1: Initial Evaluation Meeting
You will meet with the EDM one-on-one in order to understand your specific situation. This includes understanding your goals, experience, and desired timeline. For example, some students may be looking to be employed immediately after their first certification and some students may wait to finish their personalized program before looking for employment. It all depends on the experience and goals outlined in this first meeting.
A frequently asked question that our Denver EDM recieves on the first day of class.
Step 2: Professional Development
You’ll then meet with your campus EDM for professional development. You’ll collaborate with the EDM to develop quality resumes and cover letters while pulling together a good list of references. Throughout this step, you’ll learn about valuable resume techniques and cover letter strategies that have been developed by the LeaderQuest staff, all with the goal giving you an advantage right off the bat. A pristine resume and cover letter is crucial for standing out in the job market.
Step 3: Applying for Jobs
Once your resume and cover letter are up to professional standards, it’s time to start applying for jobs. By this time you should have an idea of what area you want to work in and what kind of company you’re looking to work for.
The EDM will then reach into their pool of jobs and look for a match. This pool of jobs comes from multiple sources: LeaderQuest’s Employment Partner Network and positions curated from traditional job websites. In addition to the EDM searching for specific positions, students will also be taught what to look for and how to apply for jobs themselves. The EDM is available for all questions and concerns throughout this process.
The LeaderQuest Employment Partner Network spans from the private sector to government entities like the Department of Defense (DoD). These employers know the LeaderQuest curriculum, they know the quality of candidates we produce, and they have found success with hiring our students. This has created a mutually beneficial relationship between these employers and LeaderQuest where they supply us with jobs and we supply them with qualified candidates.
Step 4: Interview Preparation
In this step, once interviews opportunities start to get generated, you’ll learn what it takes to execute a perfect interview. In addition to years of resume/cover letter writing, EDMs are experts at interviewing. They know what specific employers are looking for, what strategies will work best for each candidate, and they know how to coach the necessary interview skills.
“When we have an interview set up it’s go time,” Stephen Wright, EDM for the LeaderQuest Denver campus.
There’s basic coaching, like when to show up and how to dress appropriately for the interview, and then there are the higher level skills that many students are unaware of. Some of these skills include (but not limited to): questions coaching; how to respond to and ask the right questions; mannerisms, body language and how to act appropriately; and one of the most important skills, closing: how to close the interview properly in order to secure a second interview or job offer.
In addition to skills coaching, the EDM will conduct mock interviews with you in order to help boost your interviewing confidence while ironing out any interview problems that may come up.
When this step is complete you will not only have the necessary skills and confidence to land a position, but will also have have a strong foundation to build from for continued professional development and success.
Step 5: Continued Support
Once you have interviewed and gotten a position, the job of the Career Services Department is not over. We would like to hear from alumni and continue to assist them throughout their careers. LeaderQuest alumni also have lifetime access to the LeaderQuest LinkedIn Professionals groups and all of the services offered by the Career Services Department, including their job pool.
Are you ready for an IT career?
The LeaderQuest Career Services department is here to aid students in their career aspirations, as well as continue the pursuit of cohesion between employers and graduates. The goal is to adapt as the job market advances and to innovate where necessary to give LeaderQuest graduates the highest level of service and the best chance of landing their dream job.
Whether you are looking to start a career in IT or advance your career, LeaderQuest’s Career Services is the perfect partner in helping you move forward.
If you are looking to break into the industry you may be interested in our entry level Computer User Support Specialist program which will give you a glimpse into each IT field allowing you to find out which sector best suits you while providing the skills crucial for entry-level IT jobs.
Looking to advance your career or break into cyber security? LeaderQuest has you covered there as well, with a wide variety of certifications from CompTIA, EC-Council, and the Project Management Institute (PMI®). Our complete list of certifications and programs can be found here: Training Programs & Courses.
If you have decided you want to learn more about what LeaderQuest can offer you, please click the button below, fill out a contact form, and a LeaderQuest Career Adviser will contact you for a discussion about your future.
PMI, PMP, CAPM, and PMBOK are registered marks of Project Management Institute, Inc.
October is National Cyber Security Awareness Month, which was created to bring awareness to the growing cyber security threats that plague modern society. Since the evolution of the internet, almost every bit of information about us is strewn across the web, from our social curiosities, to our financial situations, all the way to our health records. Whether you like it or not you are being tracked, mapped, and monetized every time you use the internet (unless you are using a VPN which will be discussed below). With every click of your mouse and every stroke of your keyboard a virtual “you” is being stored. So with all of this information about you frolicking around the internet, what keeps you safe? Personal and commercial cyber security.
Cyber security awareness is aimed at strengthening the weakest link in the security chain: humans. No matter commercial or personal, one single human error can jeopardize important data and lead to catastrophic results. Does catastrophic seem too intense of a word to you? Jeopardizing your personal information can ruin almost every aspect of your life, from your financial security to social security. Once on the internet or the “dark web” your information can never be fully withdrawn, remaining forever and simply sold to the highest bidder or leaked to the lowest scumbag who aims to drain your accounts and steal your identity. This problem can be exponentially worse when an employee of a company falls victim to a cyber attack which leaks not just one person’s information but thousands of people’s information at once, such as the Equifax hack last year which exposed the Social Security Numbers, birth dates, addresses, and in some cases drivers’ license numbers of 143 million consumers.
It’s not all doom and gloom though! Fortunately not all who roam the internet are here to steal your information, some are here to protect you from the cyber security threats of the world. We’d like to share not only the 7 best tips to protect you on the web but also the reasons and technicalities behind each tip. We’ll give you an overview of each tip and how to utilize them as threats evolve.
Tip #1: Never Forget You’re a Target
Be aware that you will always will be a target for hackers.
This is extremely important to understand because far too often people don’t see themselves as targets which leads to unsuspecting victims and people letting down their guard. You must always stay vigilant in order to protect yourself and your information.
How serious is this problem? Here are a couple alarming statistics that you may have been unaware of.
Since 2013 there are 3,809,448 records stolen from data breaches every day, which translates to, 158,727 per hour, 2,645 per minute and 44 every second of every day.
In 2017 alone, nearly 158 million social security numbers were exposed from various breaches.
The global cost of cybercrime has now reached as much as $600 billion.
Unfilled cyber security jobs worldwide will reach 3.5 million by 2021.(Interested in becoming part of the solution? Check out our blog about starting a career in IT with certifications here.)
Tip #2: Create Strong Passwords
Your first line of defense is creating strong, memorable passwords. In other words, passwords that are hard for humans and COMPUTERS to guess but also easy for you to remember.
One of my favorite ways to do this is to use a “passphrase,” demonstrated in the comic below from xkcd.
The quote, “Through 20 years of effort, we’ve successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess,” could not be more true.
The simplest way to make a highly secure password is come up with an uncommon phrase that is unique to you and, like the comic shows, add a memorable twist. This twist can be an odd response, capital letter, or unexpected number, whatever you choose, be sure that it is also easy to remember.
For example: Say you really like fig newtons, your phrase can be “fig newtons taste figgy.” As goofy as that sounds it would actually take hundreds of years to crack and scores a 100% on strength.
Once you have created a strong password the next part of your defense is password management.
Password management is being able to manage user passwords from one centralized location (not all on a sticky note). I will lay out three different strategies for password management. Password management is not a one size fits all, so choose the one that makes sense for you. The goal is to make the password management task as simple and secure for you and your specific situation.
Option A: Use a Password Management Site
One option is to use a password management site like LastPass. Sites like this allow you to store all of your passwords in one central location that can be accessed by a single password or as recommended a “passphrase.” This master password is to be stored in only one place: your brain.
LastPass passwords will be stored as keys on each site that you register in your password bank. Once you store your passwords you will then download a browser extension for the management service you chose. This allows the manager to auto populate your password on sites automatically and away from the prying eyes of hackers.
om, strong, and unique passwords for every site you use, store them in the password manager, and only use the “passphrase” password for the manager.
Option B: Use a Secure Spreadsheet
If a password manager isn’t your style, you can create your own password bank on Google Docs on a spreadsheet. This is actually a very secure way to store your passwords because Google can require two-factor authentication when logging in from a new device. This two-factor (2FA) or multi-factor authentication (MFA) adds another layer of security to your login by requiring another verification step on top of a password. For example: you may receive a text with a pass code that you would then enter on the website.
Similar to the recommendation above, use the password generator for all the sites except Google, where you’d use a hard to crack “passphrase” password.
Pro Mini Tip: Store your spreadsheet with
a name other than “Passwords.”
Option C: Use a USB Security Key
If you don’t want to fiddle with password management sites or password generators, a USB key like Google’s
Titan Security Key is for you.It adds another layer of security to whatever site you are logging into, creating a MFA (Multi-factor authentication) which is much more secure. Not only is it much more secure but you actually need to have the key with you for access. Note: Not all websites let you use these keys.
Pro Mini Tip: Get a backup key. Once you lose a key it’s toast, so have a backup.
Tip #4: Beware of Phishing Attacks
Phishing attacks are when the attacker tries to get you to take an action that will jeopardize your information. They may get you to click on a fake website to steal you logins credentials or get you to download malicious software through an email attachment or website.
If you ever click on a link that takes you directly to a login page make sure and check the URL. It’s important to understand what to look for in a URL to make sure you are on the correct site.
You want to make sure the domain name is correct and followed by the top-level domain and then followed by the file path. If there are any additions to the original domain name, you are on the wrong page and should close it immediately. See the examples below.
In the image below you can see that this is the authentic. It has facebook.com, followed by the top-level domain, directly followed by a file path.
In this other image you can see that twitter website has been forged. Even though twitter.com is the real domain name for Twitter, the actual ending domain for this phish is all09.info.
The phishing pages may look legitimate but it is always safer close everything out, open a new window, type in the URL that is confirmed to be legitimate, and then log in.
You can test your skills at spotting a phishing websites here.
Some other warning signs that you might be on a phishing page are: misspelled words, old landing pages and unfamiliar looking pages.
Pro mini tip: When entering private information, make sure that the URL starts with HTTPS. HTTP stands for Hypertext Transfer Protocol and the “s” stands for secure. When the “s” is present that means all communications between your browser and the website are encrypted.
Tip #5: Be Careful on Public Networks
Not all networks are created equal, especially public networks. The information going to and from your device can be easily intercepted by others using the network. Find out more about public networks and their risks in this short video from the FTC.
Sometimes public networks are your only choice, especially while traveling. If you need to log on to a public network be sure to avoid banking websites and other websites that contain extremely sensitive information. Or, if you have to use a public network, secure your information by using a VPN as discussed in the next tip.
Tip #6: Use a VPN (Virtual Private Network)
A VPN is a service that lets you access the web privately and safely. It does this by routing your connection through a VPN server that protects your identity and location, and encrypts transferred data.
The destination website sees that the information is coming from a VPN and shows the VPN’s location, not the user’s IP address and location. VPNs use encryption protocols and secure tunneling techniques to encapsulate all online data transfers. They also involve integrity checks that ensure that no data is lost and that the connection has not been hijacked.
How do you implement a VPN? It’s actually very simple. There are multiple providers and just like any business there are pros and cons for each. Luckily there is a website that has tested the top VPNs and ranked them based on various factors; you can see the list here.
Tip #7: Utilize Antivirus Software
Make sure that you have an antivirus program and that it is up to date.
Antivirus software is a program or set of programs that are designed to prevent, detect, and remove viruses, and malicious software like worms, trojans, adware, and more. These terms can me consolidated under the term “malware.”
Similar to phishing, malware is something that you want to do everything you can to avoid. Malware can steal your information, delete your information, hold your information for ransom, track everything you do on your device, and even hijack your webcam; all of this without you even knowing.
How do you know if your device is infected with malware? Besides having an antivirus program that detects malware, here are some common signs that your device might be infected.
Unfamiliar icons displayed on your desktop
Frequent computer crashes
Internet traffic increases without any user action
Popup ads start showing up everywhere
Your browser keeps redirecting you
System tools are disabled
Unsolicited messages and posts start showing up on your social media/email
Files start disappearing
Your computer storage fills up without you adding any additional files
The reasons for these warning signs range from the malware using your computer to solicit ad money, to hijacking your computer’s resources, to phishing your information, all the way to directly requesting ransom money from you to get your information back.
With over 350,000 new malicious programs (malware) detected every day, it is important to have an up to date antivirus program. Antivirus companies are constantly updating software to combat the growing number of malware threats so you don’t have to.
When it comes down to it, cyber security, both personal and commercial, can be boiled down into preemptive and proactive decisions in order to protect your information as best as possible. These 7 tips were designed to give you a leg up on current threats and hopefully help prepare you for future threats. In any case it is important to remain vigilant while connected to the world wide web and implement as many as these safety techniques as possible. As the web evolves so will the threats that challenge its very integrity. The more individuals that are educated on basic cyber security techniques the better chance we have at protecting this vital tool on which we rely on every day.
Are you interested in joining the workforce and industry that actually combats online threats? From professional hackers, to infrastructure management, to entry level support positions, LeaderQuest can help you break into this industry in as swiftly as three months. This includes training, certifications, and employment services, all with goal of getting you a job as quickly as possible with the proper knowledge and skills to propel your future career for years to come.
The best part is that you can do this all around your schedule with a world class team at your back.
With an estimated shortage of 3.5 million cyber security positions by 2021, this industry offers unparalleled growth opportunity in combination with exceptional salaries. If you are thinking about a career change or are looking to start a career check out our Computer User Support Specialist program. It is designed specifically with entry level candidates in mind and helps you develop the skills that employers are looking for. Computer User Support specialists on average are making $52,810 according to the Bureau of Labor Statistics.
Want to talk to someone and see if a career in IT and Cyber Security is right for you? Click the button below and be contacted by a Career Advisor to discuss your future!
Cyber security is a thriving industry that’s so cutting-edge that employers are having trouble filling job openings. In an ISSA report titled “Resolving the Cybersecurity Workforce Shortage,” Senior Information Security Officer Kerry Ann Anderson of State Street Global Advisors put it succinctly.
“The cybersecurity field is currently experiencing a growing shortage of practitioners with over a quarter-million positions remaining unfilled in the US alone and a predicted shortfall of 1.5 million cybersecurity professionals by 2019.”
This problem is only made worse by the lack of women working in the field. According to the 2017 Global Information Security Workforce Study, only 11% of cybersecurity professionals are women. Looking only at North America, the same study finds that women make up 14% of the cyber security workforce.
We Need More Women in Cyber Security
Right now the industry has a huge demand for new workers, and we need more of them to be women! It’s not just good for teams, it’s good for business. According to a 2015 McKinsey report, companies that were “in the top quartile for gender diversity were 15% more likely to have returns above the industry mean.”
That’s why we wanted to encourage women who’re interested in this growing field and offer them some advice from women in technology or cyber security roles. Let’s take a look at 10 pieces of excellent advice for women in cyber security.
Ann Barron-DiCamillo, Vice President, Cyber Threat Intelligence & Incident Response, American Express
Embrace new work opportunities or experiences as they come to you – they might be quite outside of your ‘job duty’ but these are the kinds of events that can lead to a new and exciting career opportunities you hadn’t considered.
Also, I’d say get experience, exposure or knowledge in the five foundations to become an effective cyber analyst or operator:
Computer basics, including how computers work to virtualization and networking
Programming including Python, HTML, Java
Security basics from buffer overflows to SQL injections to the basics of finding anomalous network activities
Meg Layton, Director of Engineering, Cyber Security Services
The number one piece of advice is to be flexible. Technology moves so fast — each new innovation leads to new opportunities: opportunities previously unexplored or even unimagined. The career that I have now did not even exist when I started out in this world. If you remain flexible, you can take advantage of opportunities that come your way.
Believe in yourselves. Ask for forgiveness, not permission. Go out, build stuff, break stuff and state your ideas and opinions with confidence. And remember – those doubts and fears, they’re just in your head.
Don’t be intimidated by those who seem to know more than you. It’s very easy to techno-babble at someone and seem intelligent. Never be afraid to ask questions if you don’t understand something. It’s a great way to learn. If the person you ask can’t/won’t explain, it’s likely he/she doesn’t really understand.
Niloofar Howe, Life Member, Council on Foreign Relations
There is a lot of fodder out there about how hard it is to be a woman in technology. Ignore it. Those issues exist in most industries, especially ones that are male-dominated— law, banking, finance, etc. Human beings are flawed, and so any organization run by us will be inherently flawed. That’s okay. Don’t focus on flaws because there is no perfect organization. Instead, live at the intersection that maximizes your ability to work on things that excite you and people who inspire you. If that is in the tech sector, fantastic. We need diversity in tech— not because it’s a social good — but because diversity drives innovation, diversity drives productivity, diversity leads to better outcomes, and importantly, diversity leads to a better organizational culture.
Caroline Wong, Vice President of Security Strategy at Cobalt
Women in this field say it’s actually fun, and they’re having a good time. They are feeling they are doing meaningful and impactful work and it’s deeply satisfying to them. You don’t necessarily have to have a computer science degree to contribute
Megan Garcia, Senior Fellow New America, Director of New America CA
One of the biggest lessons we try and share via New America’s Women in Cybersecurity Project is that there are so many different types of jobs in the cybersecurity and information security fields. There are lawyers, communications people, policy experts, marketing professionals, along with engineers and [people in] more technical roles. And we know that the narrow stereotype of a guy coding in a hoodie keeps many women from thinking they might thrive in the field, when at the same time, so many companies need people and are actively trying to recruit women.
Rinki Sethi, Director of Information Security at Palo Alto Networks
When you are new, you kind of feel lost. You get most of your experience in your first job, but when you look to the left and right and nobody looks like you, you are already intimidated. If you are new to cybersecurity, whether you’re looking for technical mentorship or peer sharing, seek out those people with whom you can meet and share stories. It could be someone you are working with that you can meet with to talk through successes or challenges. Approach somebody and let them known that you’re new or mid career. It could start even as a friend, any of those people you naturally gravitate toward, or somebody in a leadership role.
Any question you ask, whether it’s in a new role, working on a new project, or asking for a raise, you are taking a risk. Because of the possible no, women tend to not ask the question. Put yourself out there, take risks. If you are a woman who is not putting yourself out there and willing to take risks, It’s on you. You have to ask yourself, ‘Why am I not asking that question? What am I afraid of? What kind of risk am I taking here?’ The worst thing that is going to happen is that someone says no.
Michele Guel, Distinguished Engineer and Chief Security Architect
When I talk to female cybersecurity professionals at industry conferences and gatherings, I often tell them to “Be bold!” Don’t be afraid to send that initial email to a company leader, go to a networking event or volunteer to be a speaker at a local school or college. The process of achieving the mission at hand – tackling the gender imbalance while elevating our leadership roles in cybersecurity – begins with us.
The best way to break stereotypes in tech is to be comfortable in your own skin. The confidence you carry allows people to focus on the merits of your opinions and contributions. To help women break into the security industry, we need more female role models to step up and show that there are no gender-specific qualities that make a cybersecurity professional great at their job. Female cybersecurity professionals who are looking to help close the gap should offer their wealth of experience to others and mentor them through the challenges of breaking into a male-dominated industry.
There is a clear need for more talent in tech and cyber security. By encouraging more diversity in tech, we get qualified individuals from different backgrounds who can help us solve the problems of tomorrow and stand against the wave of cybercrime sweeping the world. So, as Lisa Kostova said, don’t be afraid to go out, build stuff, and break stuff.
We wanted to give a big thank you to all of the women who appear on this list. You inspire us! As more and more people seek training to become cyber security professionals, we hope that more women will take the leap and join the cyber community.
Is there a woman in tech that we missed who inspires you? Let us know in the comments below!