Papelito habla!

--Originally published at The shield of the world

So there are a lot of options to actually certificate yourself as an computer security. Why is important to have a certificate? To actually prove that you have a good amount of knowledge and that you are worth to be hired. Is like the certificates in the web pages. A prove that you can actually trust in something.

200w

So there are a lot of certificates some of the most popular are:

  1. Comp TIA Security +
  2. CEH: Certified Ethical Hacker
  3. G SEC: SANS GIAC Security Essentials
  4. CISSP: Certified Information Systems Security Professional
  5. CISM: Certified Information Security Manager

In this list provided by InfoSec, there are entry-level credentials, like Security+ and GIAC Security Essentials, as well as more advanced certs, such as the CEH, CISSP and CISM.

So as an advice from there guys getting a certification is a good bet if you actually want to advance your career in the IT field and if you are interested in specializing in security.

2004

Is important to know that there are a number of tracks a professional can take to demonstrate qualifications. Four sources categorizing these, and many other credentials, licenses and certifications, are:

  1. Schools and universities;
  2. “Vendor” sponsored credentials (Microsoft, Cisco)
  3. Association and organization sponsored credentials
  4. Governmental body sponsored licenses, certifications and credentials

Is important to know that the quality and acceptance of the IT credentials vary worldwide as you may imagine. Like passing from a Master degree, to Microsoft certification, to a list of lesser known credentials.

So, getting a certificate is a good option and probably the best is to go for a entry level known course or certification to have the quality and acceptance in every country. Probably some of them are really useful in your country because they are known, but this may not happen in other countries.

2005

Go
Continue reading "Papelito habla!"

Hello there!

--Originally published at (Not so) Random talk

Hi! Welcome to my [newly made] blog and thank you for passing by!

Let me introduce myself. My pen-name is Audray, but you can call me Ray for short. I’m new in this of blogging, so this will probably result on being an interesting ordeal.

At this point you might be asking:

-Why do you use a pseudonim?

-Why start a blog now?

Well, to answer the first question, without really answering it, is because of some personal issues. Plus it makes it kind of interesting, doesn’t it? Writing without having a real face but having a real voice (or maybe it’s just my opinion, jaja).

Answering the second question, as you might have already read at the top of this blog, I am currently an IT student, my bachelor specifically being Computer Science. This blog was made for the Computer and Information Security course, a.k.a. TC2027; taught by Ken Bauer. However, now that it is done, I might try to post about some other things too, like other projects I am working on or, who knows, maybe about some of my passions like Disney or books. For now, all I can say is:

46df33a058783a483aa94eb1f03d6a4d
Let Audray’s blogging adventure  begin! (?)

Picture from: https://s-media-cache-ak0.pinimg.com/564x/46/df/33/46df33a058783a483aa94eb1f03d6a4d.jpg

P.S.: English is not my native language so please, be kind enough to tell me if I have a spelling or grammar mistake and I’ll try to fix it ASAP.

Giph on top found at: http://i.giphy.com/pbNJFU3QLj39K.gif