• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Tim Cooke
  • paul wheaton
  • Paul Clapham
  • Ron McLeod
Sheriffs:
  • Jeanne Boyarsky
  • Liutauras Vilda
Saloon Keepers:
  • Tim Holloway
  • Carey Brown
  • Roland Mueller
  • Piet Souris
Bartenders:

Carrer in information security

 
Ranch Hand
Posts: 168
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Folks

I want to make my carrer in Information Security Services I had passed BCA (Bachlor of computer applications. Please suggest me how I can make my carrer in Information security currently I am appering in SCJP1.5 also. So please guide me how I can go in this field with the help of Java.


Thanks in advance
 
Ranch Hand
Posts: 290
Oracle Tomcat Server Java
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
You have to be specific on what you want.

Do you want security management (CISSP, CISM certifications)
Network Security (CCIE in Security )
Applications security
You can be an auditor as well (CISA)

Or may be masters in Information SecurityMsc in IS

Java will help you in application security.
Aryan
 
Gaurav Pavan Kumar Jain
Ranch Hand
Posts: 168
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thank you Aryan for your priceless advice.
 
Ranch Hand
Posts: 1282
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
  Gaurav Pavan Kumar Jain: guide me how I can go in this field with the help of Java

Obtain a copy of "Modern Cryptography" by Wenbo Mao - read it for the practical overview in the first few chapters. If you can do the math, then do so. I know someone who actually works in a related field, I asked the person my most important question. It was confirmed, how people view and respond to the security theatre is *at least* as important as what the books and courses will teach you. I suggest a preliminary study of accounting. If you can fit it in to the schedule, there are tools in accounting that are well devleoped and understood.

I have a copy of Accounting 101 standard intro text from a book-bargain table. I will read it as soon as I can fit it in. I notice a discinct split in infosec that I wish were otherwise: Those who understand computer-code vis-a-vis "Ace of Spades" workers who are very useful, but have an unworkable view of how the computer code actually works. Both of them fit into a security approach, but neither are sufficient alone. A good security program will have five or six 'rest-points' that are strong, and will continue to function with any one of the control points missing or haywire.

Study ( google ) everything that AK cites, get some idea of what it actually does. Some descriptions may try to present a pleasant view without fully disclosing actualities.
[ March 17, 2008: Message edited by: Nicholas Jordan ]
 
Gaurav Pavan Kumar Jain
Ranch Hand
Posts: 168
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thank you nicholas very much kindly guide me how I can start my studies in this regards some more advice from you any other book that i have to read which part I have to make strong.


Please guide me

thank you very much
 
Nicholas Jordan
Ranch Hand
Posts: 1282
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Gladly.

Study Java.

That may seem an overly brief answer. It is not. I have put much effort into computer studies. In all of my studies I have never found a single rich-field of information of the degree, kind, caliber and depth of Java. Java is a large, world effort in computer science that is done spontaneously by people who enjoy the work.

There are lots of products avaliable commercially, and many of them are well worth the investment for a business that needs the paticular skills and knowledge a product has. Ususally, an investment in a commercially packaged application of computer science to a definite business need allows the business to get on with their core business - the commercial software package has ( ususally ) people who can get the thing running to do the work the business wishes done.

Learning computer science is another matter. I abandoned traditional education finding the arena overly packed with what in my native linguistic is ( idiomatic ) called "degree mill" - which conveys a concept of students who are mostly interested in the degree, the prestige it brings and the order out of chaos such a system brings to the employment market.

My direct advice, respondent to your invitation, is to obtain all available information you can on Java: I have sat in on classes in the second semester in the second term of a two-year program devoted to teaching computer science at a technical institution, observing devotion to trivial matters and weighing the simplest of issues as advanced matters to be left to the experts.

Java introductory material can in reasonable effort totally outpace such a course in a matter of months. This statement skips some practical issues, but if you find my previous advice productive I can without reservation state that the most advanced work in computer science commonly shows up while studying java. Security is no exception.

Often, security is oversimplified as Cryptology. Google for "simon singh" - there you will read the work of masters, masters from all places and cultures, in every arena and skill and obtain an overview of what a carrer in information security should be guided by.
reply
    Bookmark Topic Watch Topic
  • New Topic