Top 5 skill’s must needed you in cyber security field at the time 2022

Prabal Jaat
4 min readApr 7, 2022

--

I’m telling you about some very effective skill’s to get you crack CS interviews and get Job faster.

Skill 1 —

Risk management :- As more OT networks connect to IT networks, its easier for malicious actors to gain access. Introduction of new technologies across the OT industrial sector is increasing cyber risk. Improve IT OT security. Manage IT OT risk. OT Security readiness. OT response & recovery.

Cyber risk management is the process of identifying, analysing, evaluating and addressing your organisation’s cyber security threats. The first part of any cyber risk management programme is a cyber risk assessment.

Skill 2 —

System Administration :- A security systems administrator is someone who gives expert advice to companies regarding their internal security procedures and can also help to detect any weaknesses in a company’s computer network that may make them vulnerable to cyber attacks. Security systems administrators are a company’s first step in monitoring suspicious activity either within the local network or from outside internet traffic.

Security systems administrators are in charge of the daily operation of security systems, and can handle things like systems monitoring and running regular backups; setting up, deleting and maintaining individual user accounts; and developing organizational security procedures.

Skill 3 —

Virtualized security, or security virtualization, refers to security solutions that are software-based and designed to work within a virtualized IT environment. This differs from traditional, hardware-based network security, which is static and runs on devices such as traditional firewalls, routers, and switches.

In contrast to hardware-based security, virtualized security is flexible and dynamic. Instead of being tied to a device, it can be deployed anywhere in the network and is often cloud-based. This is key for virtualized networks, in which operators spin up workloads and applications dynamically; virtualized security allows security services and functions to move around with those dynamically created workloads.

Cloud security considerations (such as isolating multitenant environments in public cloud environments) are also important to virtualized security. The flexibility of virtualized security is helpful for securing hybrid and multi-cloud environments, where data and workloads migrate around a complicated ecosystem involving multiple vendors.

Skill 4 —

Think of a script for a play, or a movie, or a TV show. The script tells the actors what they should say and do. A script for a computer tells the computer what it should do or say. In the context of Bash scripts we are telling the Bash shell what it should do.

A Bash script is a plain text file which contains a series of commands. These commands are a mixture of commands we would normally type ouselves on the command line (such as ls or cp for example) and commands we could type on the command line but generally wouldn’t (you’ll discover these over the next few pages). An important point to remember though is:

Anything you can run normally on the command line can be put into a script and it will do exactly the same thing. Similarly, anything you can put into a script can also be run normally on the command line and it will do exactly the same thing.

You don’t need to change anything. Just type the commands as you would normally and they will behave as they would normally. It’s just that instead of typing them at the command line we are now entering them into a plain text file. In this sense, if you know how to do stuff at the command line then you already know a fair bit in terms of Bash scripting.

It is convention to give files that are Bash scripts an extension of .sh (myscript.sh for example). As you would be aware (and if you’re not maybe you should consider reviewing our Linux Tutorial), Linux is an extensionless system so a script doesn’t necessarily have to have this characteristic in order to work.

How do they work?

This is just a little bit of background knowledge. It’s not necessary to understand this in order to write scripts but it can be useful to know once you start getting into more complex scripts (and scripts that call and rely on other scripts once you start getting really fancy).

In the realm of Linux (and computers in general) we have the concept of programs and processes. A program is a blob of binary data consisting of a series of instructions for the CPU and possibly other resources (images, sound files and such) organised into a package and typically stored on your hard disk. When we say we are running a program we are not really running the program but a copy of it which is called a process. What we do is copy those instructions and resources from the hard disk into working memory (or RAM). We also allocate a bit of space in RAM for the process to store variables (to hold temporary working data) and a few flags to allow the operating system (OS) to manage and track the process during it’s execution.

Skill 5 —

self security :- some security the biggest part in this field because the self Security is very important to improve any System and company by you. you can learn it with your own self.

--

--

Prabal Jaat
Prabal Jaat

Written by Prabal Jaat

Let's Made Technology Fun #again | Cyber Security Researcher