Journal #5

Creation of new Cybersecurity trainings

YouTube videos going over the basics of Cybersecurity

Blogs on cybersecurity incidents

Easy to read books on the importance of Cybersecurity

Real time games to prepare individuals for the Cybersecurity field

Software designed to be secure

Exploit software creation

Certifications that are beneficial

Use of further education to get ahead in the field

Root kit detection creation

Intellectual ways of thinking

Trojan horse research

Your own company

Leave a Reply

Your email address will not be published. Required fields are marked *