Training and Technology in Cybersecurity

BLUF
This paper describes the training and technology that is needed for Cybersecurity. For the
required knowledge for cybersecurity training and technology, we need to understand how
funding impacts these.


Cybersecurity Training
To start a career in Cybersecurity, there are two ways: earn a bachelor’s degree or attend boot
camp. To have a career in Cybersecurity, you are not limited to a Cybersecurity degree, it is
possible to start in this field with a bachelor’s degree in Computer Science or Information
Systems (Webb, 2023). However, with the number of breaches increasing, Cybersecurity officials
should implement training where employees can learn guidelines for conducting investigations
properly, up-to-date trends on the current exploits and/or breaches, and any additional
information that would be beneficial for handling various cybercrimes (Collins, Sainato, & Khey,
2011).


Cybersecurity Technology
According to Surve (2023), there are five fundamental technological softwares that would be
beneficial for protecting our networks and data from any breaches and/or hackers. These five
softwares include firewalls, an intrusion detection system, private networks, encryption, and
two-factor authentication (Surve, 2023). The five fundamental softwares is only the beginning
when it comes to the many softwares that are actually used in the field of Cybersecurity. Some of
these softwares include behavioral analytics, blockchain, extended detection and response
(XDR), and zero trust (Simmons, 2023).


Funding
As technology continues to change and advance over the next few year, we are going to see
many changes in how technology is being used, what softwares can be used to make our lives
easier (e.g. using ChatGPU to write an entire paper for a class), and what training would
employees need to be informed about. With funding becoming an ever growing concern for
business, I believe that Cybersecurity officials and business need to create a balance on getting
employees the proper training and staying up-to-date on new technological advancements. On
the other hand, to stay informed on these advances, it would most likely take priority since these
softwares are needed to protect home and business networks from having data stolen by
hackers. However, with how technology is, you can not stay up-to-date on every network and
software issue. Most of the time, hackers are able to access personal data by people clicking and
viewing unauthorized websites or links that lead to a website asking for personal information.


Conclusion
In conclusion, there is a lot of information that goes into being successful in the Cybersecurity
field. To acquire a job in Cybersecurity, you can either go to bootcamp or graduate with a
bachelor’s degree. To protect a business from cybercrime, there needs to be five fundamental
softwares in place to protect data. If you work in the field of Cybersecurity, there are other
softwares needed to protect other networks and data. The training and technology can have an
impact on how to balance the funding. Training is helpful to succeed, but learning the softwares
needed to protect networks is a higher priority depending on the cost of these softwares.
Training would retrain and/or remind employees of the basic guidelines.

References
Collins, Jason D., Sainatio, Vincenzo A., & Khey, David N. (2011). Organizational data breaches
2005-2010: Applying SCP to the healthcare and education sectors. International Journal
of Cyber Criminology, 5(1), 794-810.
Simmons, Liz (2023). New technologies in cybersecurity. Cyber Degrees.
https://www.cyberdegrees.org/resources/hot-technologies-cyber-security/
Surve, Shashank (2023). 5 essential cyber security technologies every business must implement
to protect against potential threats. Linkedin.
https://www.linkedin.com/pulse/5-essential-cyber-security-technologies-every-business-sh
ashank-surve/
Webb, Holland (2023). What degree do I need for a career in cybersecurity?. Cyber Degrees.
https://www.cyberdegrees.org/resources/degree-required-for-cybersecurity-career/#:~:tex
t=Cybersecurity%20requirements%20include%20basic%20education,to%20emulate%20r
eal%2Dworld%20scenarios

Leave a Reply

Your email address will not be published. Required fields are marked *