Help choosing a career path in IT Security

5 pts.
Tags:
Network security
Network Security Management
Oracle security
SAP security
Security careers
Hi, I need expert advice on which aspect of security to major in. I have a background in engineering, from which i switched to Oracle database. Havent worked with the oracle Database learned and the certification gained as it was tough getting the job.I am doing  my Msc in Information Security because I love security stuffs, even anything security thrills me (my partner can testify to this, of which she was the one that advised me to go for what I enjoy doing).
Going deeper in the Msc having learnt Web application, Sys App, Cryptology etc.
I will love to do something related to ERP Security, expert and indiviual advice highly needed.
I need expert advice as to which part to go in the broad security field.
Thank you 


Software/Hardware used:
Linux,Mac

Answer Wiki

Thanks. We'll let you know when a new response is added.

A few good IT security paths are 1) the CCNA / CCNP / CCIE Security from Cisco , 2) the prestigious CISSP security certification or 3) a little bit of both.

The Cisco route covers a bit of networking, which you should understand if you’r to be the one protecting it. The CISSP is more of a “experienced-based” cert, as the prerequisites to even TAKING the test are pretty stringent.

Either, or both, path will give you a decent skill set and take you far in the security realm…

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Subhendu Sen
    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It includes the followings.... Confidentiality; Authenticity; Availability; Integrity. For better info, please link Here For Information Security Certification for IT Security Thanks--
    28,600 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following