The Schank Academy
Your path to a job in cyber security begins here.
Responsible for detecting and remediating threats that make it past an organization's automated protections.
Responsible for triaging, analyzing, containing, and neutralizing cyber attacks.
Responsible for analyzing technical artifacts such as computer memory and disk images to understand the nature of malware infections or find evidence of cyber crime.
Do you become completely caught up in finding solutions to difficult problems and puzzles? You don't expect someone to tell you the answer, and in fact you generally don't like simply being told; you take pride in figuring things out for yourself. You might start with a Google search, but when nothing helpful is returned, you see that as a challenge to your own problem-solving skills rather than a defeat. Once you've become immersed in solving a problem, you can't let it go until you've succeeded, and you don't stop at the first solution; you want to find the best one. If this description fits you, then Information Security may be for you.
Personal information from over 50 million Uber drivers and passengers was stolen in the Uber Breach.
Personal information from over 145 million consumers was stolen in the Equifax Breach.
Yahoo reported that the 2013 breach actually affected everyone with a Yahoo account -- 3 billion accounts.
WannaCry ransomware cryptoworm targets computers running Microsoft Windows, affects more than 200,000 computers across 150 countries worldwide, causing damages ranging in the billions of dollars. Months later, the United States, United Kingdom, and Australia declared that North Korea was behind the attack.
Only 11 of 50 states have cyber security protection on their statewide 911 systems.