EP 61: Skills-based Certification and Training with John Strand

EP 61: Skills-based Certification and Training with John Strand

Author: Kip Boyle January 7, 2022 Duration: 37:46

https://www.yourcyberpath.com/61

In this episode, we talked with John Strand (Founder of Black Hills Information Security and Antisyphon InfoSec Training) about the importance of skills-based certification and training. John’s goal is the provide world-class skills-based training to everyone at an affordable price using a unique pay-what-you-can model.

Skills-based certification is different from traditional certifications in that they do not use multiple-choice exams to test your knowledge of the material and instead require candidates to prove their knowledge through real-world, work-related exercises. These skill-based certification courses are short in duration and extremely hands-on in nature.

During this discussion, we explain the differences between ANSI-based certifications and non-ANSI certifications. The importance of certifications in general to the hiring managers and human resources teams is also discussed because large organizations rely on these ANSI-based certifications. Smaller organizations, though, like Black Hills Information Security who has under 100 employees, don’t necessarily rely on certifications to find qualified candidates.

Cyber deception was also discussed, which is a way of setting up honey tokens in your domain servers to identify hackers, attackers, and penetration testers when they try to break into your system. John provides three quick tips to implement cyber deception in your network today!

What You’ll Learn

·     The importance of skills-based certifications

·     The difference between ANSI and non-ANSI certifications

·     How to use honeytokens and canary tokens to detect an attacker quickly


Relevant Websites For This Episode

·     Black Hills Information Security (https://www.blackhillsinfosec.com)

·     Antisyphon Training (https://www.antisyphontraining.com)

·     Canary Tokens (https://canarytokens.org)

·     Try Hack Me (https://tryhackme.com)

·     Hack the Box (https://www.hackthebox.com)

·     Holiday Hack Challenges (https://www.holidayhackchallenge.com)


Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 76: Which Certification Roadmap or Path Should I Use? [not-audio_url] [/not-audio_url]

Duration: 24:54
https://www.yourcyberpath.com/podcast/76/ In this episode of Your Cyber Path, Kip and Jason discuss the world of cybersecurity certifications and how you can determine the proper path for you to follow. We bust the myth…
EP 75: The Value of University Degrees in Cybersecurity [not-audio_url] [/not-audio_url]

Duration: 32:22
https://www.yourcyberpath.com/podcast/75/ In this episode, Kip and Jason talk about the value of university degrees in the cybersecurity career. This topic does come up all the time in discussions or when people come up…
EP 74: Top Five Mistakes People Make When Negotiating [not-audio_url] [/not-audio_url]

Duration: 44:56
https://www.yourcyberpath.com/74/ In this episode, the discussion between Kip and Jason is about the top five mistakes people are making when it comes to negotiating their pay. You need to know what mistakes to avoid whe…
EP 73: Top Five Things That Will Separate You From Other Applicants [not-audio_url] [/not-audio_url]

Duration: 36:27
https://www.yourcyberpath.com/73/ In this episode, the discussion between Kip and Jason is about the top five things that will make you stand out from other applicants. These tips will definitely help you get ahead of th…
EP 72: DISC Profiles [not-audio_url] [/not-audio_url]

Duration: 35:49
https://www.yourcyberpath.com/72/ In this episode, the discussion between Kip and Jason is about DISC profiles. You need to understand how important it is to choose the right job for you based on your personality. These…
EP 69: Breaking into Cybersecurity with Nancy Hunter [not-audio_url] [/not-audio_url]

Duration: 40:26
https://www.yourcyberpath.com/69/ In this episode, the focus of discussion is what Nancy Hunter, the Vice President, Chief Information Officer, and Data Privacy Officer of the Federal Reserve Bank of Philadelphia looks f…
EP 68: Can You Demonstrate Too Much Passion for Cybersecurity? [not-audio_url] [/not-audio_url]

Duration: 33:53
https://www.yourcyberpath.com/68 In this episode, Jason and Kip are focused on how you can demonstrate true passion for cybersecurity. They discuss the six things that you must avoid as they are considered red flags by a…