SlideShare a Scribd company logo
1 of 15
Download to read offline
Resume Workshop and Certifications
Deidre Diamond,
Founder and CEO,
Secure Diversity and CyberSN
Nathan Chung,
Co-Founder
WiCys Colorado
Agenda
2© 2020 CyberSN. All rights reserved.
Resume Workshop
• Resume Formats
• Basic Resume Tips
• Advanced Resume Tips
• Common Resume Mistakes
• Resource Links
Cybersecurity Certifications
• Essentials
• Top Certifications
• Certifications By Functional Areas
• Tips
• Resource Links
Q&A
Resume Workshop
3
Resume Formats
4© 2020 CyberSN. All rights reserved.
Chronological
• Most common format
• Recent position listed
first
• Highlights work history
Functional
• Preferred format when
changing careers
• Focuses on skills
instead of work history
Combination
• Best of both worlds
• Combines
chronological and
functional formats
• Emphasizes skills
while showing work
history
Basic Resume Tips
5© 2020 CyberSN. All rights reserved.
• Choose the best resume format
• List only relevant positions over the past 10-15 years
• Limit to 1-2 pages
• Highlight achievements and awards
• Use professional fonts that are easy to read
• Avoid listing graduation dates
• Verify name is part of the file name
• Spell check often
Advanced Resume Tips
6© 2020 CyberSN. All rights reserved.
• Quantify performance impact with numbers
• Include keywords from the job description
• Use different resumes for different positions
• List relevant skills
• Update often
Common Resume Mistakes
7© 2020 CyberSN. All rights reserved.
• Too many pages
• Listing all jobs
• Spelling errors
• Not adjusting for specific jobs
• Not listing achievements
• Difficult to read
• Does not flow
• Does not tell a story
Cybersecurity
Certifications
8
Essentials
9© 2020 CyberSN. All rights reserved.
• Are certifications worth it?
• Fields that require certifications
• Who should pay for certifications?
• Key certifications
Top Certifications
10© 2020 CyberSN. All rights reserved.
• CISSP (ISC)²
• Security+ (CompTIA)
• CEH (EC-Council)
• CISM (ISACA)
• CISA (ISACA)
Certifications By Functional Areas
11© 2020 CyberSN. All rights reserved.
Penetration Testing
• OSCP (Offensive Security)
• GPEN (SANS)
• GWAPT (SANS)
• CEH (EC-Council)
Incident Response
• GCIH (SANS)
• GCIA (SANS)
• GMON (SANS)
• ECIH (EC-Council)
Cloud Computing
• CCSP (ISC)²
• CCSK (CSA)
Management
• CISSP (ISC)²
• CISM (ISACA)
• CCISO (EC-Council)
Audit
• CISA (ISACA)
• GCCC (SANS)
Privacy
• CIPP (IAPP)
• CIPM (IAPP)
• CIPT (IAPP)
Forensics
GCFE (SANS)
GCFA (SANS)
GREM (SANS)
CHFI (EC-Council)
Tips
12© 2020 CyberSN. All rights reserved.
• Opportunities to take exams from home
• Save money
• Bootcamps
• Practice tests
Common Certification Mistakes
13© 2020 CyberSN. All rights reserved.
• Wrong certifications
• Not meeting certification requirements
• Letting certifications expire
Resource Links
14© 2020 CyberSN. All rights reserved.
• isc2.org
• isaca.org
• eccouncil.org
• sans.org
• iapp.org
• comptia.org
• offensive-security.com
• cloudsecurityalliance.org
Q&A
15

More Related Content

Similar to Resume Workshop and Certifications

Application Source code review Services
Application Source code review ServicesApplication Source code review Services
Application Source code review ServicesUsman Khan
 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan Usman Khan
 
Improving the Quality of Existing Software
Improving the Quality of Existing SoftwareImproving the Quality of Existing Software
Improving the Quality of Existing SoftwareSteven Smith
 
Improving the Quality of Existing Software
Improving the Quality of Existing SoftwareImproving the Quality of Existing Software
Improving the Quality of Existing SoftwareSteven Smith
 
JDA: Building an Open Source Center of Excellence
JDA: Building an Open Source Center of ExcellenceJDA: Building an Open Source Center of Excellence
JDA: Building an Open Source Center of ExcellenceBlack Duck by Synopsys
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Vimal Suba
 
Forefront Identity Manager
Forefront Identity ManagerForefront Identity Manager
Forefront Identity ManagerMASIT MACEDONIA
 
Leveraging Force.com: What, Why & Hows?
Leveraging Force.com: What, Why & Hows?Leveraging Force.com: What, Why & Hows?
Leveraging Force.com: What, Why & Hows?CloudSense
 
Skill_Level_ Strider
Skill_Level_ StriderSkill_Level_ Strider
Skill_Level_ StriderTushar R
 
Why We Need Architects (and Architecture) on Agile Projects
Why We Need Architects (and Architecture) on Agile ProjectsWhy We Need Architects (and Architecture) on Agile Projects
Why We Need Architects (and Architecture) on Agile ProjectsRebecca Wirfs-Brock
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...Charley Hanania
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseAdrian Mikeliunas
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Harry McLaren
 
Network Design Webinar: The Journey of Becoming A Phenomenal Network Architect
Network Design Webinar: The Journey of Becoming A Phenomenal Network ArchitectNetwork Design Webinar: The Journey of Becoming A Phenomenal Network Architect
Network Design Webinar: The Journey of Becoming A Phenomenal Network ArchitectMohamed Radwan
 
Biz tech college canada prospectus - faculty of information technology
Biz tech college canada   prospectus - faculty of information technologyBiz tech college canada   prospectus - faculty of information technology
Biz tech college canada prospectus - faculty of information technologyAbhishek Bajaj
 
Technical guidance in SaaS Startups
Technical guidance in SaaS StartupsTechnical guidance in SaaS Startups
Technical guidance in SaaS StartupsMalinda Kapuruge
 

Similar to Resume Workshop and Certifications (20)

Application Source code review Services
Application Source code review ServicesApplication Source code review Services
Application Source code review Services
 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan
 
Improving the Quality of Existing Software
Improving the Quality of Existing SoftwareImproving the Quality of Existing Software
Improving the Quality of Existing Software
 
Experience Credentials
Experience CredentialsExperience Credentials
Experience Credentials
 
Agile Team Autonomy – Don’t Just Give It Away Make Teams Earn It
Agile Team Autonomy – Don’t Just Give It Away Make Teams Earn It Agile Team Autonomy – Don’t Just Give It Away Make Teams Earn It
Agile Team Autonomy – Don’t Just Give It Away Make Teams Earn It
 
Improving the Quality of Existing Software
Improving the Quality of Existing SoftwareImproving the Quality of Existing Software
Improving the Quality of Existing Software
 
JDA: Building an Open Source Center of Excellence
JDA: Building an Open Source Center of ExcellenceJDA: Building an Open Source Center of Excellence
JDA: Building an Open Source Center of Excellence
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
 
Technical Without Code
Technical Without CodeTechnical Without Code
Technical Without Code
 
Forefront Identity Manager
Forefront Identity ManagerForefront Identity Manager
Forefront Identity Manager
 
Leveraging Force.com: What, Why & Hows?
Leveraging Force.com: What, Why & Hows?Leveraging Force.com: What, Why & Hows?
Leveraging Force.com: What, Why & Hows?
 
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
Skill_Level_ Strider
Skill_Level_ StriderSkill_Level_ Strider
Skill_Level_ Strider
 
Why We Need Architects (and Architecture) on Agile Projects
Why We Need Architects (and Architecture) on Agile ProjectsWhy We Need Architects (and Architecture) on Agile Projects
Why We Need Architects (and Architecture) on Agile Projects
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
 
Network Design Webinar: The Journey of Becoming A Phenomenal Network Architect
Network Design Webinar: The Journey of Becoming A Phenomenal Network ArchitectNetwork Design Webinar: The Journey of Becoming A Phenomenal Network Architect
Network Design Webinar: The Journey of Becoming A Phenomenal Network Architect
 
Biz tech college canada prospectus - faculty of information technology
Biz tech college canada   prospectus - faculty of information technologyBiz tech college canada   prospectus - faculty of information technology
Biz tech college canada prospectus - faculty of information technology
 
Technical guidance in SaaS Startups
Technical guidance in SaaS StartupsTechnical guidance in SaaS Startups
Technical guidance in SaaS Startups
 

Recently uploaded

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Recently uploaded (20)

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Resume Workshop and Certifications

  • 1. Resume Workshop and Certifications Deidre Diamond, Founder and CEO, Secure Diversity and CyberSN Nathan Chung, Co-Founder WiCys Colorado
  • 2. Agenda 2© 2020 CyberSN. All rights reserved. Resume Workshop • Resume Formats • Basic Resume Tips • Advanced Resume Tips • Common Resume Mistakes • Resource Links Cybersecurity Certifications • Essentials • Top Certifications • Certifications By Functional Areas • Tips • Resource Links Q&A
  • 4. Resume Formats 4© 2020 CyberSN. All rights reserved. Chronological • Most common format • Recent position listed first • Highlights work history Functional • Preferred format when changing careers • Focuses on skills instead of work history Combination • Best of both worlds • Combines chronological and functional formats • Emphasizes skills while showing work history
  • 5. Basic Resume Tips 5© 2020 CyberSN. All rights reserved. • Choose the best resume format • List only relevant positions over the past 10-15 years • Limit to 1-2 pages • Highlight achievements and awards • Use professional fonts that are easy to read • Avoid listing graduation dates • Verify name is part of the file name • Spell check often
  • 6. Advanced Resume Tips 6© 2020 CyberSN. All rights reserved. • Quantify performance impact with numbers • Include keywords from the job description • Use different resumes for different positions • List relevant skills • Update often
  • 7. Common Resume Mistakes 7© 2020 CyberSN. All rights reserved. • Too many pages • Listing all jobs • Spelling errors • Not adjusting for specific jobs • Not listing achievements • Difficult to read • Does not flow • Does not tell a story
  • 9. Essentials 9© 2020 CyberSN. All rights reserved. • Are certifications worth it? • Fields that require certifications • Who should pay for certifications? • Key certifications
  • 10. Top Certifications 10© 2020 CyberSN. All rights reserved. • CISSP (ISC)² • Security+ (CompTIA) • CEH (EC-Council) • CISM (ISACA) • CISA (ISACA)
  • 11. Certifications By Functional Areas 11© 2020 CyberSN. All rights reserved. Penetration Testing • OSCP (Offensive Security) • GPEN (SANS) • GWAPT (SANS) • CEH (EC-Council) Incident Response • GCIH (SANS) • GCIA (SANS) • GMON (SANS) • ECIH (EC-Council) Cloud Computing • CCSP (ISC)² • CCSK (CSA) Management • CISSP (ISC)² • CISM (ISACA) • CCISO (EC-Council) Audit • CISA (ISACA) • GCCC (SANS) Privacy • CIPP (IAPP) • CIPM (IAPP) • CIPT (IAPP) Forensics GCFE (SANS) GCFA (SANS) GREM (SANS) CHFI (EC-Council)
  • 12. Tips 12© 2020 CyberSN. All rights reserved. • Opportunities to take exams from home • Save money • Bootcamps • Practice tests
  • 13. Common Certification Mistakes 13© 2020 CyberSN. All rights reserved. • Wrong certifications • Not meeting certification requirements • Letting certifications expire
  • 14. Resource Links 14© 2020 CyberSN. All rights reserved. • isc2.org • isaca.org • eccouncil.org • sans.org • iapp.org • comptia.org • offensive-security.com • cloudsecurityalliance.org