Thursday, April 9, 2026

The Impact of AI on Digital Sovereignty

 Artificial intelligence (AI) is reshaping how organizations operate, compete, and innovate. From predictive analytics and automation to generative AI and decision support, AI is becoming deeply embedded in enterprise workflows. The recent 451 Research Voice of the Enterprise (VotE) Agentic AI study revealed that over a third of enterprises (34%) have embedded agents already in use and the vast majority (73%) expect to have them in place within twelve months. But as adoption accelerates, AI is also forcing enterprises and governments to confront a critical question: who truly controls the data, systems, and intelligence powering these technologies?


Share:

STARDUST CHOLLIMA Likely Compromises Axios npm Package

 


On March 31, 2026, a threat actor used stolen maintainer credentials to compromise the widely used HTTP client library Axios Node Package Manager (npm) package and deploy platform-specific ZshBucket variants. CrowdStrike Counter Adversary Operations attributes this activity to STARDUST CHOLLIMA with moderate confidence based on the adversary’s deployment of updated variants of ZshBucket (malware uniquely attributed to STARDUST CHOLLIMA) and overlaps with known STARDUST CHOLLIMA infrastructure. 

ZshBucket can be used to target Linux, macOS, and Windows systems; previously, only macOS variants of ZshBucket had been observed. The observed macOS variant in this case extensively reuses code from previous instances, including function names. All variants retain characteristics of previous instances, including how it profiles the user and host of the operating system, and how it sends the collected information.

The adversary made the following significant updates to the functionality and messaging protocol in the ZshBucket instance deployed in this incident compared to previous variants:

  • Implemented a common JSON-based messaging protocol for all platform-specific instances
  • Implemented commands that enable the operator to inject binary payloads, execute arbitrary scripts and commands, enumerate the file system, and remotely terminate the implant; these commands replace previous instances’ simple download and execute functionality

Related Infrastructure

The domain sfrclak[.]com — hosted at 142.11.206[.]73 and later used as a command-and-control (C2) address — shares a host services banner hash (c373706b3456c36e8baa0a3ee5aed358c1fe07cba04f65790c90f029971e378a) with two additional IP addresses: 23.254.203[.]244 and 23.254.167.216. The IP address 23.254.203[.]244 is a known STARDUST CHOLLIMA IP address first observed in December 2025, and 23.254.167[.]216 was previously used as a C2 server for FAMOUS CHOLLIMA’s InvisibleFerret malware in May 2025. The domain is also registered on the Hostwinds hosting provider, consistent with STARDUST CHOLLIMA’s previously observed operations.

Assessment

CrowdStrike Intelligence attributes this activity to STARDUST CHOLLIMA with moderate confidence based on the use of an updated ZshBucket instance — malware uniquely attributed to STARDUST CHOLLIMA — as well as infrastructure overlaps with STARDUST CHOLLIMA’s previous operations. However, the infrastructure also overlaps with FAMOUS CHOLLIMA operations, precluding a higher confidence assessment. 

DPRK-nexus adversaries frequently share infrastructure, and FAMOUS CHOLLIMA has historically deployed DPRK-associated tooling and has extensively abused npm repositories in their operations. As such, FAMOUS CHOLLIMA could be responsible for this incident. However, the updated ZshBucket variants deployed in this supply chain compromise are more technically advanced than the malware FAMOUS CHOLLIMA typically uses, and this incident is more likely attributable to STARDUST CHOLLIMA. 

The intended targets of this compromise are unclear. The Axios npm package is a commonly used HTTP client library that is downloaded more than 100,000 times per week. STARDUST CHOLLIMA’s operations prioritize currency generation and regularly target cryptocurrency holders, and the adversary has also conducted widespread supply chain compromises impacting fintech companies’ npm and PyPi repositories. Based on these factors, CrowdStrike Counter Adversary Operations assesses the adversary’s motivation probably aligns with this currency generation objective. 

Since the end of Q4 2025, STARDUST CHOLLIMA’s operational tempo has surged and has continued at this pace. This supply chain attack leveraging updated ZshBucket variants is further evidence that the adversary intends to scale their operations in the near term.

Share:

Forensic Accountant: How to Become a Forensic Accountant

 In an intricate global economy that relies more and more heavily on technology with every passing year, the demand for forensic accountants is expected to grow. But is it the right field for you? What sorts of tasks will you be responsible for performing, what education requirements will you need to complete, and what sort of job outlook or earning potential can you expect in the coming decade? This article answers all of these questions and more so that you can determine whether a forensic accounting degree program might be compatible with your interests, goals, and skills.

Share:

Wednesday, April 8, 2026

Essential Skills and Career Paths for Today’s Cybersecurity Professionals

 Cybersecurity threats touch almost every organization with data to protect. As work, school, banking, and even healthcare move online, the demand for professionals who can defend systems and information has surged, and it isn’t slowing down.

Recent estimates suggest a global cybersecurity workforce gap of about 4.8 million professionals, indicating that organizations worldwide still don’t have enough people to manage their cyber risk. ISC2 In the United States, the Bureau of Labor Statistics (BLS) projects employment of information security analysts to grow by nearly a third from 2024 to 2034, much faster than the average for all occupations (Bureau of Labor Statistics). Tools like CyberSeek show hundreds of thousands of cybersecurity job postings nationally in a typical year.

Those are strong signals that cybersecurity can offer long-term career stability, competitive pay, and room to grow, if you build the right mix of technical skills, soft skills, and experience. This guide brings together National University’s content on cybersecurity skills, career paths, ethical hacking, education, and how to break into the field, so you can see the full picture in one place.

Key Insights for Breaking Into Cybersecurity

  • Cybersecurity demand is surging: with a global workforce gap of 4.8 million and U.S. job growth projected at 29% through 2034, the field offers exceptional stability and earning potential.
  • Success requires both technical and soft skills: professionals must master networking, operating systems, cloud, scripting, and security tools alongside communication, teamwork, ethics, and business awareness.
  • Clear career pathways exist for beginners and career changers: starting with IT fundamentals and feeder roles, progressing to SOC analyst or junior pentester positions, and advancing to engineering, architecture, or leadership.
  • Degrees and certifications complement each other: degrees build structured, comprehensive knowledge, while certifications validate specialized skills in areas like cloud, DFIR, or ethical hacking.
  • Hands-on experience accelerates growth: labs, home environments, CTFs, portfolios, and real-world practice help professionals stand out and prepare for advanced specialization.
man in server/network room working on server rack

What Do Cybersecurity Professionals Actually Do?

Cybersecurity is the set of practices, tools, and policies used to protect systems, networks, devices, and data from attacks, damage, or unauthorized access. In practice, that can mean:

  • Monitoring networks for suspicious activity
  • Hardening systems and applications against known vulnerabilities
  • Testing defenses by trying to break them (as an ethical hacker or penetration tester)
  • Investigating incidents and restoring affected systems
  • Advising leaders on risk, compliance, and long-term strategy

Cyberattacks can range from phishing and ransomware to large-scale data breaches and disruption of critical infrastructure. Cybersecurity professionals help organizations move from a reactive posture (“clean up after an attack”) to a proactive one (“prevent, detect, and respond early”).

You’ll find cybersecurity roles across many sectors:

  • Technology and finance: banks, payment processors, fintech companies
  • Healthcare: hospitals, insurers, electronic health record providers
  • Government and defense: federal agencies, state and local governments, contractors
  • Education, retail, and manufacturing: protecting student records, customer data, and industrial systems
  • Small and mid-sized businesses: who increasingly face similar threats with fewer in-house resources
Couple leaving their home

Is a Cybersecurity Career Worth It?

Information security analyst roles are projected to grow roughly 29% from 2024 to 2034, according to BLS employment data, far outpacing the average for all occupations. This rapid growth reflects a broader talent shortage, with ISC2 estimating a global gap of 4.8 million cybersecurity professionals. In the United States alone, CyberSeek reports more than 450,000 cybersecurity job postings over the past 12 months, underscoring the sustained demand for skilled workers in this field.

Competitive salaries

  • Nationally, the median annual wage for information security analysts was about $124,910 in May 2024. Bureau of Labor Statistics
  • In California, information security analysts earned a mean annual wage of about $140,730 as of May 2023. Bureau of Labor Statistics

Compensation varies by industry, region, and level of responsibility, but cybersecurity is generally considered a high-earning tech pathway.

Clear pathways for career changers

BLS notes that many information security analyst roles require a bachelor’s degree and less than five years of related experience, making the field especially accessible for those transitioning from IT, networking, military service, or other technical backgrounds. National University’s student stories reflect this pathway, showcasing individuals who first built IT or military experience, then strengthened their credentials with certifications, completed a bachelor’s or master’s degree in cybersecurity, and ultimately advanced into analyst, engineer, or even leadership roles.

Daily work with real impact

From the “Reasons to Consider a Career in Cybersecurity” article: this isn’t just about firewalls and passwords. Cybersecurity professionals help protect:

  • Patient records and medical devices
  • Financial data and payments systems
  • Intellectual property and trade secrets
  • Public utilities and critical infrastructure

If you want a career where your work meaningfully reduces risk and protects people, cybersecurity offers that sense of purpose.

man in dark room lit up by computer screen looking to his left

Cybersecurity Career Paths and Specializations

Cybersecurity career paths can be understood along two dimensions: your level of responsibility and the technical specialization you choose to pursue. Early in your career, you might start in roles such as an information security analyst, a junior security engineer, a SOC analyst, an IT auditor with a security focus, or a junior penetration tester. As you gain experience, opportunities expand into mid-level positions like cybersecurity engineer, consultant, ethical hacker, incident responder, DFIR specialist, or cloud security engineer.

With further advancement, many professionals move into senior or leadership roles, including cybersecurity architect, director of information security, GRC leader, or even CISO. As responsibilities increase, the focus naturally shifts from hands-on technical tasks and incident response toward broader strategy, risk management, and organizational leadership.

Five major cybersecurity pathways

  1. Network Security: Securing routers, switches, firewalls, VPNs, and traffic patterns while designing segmented, resilient networks that limit the spread of attacks. This pathway often involves continuous monitoring and updating of network defenses to stay ahead of evolving threats.
  2. Cloud Security: Protecting workloads in AWS, Azure, and GCP by managing identities, encryption, logging, and secure configuration at scale. As organizations rapidly shift to cloud environments, specialists in this area help ensure that cloud-native architectures remain compliant and resilient.
  3. Application Security: Helping developers write secure code by reviewing designs, performing code reviews, and running security testing throughout the software development lifecycle. This role emphasizes collaboration with engineering teams to prevent vulnerabilities before applications are deployed.
  4. Critical Infrastructure Security: Safeguarding power grids, transport systems, water facilities, and other industrial control systems that run essential services. Professionals in this area work with both traditional IT and specialized operational technology (OT) environments, where downtime can have significant real-world consequences.
  5. Internet of Things (IoT) Security: Managing the risks associated with connected devices, sensors, and “smart” equipment that often have limited built-in protections. IoT security specialists address challenges created by large-scale deployments, long device lifecycles, and complex supply chains.

Education, Degrees, and Certifications

While certifications and hands-on experience are essential, a degree still offers structure, depth, and credibility that can be difficult to replicate through self-study alone.

Why Degrees Still Matter

A degree in cybersecurity, computer science, information technology, or a related field gives students a comprehensive foundation in the technologies and concepts that underpin modern security work. Through structured coursework, you move through operating systems, networking, databases, cloud environments, and core security principles in a logical sequence, ensuring you develop a well-rounded technical skill set rather than isolated knowledge pockets. Programs also offer hands-on labs, simulations, and opportunities to practice in safe, controlled environments that mirror real-world scenarios.

Beyond technical skill-building, degree programs strengthen essential soft skills such as technical writing, communication, teamwork, and project leadership, skills that employers consistently rank among the most valuable in the cybersecurity workforce. Degrees also provide access to faculty with industry experience, academic advisors, and professional networks, all of which help students navigate career decisions and stay aligned with employer expectations. Most importantly, a degree signals to hiring managers that you have completed a vetted, comprehensive curriculum that prepares you for entry-level or mid-level cybersecurity roles.

National University’s Cybersecurity Degree Pathways

National University offers two cybersecurity degree options designed to serve students at different stages of their career journey. The Bachelor of Science in Cybersecurity prepares students for roles such as security analyst, network defender, and incident responder. The curriculum covers the core pillars of security work, including Windows and Linux administration, cloud computing, networking fundamentals, ethical hacking concepts, and security management. Classes emphasize applied learning, helping students build both confidence and competence through hands-on labs and real-world case studies.

For students looking to advance, the Master of Science in Cybersecurity offers the opportunity to specialize in areas such as digital forensics, network defense, and advanced threat analysis. Graduate-level coursework is designed to deepen technical expertise while also developing the strategic thinking, leadership skills, and policy awareness needed for higher-level roles such as cybersecurity engineer, security architect, or GRC leader. The program supports working professionals with flexible online formats and instructor guidance tailored to real-world challenges.

Together, these degree paths support learners whether they are entering cybersecurity for the first time, moving from IT or military backgrounds into security, or preparing for leadership roles in the field.

Certifications: Stacking Credentials Strategically

While a degree provides broad and deep knowledge, certifications offer targeted validation of specific skills. A common strategy is to approach certifications in tiers:

  • Entry-level certifications like CompTIA A+, Network+, Security+, Linux+, and Cloud+ help new professionals demonstrate foundational competence in IT support, networking, security basics, and cloud essentials.
  • Mid- to senior-level certifications such as CySA+, CASP+, CISSP, CISM, CEH, and CCSP help professionals specialize in security analysis, ethical hacking, cloud security, or leadership tracks.

Students and career changers don’t need all of these credentials. Instead, the most effective approach is to choose certifications that align with your desired pathway, whether that’s cloud security, digital forensics, GRC, penetration testing, or incident response.

woman in server room pointing at screen

Hard (Technical) Skills for Cybersecurity

Succeeding in cybersecurity starts with a strong technical foundation. Whether you’re monitoring networks, responding to incidents, or designing secure systems, you’ll rely on a core set of practical, hands-on skills every day. These hard skills form the backbone of cybersecurity work and help you understand how systems operate, where vulnerabilities exist, and how threats can be prevented or contained.

1. Operating systems and system administration

  • Administering Windows and Linux systems
  • Understanding how operating systems manage processes, memory, and file systems
  • Hardening hosts: patching, configuration baselines, access control, and logging

2. Networking and cloud computing

  • TCP/IP, routing, switching, subnets, VLANs, and VPNs
  • Common protocols (HTTP/S, DNS, DHCP, SMTP, etc.)
  • Designing and evaluating network architectures (segmentation, DMZs, zero-trust concepts)
  • Cloud platforms (AWS, Azure, GCP): identity and access management, security groups, key management, logging, and monitoring

3. Programming and scripting

You don’t have to be a full-time software engineer, but most cybersecurity professionals benefit from:

  • Scripting with Python, PowerShell, or Bash
  • Understanding common languages like Java, C/C++, or C# at a conceptual level
  • Writing small tools to automate tasks, parse logs, or test APIs

4. Databases and data security

  • Working with SQL and common database platforms
  • Understanding how data is stored, encrypted, backed up, and recovered
  • Implementing role-based access control and data classification

5. Security tools and platforms

  • Security information and event management (SIEM) systems
  • Endpoint detection and response (EDR) tools
  • Vulnerability scanners
  • Web application firewalls and intrusion detection/prevention systems

6. Specialized security domains

Depending on your path, you may dive deeper into:

  • Penetration testing and ethical hacking: exploit development, web app testing, red teaming
  • Application security: secure software development lifecycle, code review, threat modeling
  • Cloud security: cloud-native security controls, infrastructure-as-code security
  • Digital forensics and incident response (DFIR): evidence collection, timeline analysis, malware analysis
  • Threat intelligence and hunting: researching adversaries, detecting subtle patterns in telemetry
  • Cryptography: encryption basics, key management, TLS, and certificate management
  • Risk assessment and management: frameworks such as NIST CSF, ISO 27001, CIS Controls
woman looking down at textbook studying in her home

Soft Skills Needed for Cybersecurity

While technical mastery is essential, cybersecurity is ultimately a people-driven profession. You’ll often collaborate with teams, translate complex risks for decision-makers, and make judgment calls in high-stakes situations. Soft skills, communication, critical thinking, teamwork, and ethical decision-making play a major role in shaping how effectively you can apply your technical knowledge and support an organization’s broader security goals.

1. Research and continuous learning

Cybersecurity moves quickly. New vulnerabilities, tools, and attack techniques appear constantly. You’ll need to:

  • Read advisories, blogs, and threat reports
  • Experiment in labs or sandboxes
  • Pursue ongoing education, certifications, and micro-credentials

A sustained commitment to learning is one of the clearest predictors of long-term success in this field.

2. Communication (written and verbal)

Cybersecurity professionals regularly:

  • Write reports, findings, and recommendations
  • Present risk to non-technical leaders
  • Collaborate with developers, IT, legal, and business units

You should be able to explain complex issues in clear, concise language and adjust your message for technical and non-technical audiences.

3. Collaboration and teamwork

Most security work is team-based. Even penetration testers and incident responders rarely operate alone. Employers value people who can:

  • Work cross-functionally
  • Share credit, accept feedback, and contribute to a shared mission
  • Build relationships with stakeholders who may not initially prioritize security

4. Leadership and influence

You don’t need “manager” in your title to lead. Important leadership behaviors include:

  • Owning incidents and seeing them through to resolution
  • Influencing policy and process changes
  • Mentoring junior staff or peers
  • Advocating for security in planning and design discussions

Hiring managers often look for leadership potential, not just technical depth.

5. Business and risk awareness

Effective cybersecurity professionals understand:

  • How their organization makes money or delivers value
  • Which systems and data are most critical
  • How to balance security, usability, and cost

This helps you frame security work as a business enabler rather than just a cost center.

6. Ethics and professional judgment

Especially in roles like ethical hacking, incident response, and digital forensics, you’ll handle sensitive data and powerful tools. Employers expect:

  • Strong ethical standards
  • Respect for privacy and data protection laws
  • Careful documentation and chain-of-custody practices
Master of Science in Computer Science Program Page

How to Start a Career in Cybersecurity (Even Without Experience)

Breaking into cybersecurity is more achievable than many people realize. With the right mix of foundational knowledge, strategic role choices, and hands-on practice, you can build a strong pathway into the field, even if you’re starting from scratch. The steps below offer a practical roadmap for entering cybersecurity confidently and sustainably.

Step 1: Build IT fundamentals

A successful cybersecurity career starts with understanding how computers, networks, and operating systems actually work. Building this foundation helps you recognize vulnerabilities and understand the systems you’ll eventually be responsible for protecting.

  • Computer hardware and operating systems
  • Networking (at least to the level of Network+)
  • Scripting fundamentals (Python or PowerShell)

You can develop these skills through self-study, online training, certifications, or a structured degree program.

Step 2: Consider feeder roles

Many cybersecurity professionals begin in closely related IT positions. These “feeder roles” give you real-world experience with systems, troubleshooting, and organizational workflows, skills that directly translate into security work.

  • Help desk or desktop support
  • Networking (network administrator, network engineer)
  • Systems engineering (Windows or Linux admin)
  • Software development
  • Financial and risk analysis
  • Security intelligence and operations roles

These jobs help you understand how technology operates day to day, making your transition into cybersecurity smoother and more effective.

Step 3: Target entry-level cybersecurity roles

Once you have the basics, you can start pursuing early-career security positions. These roles introduce you to monitoring, triage, and hands-on defense work while letting you learn from experienced analysts and engineers.

  • Security / SOC Analyst
  • Junior Penetration Tester
  • IT Auditor (with a security focus)
  • Junior Cloud or Network Security Engineer

Pairing your experience with one or two entry-level certifications, such as Security+, Network+, or a beginner cloud certification, helps demonstrate that you’re ready for these roles.

Step 4: Build a portfolio and practice environment

Employers love to see proof that you can apply skills in the real world. Creating a portfolio or lab environment shows initiative and gives you space to experiment, problem-solve, and document what you’ve learned.

  • A home lab or virtual lab environment
  • Participation in CTFs, hackathons, or security competitions
  • Write-ups of vulnerabilities you’ve safely tested in legal practice environments
  • Contributions to open-source security tools or documentation

These examples signal practical ability and distinguish you from other candidates with similar credentials.

Step 5: Specialize and level up

As you gain experience, the next step is to narrow your focus to an area that aligns with your interests and strengths. Specializing allows you to develop deeper expertise and move into more advanced, higher-impact roles.

  • Focus on an area that interests you (cloud, appsec, DFIR, ethical hacking, GRC)
  • Pursue mid-level certifications aligned to that path (e.g., CySA+, CISSP, CEH, CCSP)
  • Seek projects that stretch your skills (incident response, architecture reviews, red-team assessments, compliance initiatives)

Specialization is where many professionals begin shaping long-term career trajectories, from technical leadership to niche security domains.

man kneeled down in server room looking up at rack holding tablet

What Makes a Good Cybersecurity Professional?

Succeeding in cybersecurity requires more than technical skill; it demands curiosity, discipline, and the ability to translate complex problems into clear, actionable insights. The strongest professionals blend deep technical understanding with sound judgment, ethical awareness, and the communication skills needed to influence decisions across an organization. When these qualities come together, they form the foundation of a resilient and effective cybersecurity career.

  • Master the essentials: networking, operating systems, scripting, security tools
  • Communicates clearly: to executives, peers, and non-technical colleagues
  • Thinks like both attacker and defender: understanding how systems can be misused and how to reinforce them
  • Keeps learning: adopting new tools, frameworks, and threat intelligence
  • Acts ethically: handling sensitive data and powerful access responsibly
  • Connects security to business goals: making the case for investments in a way leaders understand

Formal education, such as National University’s bachelor’s and master’s programs in cybersecurity, can accelerate that journey by combining technical depth, hands-on labs, and soft-skill development, while flexible online formats help working professionals and career changers stay on track.

Share:

How to Become a Penetration Tester

 man in dark room lit up by computer screen working as a Penetration Tester looking to his left

The cybersecurity industry continues to expand rapidly, creating diverse and rewarding career opportunities for technical professionals. Penetration testing has emerged as one of the most in-demand and well-compensated specializations within this growing field. As organizations invest more in their security posture, penetration testers and professionals who simulate cyberattacks to identify system vulnerabilities find themselves with abundant job prospects, competitive salaries, and engaging work that continuously evolves with technology. For those with technical aptitude and problem-solving skills, this career path offers both professional growth and the satisfaction of helping protect digital assets.

Are you considering a career in cybersecurity? Becoming a penetration tester offers the opportunity to combine technical expertise with problem-solving skills in a rapidly growing field. However, it’s important to understand that this is not an entry-level position. The role is both challenging and rewarding, requiring a deep understanding of networks, operating systems, and cybersecurity tools. Let’s explore the comprehensive pathway needed to become a successful penetration tester.

Master of Science in Computer Information Systems Program Page

What is Penetration Testing?

Penetration testing, or pen testing, is a controlled process in which cybersecurity professionals simulate cyberattacks on an organization’s systems, networks, and applications to identify vulnerabilities before they can be exploited in a real attack. By proactively assessing security weaknesses, penetration testing helps organizations strengthen their defenses, protect sensitive data, and maintain compliance with industry regulations. Pentesters operate within predefined boundaries and report their findings to help organizations remediate issues and bolster their overall cybersecurity so they are prepared for legitimate threats.

Different types of penetration testing examine specific aspects of an organization’s infrastructure; together, their results provide a comprehensive picture of the organization’s security resilience:

  • Network penetration testing evaluates the security of internal and external network systems, identifying weaknesses such as open ports or misconfigured firewalls.
  • Web application testing targets vulnerabilities in websites and APIs, ensuring secure handling of user data.
  • Wireless testing examines wireless networks to prevent unauthorized access.
  • Social engineering testing evaluates the human element by simulating phishing or other tactics to assess employee awareness and response to cyber threats.

Educational Requirements to Become a Pentester

A bachelor’s degree in computer scienceinformation systemscybersecurity, or a related field is a common starting point for aspiring penetration testers. For newcomers to the field, a degree provides essential foundational knowledge and theoretical understanding of key concepts. For those already working in IT or entry-level security positions, pursuing a relevant degree can enhance existing skills, provide formal credentials, and open doors to advancement opportunities.

At National University, our undergraduate programs provide a strong foundation in essential technical skills and concepts that put you on the path toward professional success. Relevant coursework includes classes in networking, programming, operating systems, and cybersecurity fundamentals, which equip you with the knowledge to understand and secure complex information systems. Additionally, NU degree programs offer opportunities to engage in hands-on projects, labs, and internships that simulate real-world scenarios, preparing you for practical challenges in cybersecurity.

A strong educational background not only sets the stage for a career in penetration testing but also opens doors to a wide range of technology professions, such as network security analyst, cybersecurity consultant, or systems administrator. An advanced degree can be a valuable investment if you aim to deepen your expertise and enhance your credentials. NU’s master’s programs in cybersecurity, information technology, or computer science offer specialized knowledge and research opportunities. At the same time, a Master’s in Business Administration (MBA) can prepare you for cybersecurity leadership roles across various industries.

However, it’s crucial to understand that successful penetration testers must supplement formal education with extensive hands-on practice, whether they’re new to the field or seasoned IT professionals seeking to specialize.

Google Cybersecurity cert

Essential Technical Skills

A career as a penetration tester requires a solid foundation in technical abilities and knowledge that teaches you to identify and exploit vulnerabilities effectively. Consider some of the key skills you’ll develop throughout your education:

  • Programming and scripting skills are essential for customizing tools and writing exploits. Learning and becoming fluent in programming languages such as Python, C, and Java is essential for customizing tools and writing exploits. Mastering scripting languages like Bash and PowerShell is essential for automating tasks and navigating various system environments. These skills require regular practice through personal projects, CTF competitions, and building your own tools.
  • Networking and system administration are other cornerstones of pentesting expertise. Having a deep understanding of networking protocols, including TCP/IP, DNS, and HTTP, is essential for analyzing traffic and identifying weaknesses. Knowledge of firewall configurations, server management, and operating systems (Windows, Linux, and macOS) is also critical for simulating real-world attack scenarios and addressing potential security gaps.
  • Facilities with common penetration testing tools are also critical. Metasploit, Nmap, Burp Suite, and Wireshark are indispensable for tasks such as vulnerability scanning, network mapping, and packet analysis. You’ll gain proficiency with these tools during your academic studies and learn how to apply their framework to your professional practice as a pentester. You must practice not just using these tools, but understanding their limitations, automating common tasks, and knowing when to try alternative approaches.
woman wearing a headset working on a computer science degree

Earning certifications is another important step toward establishing your credentials as a penetration tester and showcasing your expertise and commitment to the field. Certifications can also significantly enhance your career prospects by validating your skills and demonstrating your ability to meet industry standards in penetration testing and cybersecurity. Among the most recommended certifications are the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), and GIAC Penetration Tester (GPEN).

The HTB Certified Penetration Testing Specialist certification stands out for its highly practical approach to assessment. Unlike traditional certifications, HTB CPTS requires candidates to complete all modules in the “Penetration Tester” job-role path before even qualifying for the exam. Each module includes hands-on skills assessments that must be completed without provided answers, ensuring continuous evaluation throughout the learning journey.

The certification exam itself simulates real-world conditions, requiring candidates to perform actual web, external, and internal penetration testing activities against a realistic Active Directory network. There are no multiple-choice questions – just practical challenges that require outside-the-box thinking and the ability to chain multiple vulnerabilities together, just as in actual penetration testing engagements.

The Offensive Security Certified Professional (OSCP) certification, provided by Offensive Security, focuses on hands-on penetration testing skills through practical, real-world scenarios. Known for its rigorous 24-hour practical exam, OSCP challenges candidates to exploit vulnerabilities, navigate network environments, and document findings effectively. Known for its rigorous 24-hour practical exam, OSCP challenges candidates to exploit vulnerabilities, navigate network environments, and document findings effectively. With its infamous “Try Harder” philosophy and high failure rate—often requiring multiple attempts even from experienced security professionals—the OSCP is considered one of the most mentally and technically demanding certifications in cybersecurity. This certification is highly regarded in the industry and demonstrates your advanced technical proficiency and problem-solving abilities.

The GIAC Penetration Tester (GPEN) certification, administered by the Global Information Assurance Certification (GIAC) body, emphasizes advanced penetration testing methodologies and techniques. It covers areas such as reconnaissance, exploitation, and post-exploitation processes. GPEN certification is important to consider as you aim to deepen your expertise and gain recognition for your ability to conduct thorough and effective security assessments.

man kneeled down in server room looking up at rack holding tablet

How to Gain Practical Experience

As an aspiring penetration tester, gaining practical experience is essential to building your skills and confidence. Practical, hands-on learning in the following ways not only reinforces your theoretical knowledge, but also prepares you to tackle real-world cybersecurity challenges effectively:

  • Internships and entry-level positions in IT or cybersecurity are excellent starting points. Working as a help desk technician, network administrator, or junior security analyst can expose you to the fundamentals of system management and network security. Internships with cybersecurity teams are particularly valuable, as they can offer firsthand experience with security tools, incident response, and vulnerability assessment.
  • Labs and practice platforms provide immersive opportunities to sharpen your skills. Online platforms like Hack The Box and TryHackMe, as well as Capture the Flag (CTF) competitions, offer realistic scenarios where you can solve challenges, exploit vulnerabilities, and apply penetration testing techniques in a safe and controlled environment. They also help you build a portfolio of completed tasks to showcase your abilities to potential employers. Start with a structured learning path if you’re new to cybersecurity. TryHackMe’s “Junior Penetration Tester” learning path provides an excellent starting point for beginners.
  • Building a home lab is another powerful way to practice and experiment. Set up virtual machines and networks using tools like VirtualBox or VMware to simulate different operating systems and problem-solve with penetration testing tools. A home lab environment allows you to explore, fail, and learn in a risk-free space, helping you develop the technical expertise and creativity needed to succeed as a pentester.
Elizabeth V., Class of 2023

Job Search and Career Growth

The job search and career growth process for penetration testers is as much about building connections and credibility as it is about mastery of technical skills. Combining a relevant degree, such as one in cybersecurity, with active engagement in the professional community can unlock a wide range of opportunities as you advance in the field.

Networking is essential for discovering penetration testing opportunities, as many positions are filled through professional connections rather than public postings. Attend specialized cybersecurity conferences such as DEFCON, Black Hat, and BSides. Participate actively in communities like the OWASP chapters, local cybersecurity meetups, and online forums. Build relationships with professionals already working in penetration testing roles who can provide mentorship and job referrals.

Building relationships with experienced professionals can also lead to mentorship opportunities, valuable advice, and potential job referrals. When searching for job opportunities, aim for roles with titles like “penetration tester,” “ethical hacker,” or “security consultant.” Entry-level positions in cybersecurity, such as vulnerability analyst or junior penetration tester, can serve as stepping stones. Junior penetration tester roles typically require at least 2-3 years of prior IT security experience.

Highlight your degree, certifications, and practical experience in your resume and interviews to demonstrate your preparedness for the role. National University offers robust career services for students and alums that can facilitate your entry into the industry, including an online job portal and mentoring network.

As your expertise grows, career advancement opportunities become available. With experience, you can progress to roles like senior penetration tester, security consultant, or even security manager, in which you oversee broader cybersecurity strategies. Advanced degrees, such as a master’s in cybersecurity or information technology, can further strengthen your qualifications, preparing you for leadership roles and specialized areas of the industry.

Launch Your Career as a Penetration Tester Today

Becoming a penetration tester is a challenging but rewarding journey that combines education, practical experience, and a commitment to continuous learning. With a solid foundation in cybersecurity, prospective pentesters can build their skills through relevant coursework, certifications, and hands-on practice. Networking with professionals and staying updated on industry trends can widen your career prospects and set you on the path to success.

Share: