Wednesday, August 18, 2010

How much programming is involved in Network Security field?

I have a BS in Network Security, and I HATE programming, but liked my course in ethical hacking (where we used apps to listen and hack linux boxes) and my courses on Computer Forensics.



For those in the field, how much programming is involved in positions such as Security Analyst, Pen Tester, or Computer Forensic (Encase/FTK) Analyst?



From what I hear you have to be good at scripting, which is like 'lite programming' like perl/python. But even advanced perl looks just like crazy C++ code.



How much programming is involved in Network Security field?network



Some companies require Network Administrators/ Security to learn some concepts of programming such as Client-server programming, RPC Procedure call, CORBA, etc but it depends on the company.



Check out the requirements for a Security Analyst in the companies career page if it requires one to know programming, shouldn't be like software engineering type programming but something basic in either C++ or Java.



How much programming is involved in Network Security field?norton



There isn't too much hard programming required, but depending on what company you work for and what your job entails you may have to do various scripts in Perl or simple batch scripting on Windows.



Perl looks like C because it is a C structured language. Once you actually learn it though, it is NOT difficult at all. It's a pretty straight forward language and will really open you up to the world of programming. Just start with some tutorials and go from there.



Right now I'm actually in the midst of working on an application in C# that will make calls to a Perl script I wrote.
One of the biggest programming tasks you will have in the security field is UNIX/Linux script shell writing.



Most of the other tasks that you would do already have applications designed for them and it is a matter of purchasing or obtaining them



You can check out what I mean by Googling the CISSP certification.

No comments:

Post a Comment