Skip to content
I Help Women In Tech Earn More Money

I Help Women In Tech Earn More Money

  • Home
  • Secure The InfoSec Bag
  • About Keirsten
  • Why I Do This
  • FAQS
  • Resources

Category: Career Tips

Medical Records Breach: Part 2

1 Comment

Most job descriptions list demonstrated written communication skills under the requirements section. Students in cyber degree programs with little or no…

Continue Reading →

Posted in: Academia, Career Tips, Digital Forensics, Research Papers Filed under: database forensics, database server evidence, digital forensics, ethics, witness preparation

Medical Records Breach: Part 1

Most job descriptions list demonstrated written communication skills under the requirements section. Students in cyber degree programs with little or no…

Continue Reading →

Posted in: Academia, Career Tips, Digital Forensics, Research Papers, Security Case Studies Filed under: digital forensics, drive imaging, evidence acquisition, evidence collection, Federal Rules of Evidence

#WeCyberToo: Nicole Fagin, Sr. InfoSec Pro

5 Comments

Editor’s note: #WeCyberToo Talent Spotlights cover women of color in cyber so our daughters can see women who look like them…

Continue Reading →

Posted in: Career Tips, CISSP, Talent Spotlight Filed under: CISSP, military vet, Talent Spotlight, women in cyber, women in security

#WeCyberToo: Dr. Stephanie Carter, CEO

Editor’s note: #WeCyberToo Talent Spotlights cover women of color in cyber so our daughters can see women who look like…

Continue Reading →

Posted in: Career Tips, Talent Spotlight Filed under: career tips, CISSP, Talent Spotlight, women in cyber, women in security

HOU.SEC.CON 7.0 Review

You can never go wrong doing the right thing ~ Sam Van Ryder, HOU.SEC.CON Co-Founder and Tripwire Strategic Energy Accounts…

Continue Reading →

Posted in: Career Tips, Conferences Filed under: HOUSECCON, OWN IT, women in security

#WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops

Editor’s note: #WeCyberToo Talent Spotlights cover women of color in cyber so our daughters can see women who look like…

Continue Reading →

Posted in: Career Tips, Talent Spotlight Filed under: incident response, Talent Spotlight

#WeCyberToo: Cassandra Giddings, Security Engineer

Editor’s note: #WeCyberToo Talent Spotlights cover women of color in cyber so our daughters can see women who look like…

Continue Reading →

Posted in: Career Tips, CISSP, Talent Spotlight Filed under: #WeCyberToo, CISSP, engineer, woman owned business

#WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company

Editor’s note: #WeCyberToo Talent Spotlights cover women of color in cyber so our daughters can see women who look like…

Continue Reading →

Posted in: Career Tips, Talent Spotlight Filed under: home lab, Splunk, women in cyber, women in security

Forensics Sources Part 1: Packet Capture (PCAP)

Introduction Digital forensics can be described as the science of identifying, extracting, and preserving computer logs, files, cookies, cache, meta-data,…

Continue Reading →

Posted in: Career Tips, Cybercrime, Digital Forensics, Research Papers Filed under: digital forensics, packet capture, PCAP

CASP Exam Prep. Fail. Give Back.

I published Security+ and CISSP exam prep tips. Since then, I’ve felt that my middle child, the CASP exam, was…

Continue Reading →

Posted in: Career Tips, CISSP Filed under: CASP, CISSP, Security+

Post navigation

Page 3 of 4
← Previous 1 2 3 4 Next →

Let’s Connect!

  • LinkedIn
  • Twitter

Reader Favorites

  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • How To Keep Your Accomplishments In Front Of Your Boss
  • How Credentials Impacted My Career
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Pass the new CISSP Exam
  • Security+ Exam Prep Tips
  • #FinanceFridays Recap: Life Insurance
  • Salary Negotiation Tips from White Men in Tech: Part 2

Categories

Recent Posts

  • Promote Yourself. But Also, How Does Wealth Work?
  • ASK FOR THE DAM BONUS! + Last Chance for Stocks101
  • Stop Underestimating Your Value
  • Sip & Stocks101: Feb 14
  • Stocks101 Resources
  • #FinanceFridays Recap: Life Insurance
  • Closing Keynote Speaker at Diana Initiative Virtual Conference!
  • Cyberjutsu Con Speaker!
  • How I Passed My GICSP Exam
  • Women’s Society of Cyberjutsu Career Webinar Oct. 17th
  • HouSecCon2019 ICS Track Speaker
  • Salary Negotiation Tips from White Men in Tech: Part 2
  • Salary Negotiation Tips from White Men in Tech: Part 1
  • Tripwire Resources for Aspiring Engineers
  • Tribe of Hackers out January 28th!
  • Walker’s Legacy Power15 Houston Honoree
  • University of Houston Energy Sector Cyber Career Event
  • How To Keep Your Accomplishments In Front Of Your Boss
  • Keynote Speaker at Diana Initiative!
  • Digital Security Check-up
  • Listen While You Work
  • Did You Earn Certs & Expect a $20,000 Raise?
  • Support Other Women + Save The Date!
  • Secure The InfoSec Bag: Six Figure Career Guide For Women
  • Dark Reading Women Changing The Game
  • Women in Security Panel at HouSecCon
  • Tripwire Post: Security Research Ideas to Improve Post-Graduation Outcomes
  • It’s Ok To Be Extra
  • Go to Grad School or Get a Job?
  • How Credentials Impacted My Career
  • How She Passed Her First PCI Audit
  • Should Researchers Hack Back? My answer: NO
  • Talent Shortage Sanity Check
  • #WeCyberToo: Sakinah Tanzil, Sr. Security Pro
  • How To Write a Business Continuity Paper
  • How To Write An Abstract
  • Medical Records Breach: Part 2
  • Medical Records Breach: Part 1
  • #WeCyberToo: Nicole Fagin, Sr. InfoSec Pro
  • #WeCyberToo: Dr. Stephanie Carter, CEO
  • Forensics Sources Part 4: Logs
  • HOU.SEC.CON 7.0 Review
  • Forensics Sources Part 3: File Systems
  • #WeCyberToo: Quiessence Phillips, VP-Cybersecurity Ops
  • Forensics Sources Part 2: Memory
  • #WeCyberToo: Cassandra Giddings, Security Engineer
  • #WeCyberToo: Tiffany L. Smith, Security Analyst, Fortune 100 Company
  • Forensics Sources Part 1: Packet Capture (PCAP)
  • Malware: How it hides, detects, and reacts
  • CASP Exam Prep. Fail. Give Back.
  • Jopwell: A Career Platform For Us, By Us
  • Security+ Exam Prep Tips
  • #WeCyberToo: Zilphia Martin, Cyber Defense Threat Analyst
  • #WeCyberToo: Krista Theodore, Security Engineer
  • Ladies: GET OUT!
  • Security is NOT Just Hacking!
  • A 3-Pronged Approach To Insider Threats
  • How To Communicate With Non-Technical Audiences
  • #WeCyberToo: Glenise Moore, Sr. Associate Schellman & Company
  • Review: Teaching Cyber at the Collegiate Level
  • 80+ Back Doors Into Cyber Careers
  • #WeCyberToo: Danyetta Magana, CEO of Covenent Security
  • SQL vs. XXS Injection Attacks Explained
  • Snort Rules for ACK Scans, Oh My!
  • ARP Attack Detection Limitations
  • IP Fragmentation vs IP Reassembly
  • How to Marry IT and OT Security
  • The Worst Cyber Crime Today
  • Cybercrime Law Review: Computer Fraud & Abuse Act
  • Samsung’s $1 Billion Mistake: 2 Week Data Retention Policy
  • Most Important in Digital Forensics: Preparation or Preservation?
  • Digital Forensics: Can You Find Hidden Data?
  • 2016 ICS Security Incidents
  • Ace Your Papers & Advance Your Career
  • Power Utility Attack Lessons Learned
  • Basic and Double Encapsulation VLAN Hopping
  • Security Design Case Study
  • Pass the new CISSP Exam
Copyright © 2020 @keirstenbrager

Enjoy this blog? Please spread the love :)

  • TWITTER
  • FACEBOOK
    fb-share-icon
  • LINKEDIN
  • RSS
  • EMAIL