{"id":68,"date":"2004-11-05T00:00:00","date_gmt":"2004-11-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/05\/counting-the-cost-of-security-training\/"},"modified":"2021-12-30T11:36:26","modified_gmt":"2021-12-30T11:36:26","slug":"counting-the-cost-of-security-training","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/05\/counting-the-cost-of-security-training\/","title":{"rendered":"Counting the cost of security training"},"content":{"rendered":"<p>It has been said before that the cost of IT training for those of us in the computer security industry is really quite high.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This quickly adds up to a rather tidy sum for managers trying to maximize their often decreasing budgets.  They believe that if they provide training for their analysts that they will lose them to other firms.<\/p>\n<p>While this can be a very valid argument, it is also one on the razor&#8217;s edge &#8211; by that I mean you run the risk of your employee becoming irritated at any lack of investment in them and their future, and they simply leave.<\/p>\n<p>As a security analyst, for example, you must not only stay current with technology, but also improve your core skill set.<\/p>\n<p>Right or wrong, many employees believe that it is up to the employer to provide that training &#8211; and with that same reasoning, most believe it should not be the employee who pays out of pocket for these courses.<\/p>\n<p>Reality dictates that most companies simply do not provide adequate training for their staff simply due to financial constraints &#8211; and in fact, it may not be important to their long-term objectives.<\/p>\n<p>If you own or manage staff in a small-to-mid size company, it would pay you great dividends to set aside some money for training.  These initiatives would show your next prospective hire that you are definitely serious about helping to maintain their skills and investing in them as an employee.  It is largely due to the fact that because the latest worm or virus has not affected them, and thus they do not see the need to provide training for their security staff.  However, we all know that the very reason they were not affected is because they had trained and competent security staff.<\/p>\n<p>For the many people out there who pull double or triple duty at times, getting the latest training is even more important.<\/p>\n<p>Nowadays having the system administrator deal with related technology such as routers, in addition to all his other security functions, is all too common.<\/p>\n<p>Learning on the job is a good way to learn, but it still cannot replace the proper training &#8211; yet so few want to shell out the money for it.<\/p>\n<p>I believe this is why you see so many network security jobs with an insanely long list of required skills, often starting with a particular certification.<\/p>\n<p>http:\/\/www.theregister.co.uk\/2004\/11\/05\/cost_of_security_training\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-68","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/68\/revisions"}],"predecessor-version":[{"id":2555,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/68\/revisions\/2555"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=68"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=68"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}