{"id":40,"date":"2013-02-05T15:50:11","date_gmt":"2013-02-05T15:50:11","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=40"},"modified":"2013-02-05T15:50:11","modified_gmt":"2013-02-05T15:50:11","slug":"what-do-you-need-security-education-or-training","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2013\/02\/05\/what-do-you-need-security-education-or-training\/","title":{"rendered":"What do you need? Security Education or Training"},"content":{"rendered":"<p>As you\u2019re looking to improve yourself as a Cybersecurity citizen, you often need help from an outside source to increase your knowledge and\/or abilities.\u00a0\u00a0 Security is a broad topic encompassing many disciplines and Cybersecurity is no different.\u00a0 There are technical, procedural, and managerial aspects to be considered to grow what you know about Cybersecurity.\u00a0 There are often many, different ways to solve the same security problem. Knowing what to do and how to do it requires both knowledge and experience.\u00a0 How do you gain it though?<\/p>\n<p>The answer is Cybersecurity training and education.\u00a0 There\u2019s often a question as to which you need: training or education.\u00a0 There is a difference between the two, which I\u2019ll explain below. You need to be aware of your needs, wants, and goals before proceeding, or there\u2019s a chance you won\u2019t meet them.<\/p>\n<p>Cybersecurity education provides a more general background on the philosophies and concepts behind Cybersecurity.\u00a0 It allows you to understand the context for security tools, techniques, and technologies. With security education, you understand why it\u2019s important to have particular protection methodologies in place and is at the strategic level of thinking.\u00a0 Cybersecurity education emphasizes principles of risk management and how security fits into an organizational culture and structure. Education is long term taking many months if not years to acquire. Finally, education teaches critical thinking and allows the student to learn how to learn, which is crucial for new subjects or technologies.<\/p>\n<p>In contrast, Cybersecurity training is more specific to a technology, procedure, or skill.\u00a0 It\u2019s tactical or operational, rather than strategic. Training emphasizes the building of explicit skills and applying what you know to a particular situation.\u00a0 When you attend cyber training, you are learning about a specific technology or practice that can meet an immediate need. Lastly, training is short term and can often be accomplished in days or weeks.<\/p>\n<p>In this discussion, I\u2019m trying not to sway your though as to which is better, because both are important for expanding your Cybersecurity knowledge and abilities. You need to decide for yourself the method you want to take in order to meet your goals. The important thing to consider is that you keep growing and increasing your knowledge.\u00a0 Feel free to comment below on your views of education versus training. Don\u2019t stop learning!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you\u2019re looking to improve yourself as a Cybersecurity citizen, you often need help from an outside source to increase your knowledge and\/or abilities.\u00a0\u00a0 Security is a broad topic encompassing many disciplines and Cybersecurity is no different.\u00a0 There are technical, procedural, and managerial aspects to be considered to grow what you know about Cybersecurity.\u00a0 There [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-40","post","type-post","status-publish","format-standard","hentry","category-security-education"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/40","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":2,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/40\/revisions"}],"predecessor-version":[{"id":138,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/40\/revisions\/138"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}