Professional development

Hands-on training is key to understanding cybersecurity, says Infosec Skills author Howard Poston

Jeff Peters
December 11, 2019 by
Jeff Peters

Infosec Skills instructor Howard Poston learned the value of hands-on training early in his career.

“When I first started teaching, everyone seemed to learn the most during the 15-minute labs that accompanied each lecture,” Howard said. “That’s the point when it all came together and students realized, ‘Oh, that's how this works.’"

Howard said he carried that same hands-on approach through to his three new Infosec Skills learning paths: 

“Those are three very different learning paths,” Howard said. “But the network traffic analysis and cryptography paths are similar in that they’re geared towards the day-to-day aspects of cybersecurity — what you can expect to see on the network, what you can expect to see in cryptography and how to take advantage of that knowledge.”

"Secure coding is the other side of the coin. It’s about something being done wrong and how developers can identify and fix those issues — as well as how attackers can exploit them.”

FREE role-guided training plans

FREE role-guided training plans

Get 12 cybersecurity training plans — one for each of the most common roles requested by employers.

 

Developing practical cybersecurity skills

 

The hands-on projects Howard created are designed to reinforce key concepts from his courses, provide practical experience and help students develop their skills.

For example, the Network Traffic Analysis for Incident Response Project contains seven challenges ranging from analyzing basic packet capture data to discovering data exfiltration and DDoS issues to developing YARA rules for identifying malware.

“In the path we do a demonstration of Ghost Rat, which is a remote access toolkit designed to create a foothold on a computer,” Howard said. “One of the challenges is essentially unpacking the command-and-control traffic of a variant and deobfuscating the traffic to determine what it’s doing on your network.”

Howard said he kept the network traffic analysis courses as applicable as possible for incident response. 

For his Secure Coding Fundamentals learning path, Howard structured the courses around real-world examples — and those weren’t hard to track down.

“Unfortunately, it was extremely easy to find something from the last year where someone had made a secure coding mistake and it caused big problems.”

 

Poston “fell into” teaching cybersecurity

 

The rise in cybersecurity issues has led to increased demand for skilled cybersecurity professionals — and for people like Howard to train them. But Howard never aimed to be an instructor.

“Teaching came about organically,” Howard said. “I kind of fell into it because people asked me to.”

After getting his master's degree in Cyber Operations from the Air Force Institute of Technology in 2015, Howard spent two years at Sandia National Labs doing cybersecurity research and development on topics such as cryptographic algorithm security and efficiency analysis, malware reverse engineering, honeypot development and network traffic analysis.

“My wife and I wanted to travel for a while, so I quit and started doing freelance work,” Howard said.

That led to projects ranging from developing blockchain security content to writing about cybersecurity to becoming an Infosec Skills instructor.

 

Two-year half-life of cybersecurity skills

 

Being able to keep up on the latest cybersecurity threats and trends is one of the perks of developing so much cybersecurity content, Howard said.

“I saw a stat recently that the half-life of a piece of cybersecurity education is around two years, so theoretically my master's degree is pretty much worthless by now,” Howard joked. 

That’s why no matter what your situation, Howard stresses the importance of continuing education and hands-on skill development.

“Cybersecurity is constantly changing, and everyone needs a way to keep up.”

FREE role-guided training plans

FREE role-guided training plans

Get 12 cybersecurity training plans — one for each of the most common roles requested by employers.

Learn more about Howard Poston’s Infosec Skills courses:

See Howard's courses

About Howard Poston

Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security.  He can be reached by email at howard.poston@gmail.com or via his website at https://www.howardposton.com.

Jeff Peters
Jeff Peters

Jeff Peters is a communications professional with more than a decade of experience creating cybersecurity-related content. As the Director of Content and Brand Marketing at Infosec, he oversees the Infosec Resources website, the Cyber Work Podcast and Cyber Work Hacks series, and a variety of other content aimed at answering security awareness and technical cybersecurity training questions. His focus is on developing materials to help cybersecurity practitioners and leaders improve their skills, level up their careers and build stronger teams.