Section 6 - 3 - Future Employment Opportunities And Example

How to Stay Employed in the Robotic Future Section 6 - Future Cybersecurity Employment Opportunities
12 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€64.96
List Price:  €92.81
You save:  €27.84
£55.77
List Price:  £79.68
You save:  £23.90
CA$95.68
List Price:  CA$136.70
You save:  CA$41.01
A$106.02
List Price:  A$151.47
You save:  A$45.44
S$94.41
List Price:  S$134.88
You save:  S$40.47
HK$546.80
List Price:  HK$781.18
You save:  HK$234.37
CHF 63.34
List Price:  CHF 90.49
You save:  CHF 27.15
NOK kr761.11
List Price:  NOK kr1,087.35
You save:  NOK kr326.23
DKK kr485.02
List Price:  DKK kr692.92
You save:  DKK kr207.89
NZ$116.42
List Price:  NZ$166.33
You save:  NZ$49.90
د.إ257.06
List Price:  د.إ367.25
You save:  د.إ110.18
৳7,660.01
List Price:  ৳10,943.35
You save:  ৳3,283.33
₹5,835.78
List Price:  ₹8,337.18
You save:  ₹2,501.40
RM331.75
List Price:  RM473.95
You save:  RM142.20
₦86,437.65
List Price:  ₦123,487.65
You save:  ₦37,050
₨19,416.31
List Price:  ₨27,738.77
You save:  ₨8,322.46
฿2,572.74
List Price:  ฿3,675.50
You save:  ฿1,102.76
₺2,264.43
List Price:  ₺3,235.04
You save:  ₺970.61
B$356.70
List Price:  B$509.60
You save:  B$152.89
R1,295.44
List Price:  R1,850.72
You save:  R555.27
Лв127.05
List Price:  Лв181.51
You save:  Лв54.46
₩94,909.58
List Price:  ₩135,590.93
You save:  ₩40,681.35
₪259.50
List Price:  ₪370.74
You save:  ₪111.23
₱3,993.87
List Price:  ₱5,705.78
You save:  ₱1,711.90
¥10,712.31
List Price:  ¥15,303.96
You save:  ¥4,591.65
MX$1,187.89
List Price:  MX$1,697.07
You save:  MX$509.17
QR254.57
List Price:  QR363.69
You save:  QR109.12
P950.82
List Price:  P1,358.38
You save:  P407.55
KSh9,247.76
List Price:  KSh13,211.65
You save:  KSh3,963.89
E£3,352.12
List Price:  E£4,788.95
You save:  E£1,436.83
ብር4,006.43
List Price:  ብር5,723.72
You save:  ብር1,717.28
Kz58,511.64
List Price:  Kz83,591.64
You save:  Kz25,080
CLP$65,950.47
List Price:  CLP$94,219
You save:  CLP$28,268.52
CN¥506.53
List Price:  CN¥723.64
You save:  CN¥217.11
RD$4,055.76
List Price:  RD$5,794.19
You save:  RD$1,738.43
DA9,420.16
List Price:  DA13,457.95
You save:  DA4,037.79
FJ$157.70
List Price:  FJ$225.30
You save:  FJ$67.59
Q542.52
List Price:  Q775.06
You save:  Q232.54
GY$14,601.52
List Price:  GY$20,860.22
You save:  GY$6,258.69
ISK kr9,764.23
List Price:  ISK kr13,949.49
You save:  ISK kr4,185.26
DH703.98
List Price:  DH1,005.73
You save:  DH301.75
L1,236.34
List Price:  L1,766.28
You save:  L529.93
ден3,998.59
List Price:  ден5,712.52
You save:  ден1,713.92
MOP$561.77
List Price:  MOP$802.57
You save:  MOP$240.79
N$1,291.99
List Price:  N$1,845.78
You save:  N$553.78
C$2,569.36
List Price:  C$3,670.67
You save:  C$1,101.31
रु9,319.09
List Price:  रु13,313.56
You save:  रु3,994.46
S/260.54
List Price:  S/372.22
You save:  S/111.67
K269.79
List Price:  K385.44
You save:  K115.64
SAR262.50
List Price:  SAR375.02
You save:  SAR112.51
ZK1,882.68
List Price:  ZK2,689.66
You save:  ZK806.98
L323.40
List Price:  L462.03
You save:  L138.62
Kč1,628.77
List Price:  Kč2,326.92
You save:  Kč698.14
Ft25,305.79
List Price:  Ft36,152.68
You save:  Ft10,846.88
SEK kr755.02
List Price:  SEK kr1,078.64
You save:  SEK kr323.62
ARS$61,468.17
List Price:  ARS$87,815.44
You save:  ARS$26,347.26
Bs483.33
List Price:  Bs690.51
You save:  Bs207.17
COP$271,845.87
List Price:  COP$388,367.89
You save:  COP$116,522.02
₡35,672.25
List Price:  ₡50,962.55
You save:  ₡15,290.29
L1,724.16
List Price:  L2,463.20
You save:  L739.03
₲522,510.75
List Price:  ₲746,475.93
You save:  ₲223,965.17
$U2,674.97
List Price:  $U3,821.56
You save:  $U1,146.58
zł281.37
List Price:  zł401.98
You save:  zł120.60
Already have an account? Log In

Transcript

So hopefully I've convinced you now that you know, cybersecurity and software security is a huge, huge industry even currently. And that, you know, it's only going to go one direction, it's only going to go up as more computers roll out as they become more important with more important data, protecting that infrastructure. And you know, software and data is going to be a lot more important. So if you're in traditional security, like physical security, or, you know, you do programming as a hobby, or you're just generally interested in programming or cybersecurity, and that sort of instance, maybe you're a bit of a cryptography nerd or something like that. Whatever it is, that might interest you. It's a really, really good field to consider as one of the major, you know, employment opportunities in the future.

So to look at those types future employment opportunities. There's things like management, there's team leaders, anything. along the lines of project managers. There's also the entire research and development area. There's IT infrastructure deployment. There's things like 24, seven monitoring technicians.

There's teachers for basic and advanced software, security knowledge, and many, many more that are out there that you can actually get into. It's not just, you know, the hardcore hacker top sort of profile that a lot of people think of when they say cybersecurity and jobs in cyber security. So people often sort of get this part wrong in thinking that when a new technology comes out, or when an existing technology that is, you know, very big, something like secure cyber security, they instantly go to you know, what you see in the films where you have the guys and they're hacking on computers, and they're super smart and they're wizards with computers. Anything, that's not me, I can't do that. So therefore, I don't have a position I can't possibly get into that field. And I stopped right there that this isn't the case.

You know, in reality in the real world, not in Hollywood, there's often a lot of supportive roles that go along with that. Sure, there are those roles as well. If you're really, really smart at that stuff, fantastic, obviously go after that. But you know, someone still needs to hire that person to work in that company, they need HR to do that you've got to do the interviews and find that person originally, you know, the computer that that person is working on, that is IT infrastructure that will need to be rolled out to the entire company, you know, will it get refreshed in two years? You know, is it his own personal laptop? Or is it a company laptop, you know, all those sorts of things need to be managed.

And again, they also need cybersecurity, you know, issues with them as well. You know, if you're rolling out a computer to the entire company, you want to make sure that it's you know, actually safe and No one can hack into it. So you don't need to be the absolute pinnacle of, you know, software security expert to get a job inside of security. There are a lot of other ancillary positions, if you would, that are available. So let's dig into absolutely first live example where I'll be covering the full strategy from end to end at about a person who is in an industry that completely collapses over a five year period and how they make their transition into cybersecurity or the industry surrounding cybersecurity. So, in part one, we introduced to the theoretical person, we're going to say that they're a project manager, and we're going to say that they work at a company that actually produces a blu ray DVDs.

So in this first part, this mythical person is reading up on new technology, getting to know you know, where the current state of technology is, and where it's likely To go in the future, they read up on things like you know, streaming services such as Netflix, obviously, that's going to be very apparent. They read up on other things like, what is planned for the next iteration after blu ray DVDs, and sort of trying to assess all those types of technology, in part one of the strategy. So in part two, this will be a few years ago, but this mythical person starts to see the world start to turn to more streaming services, things like your Netflix, all those types of online streaming services. And it sort of dawns on them that, you know, perhaps this is, you know, a new technology that might threaten their entire industry of, you know, printing blu ray DVDs.

So he does even more research on it and finds that, you know, the industry does seem to be contracting as a whole, you know, in 2015. Sales of blu ray DVDs were roughly $21 billion. Then later on, it was $18 billion the next year. And now they're forecasting that will only be $9 billion by 2020. So this is a brief five year period, which, again, you know, five years isn't a short amount of time. But in terms of a company and its entire profit being essentially eroded by half in a space of five years, there's a very, very serious disruption.

Now, this mythical person has also always had a bit of a, you know, underlying interest in cryptography and software security. So he starts to sort of focus on that industry and start to sort of look at a potential move into that industry. So in part three of the strategy, this is where our mythical person will start to really focus on one particular area, he's chosen cybersecurity. And he's also realized that, you know, obviously, this industry of blu rays is gradually going down and down and it's very difficult to flourish in any sort of company that's in decline. industry so he knows that he wants to move into a different industry. They know that it's in cybersecurity.

And so what he does is he starts reading off of the maybe hire some books from the library for free and read a couple of books, maybe read online posts, as I was referring to before, you know, he has these Feedly up and reads constant news strains that are coming in about cybersecurity. Perhaps he takes some online courses, maybe he grabs a couple of old computers that he has at home and, you know, hooks them up in a network and starts trying to use some of the new techniques that he's learned in the real world by hacking into each of the computers and just sort of experimenting, getting a lot more experience with it. After a while, he might even take some actual in real life classes, you know, night classes or perhaps even a short, you know, degree type class. Anything you can get his hands on to really up his skill set in this cybersecurity section.

After doing a lot of this study, Continuing to do this study. Another side part of this section is that you'll also be investigating potential new companies. So because he's moving into a completely different company in a completely different industry, he has a whole bunch of different companies that he can start to investigate, start to find ones that really interests him, you know that they're not just doing cybersecurity, but they're doing it in a particular interesting niche that applies directly to him. So the other aspect of this is you want to try and find companies that obviously are looking for people to employ and, you know, have open jobs, job postings, you can even sort of get those job postings. Have a look what they're actually, you know, looking in terms of skill sets to hire, and then try and learn those specific skills. You know, if they're looking for a certain type of program that you have experience in program x, take out a book from the library on program x, try and get a copy of it, try and play with it at home, those sorts of things.

To really sort of up your, your ability to get hired in that particular position that you're wanting to get. Now, for this mythical person, as I said before, they are a project manager. That is their core competency for the past 10 years or however long they've been there. Their, you know, main skill set was managing major projects as a project manager, what they'll want to do with this new technology, this new information that they've been learning about all this info on cybersecurity, they want to take that core competency and add it to the new technology. So they might try and go for a position in say, a leading cybersecurity company, as a project manager, but knowing all about cyber security, knowing about the systems they use, knowing about the software that they use, if you're just a generic per project manager and you go for that position, you might have a shot at getting it but if you know their systems if you talk their language and know that computers in the you know, pros and cons of this particular program over this other program, when it concerns to cybersecurity, you're going to have a much better chance of getting that position.

And hopefully that project manager will be able to go into that new position under the section three of the strategy and take that new position on board. Now they're at a cybersecurity company in that particular industry. And perhaps they're managing, you know, major projects where they roll out cybersecurity software to other companies. And this person is project manager is managing those projects are rolling out that new security. Now, after about a year or two of being in this new position as a project manager, this person can sort of, you know, look back at their old industry of blu ray, DVD manufacturing, and all that sort of stuff. And, you know, it turns out that that 2020 prediction of DVDs being a non billion dollar industry was you know, Little bit optimistic, maybe they're only producing about $8 billion.

Now, otherwise, that's about a 60 65%, you know, decrease in the overall industry as a whole. And as you can imagine, it probably doesn't have a very bright future. Whereas he is a new company, existing company with a new job, and has a lot of, you know, potential ways that he can move into different sectors or even get a better job or even move to a different company inside that new industry now that he's there. So I hope you say that this general strategy in this example really makes for a compelling case because, you know, while initially this person might not have known really anything about cybersecurity or software security, they might have been interested in it, but they might not have known anything hugely about it, you know, they're not a hacking computer wizard by any means whatsoever. Even now that they're employed in it.

They've been able to use this process to identify To find that their company, or the industry in this case is, you know, gradually degrading, they identify that threat, they learn about the new technology or the new position that they want to go into. And they smoothly transition into that new role as a project manager at a cybersecurity business in that industry, all the while, they still have their job in that industry, and they can make that, again, that smooth transition, that's what it's about. It's an orderly transition, you're not, you know, instantly fired and have to panic and go crazy and try and figure it out from you know, day one, they're doing this preparation over a number of months or a number of years, and it gives a much, much better result not only because you're constantly staying employed, but because it's less stressful, you get to make the right choice.

You get to choose an industry that's actually interesting to you instead of just taking whatever gets offered to now I can also hear a lot of people thinking that you know, this is a bit of a once In a million case that maybe you're not a project manager with 10 years of experience or working in the blu ray industry, or you know, whatever that might be that this is just a unique, special example that only applies to that. And that doesn't apply to you. So, as I said, I'll be covering many more examples like this. I'll be giving you a lot more examples. This isn't just unique case. The next one, I'll be looking at an industry that will be affecting many, many, many people, which is self driving cars autonomous driving.

So I'll have a chat with you in that next section, and we'll go through yet another example. I'll talk to you then.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.