SOC Intern (HN)

Tech Job EN
  1. Job description:
  • Learn and perform analysis and handling of cyber attacks such as web application attacks, account attacks, malware, etc.
  • Learn and participate in the research of new attack techniques, develop a code of detecting attack techniques.
  • Learn and participate in the administration of SOC’s technology systems and solutions: SIEM, SOAR, TIP,….

 

  1. Job requirements:
  • Senior students majoring in Information Security/IT; Having a certificate or having completed a CEH course is an advantage.
  • Have basic knowledge of operating systems, Windows and Linux operating systems administration.
  • Have basic knowledge about network: OSI model, TCP/IP, IP protocols.
  • Learn and have basic programming ability in any language: C/C++, C#, Python, Java,…

 

  1. Benefits:
  • Internship certificate and wages.
  • Participating in real projects, professional working process and clear and methodical training route.
  • Opportunity to become a full-time employee with competitive salary and good benefits.
  • Professional, modern and dynamic working environment; Friendly, open-minded colleagues.
  • Opportunity to become a member of VSEC’s successor team project with attractive remuneration and the company creates all resources to develop.
  • Enjoy other benefits according to the company’s regulations.

 

  1. Contact:
  • Human Resources Department – hr@vsec.com.vn
  • Address: Hanoi: M Floor, N01A Golden land Building, 275 Nguyen Trai, Thanh Xuan Trung Ward, Thanh Xuan District, Hanoi City.

How did I pass the OSCP certificate?

Security for Newbie VSEC - BLOG

Hi, it’s time we meet again, I make a new blog at the end of the month. This time the theme will be a little different. Basically at the beginning of this June, after a year of so-called temporary graduation, I took the first security exam in my life, which was OSCP, and fortunately, without humiliating myself, I passed:’ >. So this post will be about my recent OSCP experience and the takeaways from it. Hope this information is useful

 

OSCP Examination

First of all, what is OSCP? Offensive Security Certified Professional (OSCP) is a certification program that focuses on security testing and attack skills. It consists of 2 parts: a pentest lasts within 23 hours and 45 minutes and a report submitted within 24 hours after that. OSCP is a very practical test.

So why should you take the OSCP test? I have 2 main reasons:

  • To learn and improve knowledge and skills about security testing. As mentioned in the previous post, I just switched to Pentest recently, so I need something more oriented about this area. When you register for the test, you will be able to experience more than 54 very practical labs and have a very clear and specific set of instructions.
  • To increase salary (of course). Last time, there was an article from Cyradar that said that OSCP certification helps increase salary by 200%. OSCP is now a rising certificate, because of its practicality and difficulty. It is ranked in the TOP 5 desirable and necessary pentest certificates for pentester. It will greatly increase your self-worth because besides CEH, this is a required certificate for many contractors.

The skills you will acquire through the OSCP course:

– Passive Information Gathering

– Active Information Gathering

– Vulnerability Scanning

– Buffer Overflows

– Working with Exploits

– File Transfers

– Privilege Escalation

– Client-Side Attack

– Web Application Attacks

– Password Attacks

– Port Redirection and Tunneling

– The Metasploit Framework

– Bypassing Antivirus

My OSCP journey

Let’s go into the main part of this article. I will cover what I went through in the OSCP course and what I learned (experience and advice).

Because the company requires a certain employee to have an OSCP certificate, and if that employee has one, they will get a salary raise =))) and I feel that I am quite predestined with all kinds of tests, so I accept it :v

The journey will be divided into 3 main stages:

Preparation stage:

There are a few things you need to prepare before you register for the test.

First is the information about the certification, You must know what you are taking and what the test format is, right? It will be located here https://support.offensive-security.com/oscp-exam-guide/.

Second is the necessary knowledge and skills. When you register for the test, you will have to buy a package that includes the exam fee, Penetration Pentesting with Kali Course includes an 800+ page PDF and over 8 hours of video tutorials, and a VPN to connect you to the lab environment (the most valuable in the package). For Lab, you can buy 30-day, 60-day, or 90-day types depending on your intentions. I chose 60 days. Because time is money, before you buy this package, you need to prepare the right knowledge and spirit, otherwise, you will be overwhelmed (like me) in terms of knowledge and skills, and in those 60 days, I’m sure you will not have enough time to practice enough for the test. Because at school, I have been taught and practiced these things, I am quite familiar so I am not surprised.

 

So what you need to prepare in terms of knowledge is:

  • Linux and Windows environments. This is what I consider the most important. You need to have knowledge and familiarity when working with both Windows and Linux environments, especially Command Line Interface on Linux because that’s where you work the most, especially Kali. If you are new, this book may come in handy: Kali Linux Revealed.
  • Basic programming skills. This includes reading, understanding, and being able to modify Python, Bash, Perl code, etc. You won’t need to write a complete exploit, but you should at least understand how it works. There are millions of websites out there that can help you get familiar with Python. Before I jumped straight into it, I didn’t have a very useful method :v
  • Web Application Attacks (SQLi, Local File Inclusion, Remote File Inclusion, Command Injection, …), In the labs you will have to exploit mainly Web Applications, so you need to have a certain understanding of these types of attacks. Web Application Hackers Handbook, this book is very useful for those who are new to this problem.
  • Tools that run on Kali/Linux: The last thing is that you need to be familiar with or at least know how the tools work – which you need to rely on to be able to complete the test. Some tools you need to know are Metasploit, Nmap, and Netcat.
  • Get familiar with the lab environment: To avoid being surprised when attacking a computer. You can familiarize yourself with the labs similar to OSCP on Hack The Box, or refer to the link here OSCP Like Vulnerable Machines List by abatchy.

 

Before taking the test stage:

Once you’re confident and mentally prepared, you can register to get started on the Offensive Security homepage. After you sign up for the lab term, on the day you sign up, you’ll receive an email with course materials and instructions for connecting to the lab environment.

I don’t know about you, but I always have the habit of having basic knowledge first, knowing what I have to do before I start doing it. So I divided this stage into 2 parts, theory and practice.

 

Theory:

I spent almost the first month just reading and studying the material provided. It includes an 800+ page PDF book and a set of accompanying visual videos. There are also Exercises in the book at the end of each section, if you do all the work and submit the reports you will get 5 extra points of attendance on the final test result. My opinion about the document is that it is very complete, it is designed so that a complete beginner can get the most basic knowledge, and it is also very broad and comprehensive in all areas. If there is no preparatory stage, you will really be overwhelmed by the amount of information it brings.

My advice and experience is that you may not need to see and know the whole thing, but you should read it once. You can skip the parts you think you already know, and read the parts that feel new to you. Because there are information and tools in the material that are very good and useful, which will directly help you do the lab exercises and tests easier.

 

Practice:

This is the most valuable part of the whole package, according to the comments of most people. Because this is what helps you prepare for your test, it can also serve as a sample question.

There are a total of 57 public servers for you to attack, and in addition, there are 3 internal servers that you can pivot to when you get the keys from a certain public computer. During the lab time, I was able to root about 52/57 computers.

 

My learned experience is that:

  • You should start with Alpha and Beta machines first, with IPs of .71 and .72. Because these are samples, there are sample reports on the student’s forum that are very detailed on the approach and methodology to attack and gain permission to a server.
  • There are 2 keywords you always need to remember which are “Enumerate more” and “Try Harder”. Really after you finish this one, you’ll definitely stick to these two phrases, because they’re the keywords every time you get stuck somewhere. Sometimes it’s only a hidden port away before you find the answer or sub-directories that you haven’t enumerated yet. Regarding enumerations, I found a pretty good and detailed tool that helped me with one computer for the final test: https://github.com/Tib3rius/AutoRecon.
  • Always take note of what you find and achieve. I have an Excel file to record what I enumerated, as well as the exploit code I used to exploit and gain permission. Because there are some computers that require you to hack into another machine in order for you to access it. This will make it easier to go back to that computer and know the link between each computer to go back to.
  • You can refer to the student’s forum for instructions if you are stuck somewhere for too long. There are posts to discuss each computer, or you can also inbox your fellow test takers for more approaches. However, you should not abuse it, because you will not have it when you take the test.
  • Always revert a computer before doing it. Because you are not the only one accessing that lab environment. You should revert to what others have done on it before to make sure the environment is as clean as possible.

 

On the test day:

Before the test day, you should prepare very carefully, both physically and mentally. Because it’s a 24-hour test. No help, no suggestions, just you and your supervisor.

Prepare your health, food, and drink plan you need to complete the test. Get enough sleep. For the duration of the test, you are allowed to leave your seat, move around, and rest. Don’t stress when you’re stuck somewhere, stop, pause, or switch to another computer. Never let stress, panic, and anxiety take over your mind. On the test day, during the first 12 hours, I didn’t have a shell on a single computer, everything was missing a tiny bit, and I swear you don’t know how much I swear on this question. After 3/4 of the time, it improved a bit when I finished each Buffer Overflow exercise (similar to drawing a function graph in the university entrance exam). But after I went out to breathe for about 20 minutes, I came back and suddenly I saw something I hadn’t seen before, and I found my reel again. As a result, I finished the test with only 1 computer that could not be rooted. One result I know is more than enough to pass. From there, I understood the two spells “Enumerate more” and “Try Harder”.

Within the next 24 hours, you must complete and submit a report, about the enumeration process as well as how you exploit and gain permission. The report requires specific screenshots and instructions to reproduce, so you must make sure to take pictures of the steps during the test, because when you finish the test, the VPN connection will be disconnected, and no there will be no chance for you to connect to the server to do it again.

And finally, after submitting the reports, the results will be available within 10 working days. And when the results come, yayyy, I finally have a chance to get a salary raise =))))

 

Conclusion

And in both the study and test process, always find enjoyment. There’s always a certain happiness either small or big when you learn something new, something that makes you surprised, or when you successfully root a computer that took you days to do. :’> So have fun.

Be Duy ( aka chalizard )

TOP 6 HACKERS’ CYBER ATTACKS THAT SHOCKED THE WORLD

Cyber world trending VSEC - BLOG

Along with the trend of global digital transformation, the number of cyber attacks is also increasing year by year, with increasing severity and sophistication.

Let’s take a look at some of the largest recorded cyberattacks in the world with VSEC

 

1. Hackers infiltrated the data of the famous software company Adobe (2013)

Adobe announced in October 2013 that hackers had stolen data from the internet, including up to 2.9 million accounts’ personal information (usernames, passwords, real names, credit card numbers, and expiration dates). Soon after, internet hackers reported that this database had up to 150 million accounts (38 million of which are still active).

 

2. Sony’s expensive lesson in ignoring hackers’ warnings.

  • In April 2011, hackers targeted Sony PlayStation Network (PSN), causing Sony’s Multiplayer gaming service, online game purchases, and other content to be leaked. The personal information of 77 million global gamers was involved in the incident, and hackers acquired access to their banking accounts.
  • Sony was forced to pay $15 million in compensation to individuals harmed in order to pacify users. This corporation, on the other hand, detested hackers at the time when it rejected the warning for exposing the database vulnerability. The data is entirely unprotected and vulnerable to SQL Injection attacks.

Sony Pictures Entertainment, a Sony subsidiary, was attacked in November 2014 by a virus called “Guardians of Peace,” and the damage was significantly worse than before, surpassing 100 terabytes (1TB = roughly 1000 GB) with stolen confidential data. This time, hackers utilized the internet to steal movie scripts, emails, and personal information from 47,000 employees, forcing many to resign as a result of the loss.

 

3. A nightmare for the Korean banking system in 2014.

The key lesson learned by the Korean government after the cyber attack in January 2014 when hackers stole up to 100 million credit card numbers. 20 million more bank accounts were also compromised. The number of clients in these banks decreased by 2 million due to their concern that their personal information would be revealed, therefore they went to the bank to deactivate the card or switch to a safer bank.

 

4. The American credit company, Equifax, was on the verge of bankruptcy (2017)

 

Equifax, the credit reporting agency in the United States, acknowledged in a report that it has been dealing with a problem for months as a result of an internet attack. In July of 2017, they discovered the attack, which exposed the sensitive personal information of 143 million users in the United States, Canada, and the United Kingdom, as well as roughly 200,000 credit card numbers. 

Almost no solutions could assist the organization in recovering the information that was leaked as a result of the 2017 cyber attack. This incident was discovered as a result of an Apache Struts vulnerability that hackers completely exploited. The consequences were so severe that the company’s top shareholders and management were obliged to sell their stock quickly in order to avoid the crisis.

 

5. Online dating app Tinder was also a victim (2015)

This online dating app was hacked over the internet in 2015 with the intention of collecting all of its customers’ information. The genuine name, date of birth, postal code, IP address, and even sexual preferences of 4 million users have been made public on a forum accessible via the Tor browser.

But Tinder has not yet come to its senses; in 2016, it experienced greater losses, and the effects were 100 times worse this time. 400 million accounts have had sensitive information stolen, and 20 years of data from the massive dating service is now publicly available online. The Local File Inclusion approach (an attack technique for transferring a local file straight to the hacker’s internet resource repository) was utilized by the hackers.

 

6. Hotel Marriott customers’ information was exposed

This internet attack was carried out by hackers who targeted a database of up to 500 million Starwood hotel guests (including bank accounts) owned by Marriott. The security flaw has existed since 2014, however, the vulnerability just became apparent in September 2018. Marriott was only involved in the largest security litigation ever once.

The number of online attacks continues to climb year after year, necessitating the development of a well-defended, comprehensive network security system for information security. VSEC, Vietnam Network Security Joint Stock Company, provides the most cost-effective security solutions for organizations in information security evaluation, monitoring, warning, and troubleshooting.

Practical exercise for the largest energy corporation in Vietnam

Event VSEC - BLOG

Leading energy corporation in Vietnam, operating in key national sectors, ensuring energy security for Vietnam

As a large Corporation with many member units, there is a difference in qualifications in the field of information security between units. It is necessary to comply with the regulations of the State management agencies on ensuring information security for key systems. The exam is constructed in accordance with the application’s information safety incident response process. The teams are geographically spread out.

VSEC provides information security exercise services for officers who are in charge of information safety at all affiliated units, with a scale of more than 150 people. VSEC organized 2 exercises in 2021 with a gradually increasing level in accordance with the qualifications of the participating officers. The regulations and policies of the state and the unit are researched and combined to build a suitable set of exams for the characteristics of the unit. A common test system is created and virtual machines are provided for each team to exercise practically. Multiple bridge points are created to connect and monitor teams during exercises. Call centers and online support groups are created before, during, and after the competition.

This helps equip information security knowledge from basic to advanced for officers in charge of information safety. Officers can also be familiar with possible information security loss situations, and plans and solutions to be implemented to overcome information security incidents.

Millions of websites are at risk

Cyber world trending VSEC - BLOG

Today, WordPress is one of the most popular website-building tools all over the world, and it is no exception in Vietnam. Data thieves will naturally direct their attention here. Consequently, its plugin – Elementor Pro – has been exploited by malicious cybercriminals who are taking advantage of a security flaw that was just patched with the intention of stealing sensitive information.

This flaw, identified as a flawed access control situation, is present in 3.11.6 and earlier releases. In the plugin’s latest version, 3.11.7, released on March 22nd, the issue was fixed. 

The Tel Aviv-based firm claimed in its release notes, “Improve code security enforcement in WooCommerce components. It is estimated that over 12 million websites use the premium plugin. An authenticated attacker can completely take over a WordPress site with WooCommerce functionality if they are able to exploit this highly critical vulnerability.”

 

“A malicious user only needs to turn on the sign-up page (if it’s off) and change the default user role to admin and they can instantly create an account with administrative privileges. With this authority, they can “redirect the site to another malware domain, upload an unauthorized plugin, or backdoor, and further exploit the site” Patchstack claimed in a warning released on March 30th, 2023.

Patchstack also reports that the flaw is being exploited from many IP addresses in an attempt to upload arbitrary PHP and ZIP packages. Users of the Elementor Pro plugin should upgrade to version 3.11.7 or the most recent version, 3.12.0, as soon as possible to protect themselves from security breaches.

State Bank of Vietnam has begun deploying information security drills.

Event VSEC - BLOG

The State Bank of Vietnam is an agency of the Vietnamese government that is responsible for managing the country’s currency and reports directly to the government. The Department of Information Technology – SBV is the government agency in Vietnam responsible for overseeing and administering banking IT operations in general and information security in particular.

 

With over 40 financial institutions and banks taking part in the drill, there are a great deal of systems that need to be ready and running smoothly. It was difficult to coordinate the BTC with the experimental locations since the participating banks and financial institutions were located all over Vietnam, from North to South and used both online and offline methods of communication. Due to the high general capacity of the units and the specialized nature of the troops involved in the information security drills, significant investment in terms of content is always required, yet the drills must remain grounded in reality.

More than 40 banks and financial institutions active in the Vietnamese market are represented by competition teams with the State Bank acting as the regulatory body for VSEC, which provides security training services. Participating banks and financial institutions spread across the North and South, with both online and offline forms, making the organization and connection between the organizers and the test sites very complicated. During practice, they set up a network of bridges to facilitate communication and keep tabs on the various groups. They set up hotlines and online forums to help customers before, during, and after the event.

Officers in charge of data security can benefit from VSEC’s ability to equip them with fundamental to advanced information security expertise. They also help increase their awareness of potential information security loss scenarios and the plans and solutions that can be put into action to address such incidents.

Efficient use of Pentest – What did VSEC expert say?

For pentester VSEC - BLOG

Webinar: “Stay Ahead of Cyber Threats”

On March 29, the event “Stay Ahead of Cyber Threats,” organized by Vietnamese Security Network JSC in collaboration with VNG Cloud, was successfully held and left positive impressions on the Vietnamese Tech and business communities. The event featured speakers from renowned cybersecurity institutions, such as Kaspersky, VNG Cloud, VSEC, and Megazone Cloud. The webinar drew in more than 450 participants due to the insightful information provided by industry experts.

In this webinar, Mr. Bui Trung Thanh, a Solution Consultant at VSEC, shared a new method for optimizing the cost of ensuring information security. Pentest is the most method often used for application cybersecurity.

 

PTaaS – Cost and time optimization

“Most businesses today lack a dedicated cybersecurity team, and their engineers lack the skills and knowledge necessary to implement and evaluate information security. That’s why businesses often choose to hire outsource entities to evaluate cybersecurity for their applications,” shared Mr. Thanh.

In addition, Mr. Thanh described the difficulties and limitations of conventional Pentesting, such as time, resources, and skills. To address this issue, a representative from VSEC introduced Pentest as a Service (PTaaS) – an optimized pentesting method that, while not new globally, is not yet wide spread in Vietnam.

PTaaS is a service that offers an automated vulnerability exploitation platform, combining AI/ML to simplify the search, analysis, and reporting of vulnerabilities. This shortens the implementation process and optimizes deployment costs. The combination of technical process automation, engineers’ expertise, and the artificial intelligence of PTaaS ensures the optimal execution processes when evaluating a specific application.

Clearly, PTaaS can help businesses carry out cybersecurity assessments more optimally than traditional methods, reducing costs and evaluation time, and better meeting businesses’ current needs.

Vietnam ranked 8th in top 10 countries on Cyber security 2022

Cyber world trending VSEC - BLOG

According to the National Cyber Power Index 2022* study, Vietnam has made a stunning leap from 20th rank (in 2020) to 8th place (in 2022) on the list of countries with the highest information security capabilities in the world.

The World’s Top 10 Most Secure Countries for Cyber Security in 2022

Notably, Vietnam jumped from 16th to 3rd place on the intent index (which measures the level of interest and investment in Cybersecurity). This is a positive signal in raising the awareness and capacity to ensure information security of the government as well as the community in the country.

Mr. Phillip Hung Cao, Technology Solution Architect, Zero Trust Strategist, shared his thoughts on the report, saying, “Vietnam is in the 8th position in the NCPI 2022 report, showing that we are on the right track in actively creating diverse information safe playgrounds and communities for all ages and all growing together. We need to keep and cultivate an optimistic outlook for the future.”

*In 2020, the Belfer Center at HARVARD Kennedy School published its first National Cyber Power Index (NCPI) study. Mr. Eric Rosenback, Co-Director of the Belfer Center, shared the project’s vision to become a preeminent and rigorous research institution that provides solutions to the challenges faced by national leaders as a result of cyber attacks and conflicts. Organizational leaders can use the information gleaned from these studies to better prepare their armed forces to win a cyber conflict, mitigate the effects of attacks by using legal and regulatory mechanisms, etc. 

Currently, eight indicators—financial, surveillance, intelligence, commerce, defense, information control, destructive, and normative—are used to compile the report. Limitations in the report’s ability to measure such delicate aspects as troop strength, intelligence capacity, etc. were also noted. Vietnam jumped from 20th to 8th on the rank as a result of improvements in many categories, including defense, trade, destruction, and norms. 

Download the report here

According to National Cyber Power Index 2022

Enhance human capacity, assurance the 2nd network safety and security in 2022 at Vietnam Electricity

Event VSEC - BLOG

Following the goal of enhancing the network security capacity of the staff in charge of IT – Information Security at Vietnam Electricity, on December 16, The Vietnamese Security Company Network (VSEC) and VNCert collaborated with Vietnam Electricity to successfully organize the second practical exercise program to assure network safety in 2022 at Son La Hall, EVN building, 11 Cua Bac.

 

 

At the beginning of August 2022, EVN Group successfully organized the first cybersecurity exercise 2022 with the title “Ensuring information security for the ERP system”. During the rehearsal, the participating units were corporations, member units, and power plants that were involved in dealing with actual information insecurity situations on the ERP system. The drill teams demonstrated their information security skills, executed and complied with procedures for responding to information security incidents and receiving incidents, and supporting operations and other processes to ensure safe and stable service provision for EVN’s ERP system.

Following the goal of enhancing the network security capacity of the staff in charge of IT – Information Security at Vietnam Electricity, VSEC, and VNCert collaborated with the Group to organize the second Group-level practical exercise program. The Electronic Office Integrated Information System was chosen as the implementation object in this rehearsal. This is a critical application that is used throughout the Group as well as its member units.

 

 

Mr. Dao Hoang Duong, Deputy Head of EVN’s Department of Telecommunications and Information Technology, stated at the practice that, over the years, with the growth and application of IT in digital transformation, EVN has paid great attention to information security activities and directed its units to perform many tasks of information safety and security.

Mr. Dao Hoang Duong – Deputy Head of EVN’s Department of Telecommunications and Information Technology gave the opening speech

 

Mr. Truong Duc Luong – Representative of The Vietnamese Security Network Joint Stock Company emphasized during the practical exercise: “While we are sitting here, our system is under attack. Therefore, network security is one of the activities that are extremely necessary and cannot be abandoned when we put into operation the information system.”

Mr. Truong Duc Luong – Chairman of the Board of Directors of The Vietnamese Security Company Network (VSEC)

 

The practical exercises are held in person and online. At EVN’s headquarters, there were 6 teams participating in the practical exercises under 3 scenarios: Investigation of digital signatures; Investigation of attacks and exploitation of the security flaw in the electronic office integrated information system; and Investigation of the cause of data loss.

Serious and urgent atmosphere of the practical exercises

 

The practical exercise finished successfully after 5 hours of intensive focus, and the teams also achieved outstanding results. Participating units acknowledged pleasure after receiving more helpful information, knowledge, and skills for application and deployment for activities to ensure network safety and security at their units.

The organizers awarded prizes to the teams

 

The first prize belongs to Ho Chi Minh City Power Corporation  

 

Mr. Truong Duc Luong expressed on this practice “VSEC is honored to have accompanied Vietnam Electricity from the early days when the exercise was simulated and now it is a practical exercise, we can witness the amazing improvement of the security personnel via the practices – these are also the great values that the practice ensures the safety and network security bring.”

Shortage of cyber security personel – Attractive opportunity to develop your career

Cyber world trending VSEC - BLOG

Building a team of high-caliber Cybersecurity specialists is regarded as one of the solid foundations for ensuring the national Cybersecurity framework and realizing Vietnam’s aspiration to become a global information security superpower.

As Minister of Information and Communications (MIC) Nguyen Manh Hung shared: “We must build a team of Cybersecurity specialists as the core. Particularly in the field of Cybersecurity, both good experts and industry play an important role. In addition to enterprises and tools, there must be outstanding individuals. Due to the fact that the tool only tackles known vulnerabilities. Unknown vulnerabilities can only be addressed by experts.”

According to the Information Security Center (ISC), the global scarcity of cybersecurity talent is estimated at more than 2.7 million positions. Although this number is lower than last year’s figure of 700,000, it continues to demonstrate a significant shortage of cybersecurity personnel. This workforce shortage is most severe in the Asia-Pacific region, where an estimated 1.42 million individuals are required – the largest shortage of any region in the whole world. This problem is not an exception in Vietnam. According to the Information Security Department (Ministry of Information and Communications), the human resources in Cybersecurity have failed to meet the demand in terms of both quantity and quality, particularly in the locality. By the end of 2020, Vietnam’s civilian force in Cybersecurity is estimated to consist of 50,000 individuals, while by 2021, we will require approximately 700,000 individuals. Therefore, Vietnam faces a paucity of human resources in Cybersecurity.

This significant demand creates extremely potential opportunities for those who are pursuing the field of cybersecurity with salaries and benefits that are considered one of the most attractive in the labor market today. However, the journey to pursue the path of becoming engineers and cybersecurity experts will also face many difficulties and challenges.

In fact, cyberattacks around the world, including in Vietnam, have grown in scope, complexity, and sophistication, with an increasing level of destruction. As a result, the quality of Cybersecurity human resources is another issue that requires consideration. Many young individuals who are interested in the Cybersecurity industry, or those who are studying and have a passion for this field, are still unsure about the path and direction of their personal growth in the Information Security industry.

With the objective of providing young personnel in the cybersecurity industry with a clear understanding of the industry, direction, and motivation to pursue careers as future cybersecurity experts, Cyber Security Technology Village organized the Seminar: “Cyber Security Training in Vietnam” within the framework of the TECHFEST 2022 series of events hosted by the Ministry of Science and Technology. Students and IT personnel who are interested in cybersecurity will find this event to be extremely beneficial and informative due to the participation of top-tier cybersecurity experts.

👉Register for the Workshop here: https://forms.gle/obX1Ka6JgEgYfHgQ9