Understanding the data flow
You might recall from Chapter 1 that we discussed one of the magical phenomena surrounding Kali Purple – folks who’ve never used Linux before are finally deciding to give it a shot. The field of cybersecurity has evolved to such a state that many roles exist within it where no specific type of technological experience is required in advance. While having such experience certainly helps and will give you an advantage, many organizations are beginning to focus more on their ability to problem solve, operate under pressure, or tackle challenges where no previous answer exists. Some organizations are willing to teach people the technology skills they need if they possess those abilities and can show a strong work ethic with the ability to be a good student. This goes beyond Linux, programming, or other experience. One area where some folks are short on experience as they come into the field of cybersecurity is networking. By networking, we don...