Study computer science, networking, programming, and ethical hacking for about 7 years or so. That should be enough to get you started.
computer engineering.
the main aim to study computer is to be computer literate and to secure a job in the future because today whichever field yougo computer knowledge is required
Richard A. Deal has written: 'CCNA Cisco certified network associate security study guide (Exam 640-553)' -- subject(s): Examinations, Certification, Computer networks, Study guides, Security measures, Problems, exercises, Telecommunications engineers 'Cisco Pix firewalls' -- subject(s): Computer networks, Security measures, Firewalls (Computer security) 'CCNA Cisco certified network associate study guide' -- subject(s): Examinations, Study guides, TCP/IP (Computer network protocol), Certification, Computer networks, Telecommunications engineers, Internetworking (Telecommunication), OverDrive, Computer Technology, Nonfiction 'Cisco ASA configuration' -- subject(s): Computer input-output equipment, Computer networks, Software configuration management, Security measures, Firewalls (Computer security), OverDrive, Computer Technology, Nonfiction
Thomas R. Peltier has written: 'Policies & procedures for data security' -- subject(s): Electronic data processing departments, Security measures, Computer security 'Complete Guide to CISM Certification' 'Information security fundamentals' -- subject(s): Computer security, Data protection, Computer Technology, Nonfiction, OverDrive 'Information security risk analysis' -- subject(s): Computer networks, Security measures, Computer security, Risk assessment 'Information Security Fundamentals On-line Self-study Course'
MULTICS
An individual can be qualified for a security job in many colleges throughout the U.S. Texas has some school options where homeland security is a career choice.
A network security consultant's job is to analyze the possible security risks displayed by the hiring company's computer network. They report on risks discovered, advise as to the severity of these risks, and determine an appropriate plan of action to minimize or eliminate threats to a network's smooth and safe operation.
Steven DeFino has written: 'Official certified ethical hacker review guide' -- subject(s): Penetration testing (Computer security), Examinations, Certification, Computer networks, Computer hackers, Computer security, Study guides, Electronic data processing personnel
by knowing all security checks and how frauders do their job especially using computer systems
Join a college class or sign up with any of the certification online vendors.
Mark D. Ciampa has written: 'Networking BASICS' 'Microsoft PhotoDraw 2000' -- subject(s): Computer graphics, Microsoft PhotoDraw 'Security+ guide to network security fundamentals' -- subject(s): Computer networks, Study guides, Security measures, Examinations 'CWSP guide to wireless security' -- subject(s): Computer networks, Security measures, Wireless LANs, Wireless communication systems
job security A+ ;) ;)