{"id":44223,"date":"2023-05-11T13:59:35","date_gmt":"2023-05-11T02:59:35","guid":{"rendered":"https:\/\/www.institutedata.com\/blog\/from-designing-logos-to-securing-networks-hanzs-journey-into-cyber-security\/"},"modified":"2023-10-28T16:09:59","modified_gmt":"2023-10-28T05:09:59","slug":"from-designing-logos-to-securing-networks-hanzs-journey-into-cyber-security","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/us\/blog\/from-designing-logos-to-securing-networks-hanzs-journey-into-cyber-security\/","title":{"rendered":"From Designing Logos to Securing Networks: Hanz&#8217;s Journey into Cyber Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hanz Johannes has had an eventful career trajectory filled with intuitive decision-making and problem-solving. His passion was always rooted in design and tech, and his job roles ranged from graphic design to sales and marketing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We have the pleasure of working with Hanz at the Institute of Data, where his intuitive nature and proactive &amp; friendly attitude make him an ideal colleague.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hanz is also a recent Institute of Data <\/span><a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\"><span style=\"font-weight: 400;\">Cyber Security Bootcamp<\/span><\/a><span style=\"font-weight: 400;\"> graduate. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">We got together with Hanz to learn more about his journey and what prompted him to pursue a career in cyber security.<\/span><\/p>\n<h2><strong>1. How did you first become interested in the tech space?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">It started with my first Intel computer, which greatly fascinated me despite its limited memory. I was interested in how the machine came together to be <\/span><span style=\"font-weight: 400;\">so<\/span><span style=\"font-weight: 400;\"> capable. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I remember growing up with dial-up, and my interest in tech was piqued as I watched the industry rapidly evolve. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">I&#8217;ve always had a creative mindset, so I pursued graphic design.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">But my genuine interest was always towards tech and software, and now I see how that part of problem-solving in the graphic design process kept me hooked.<\/span><\/p>\n<h2><strong>2. What was your professional background and experience before beginning the course?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Moving on from graphic design, I got into sales simply by chance, and even though I never planned to pursue it, the highlight of my career has been working with small and medium-sized businesses in sales and operations. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">I have managed stores, sales, and operations professionally, among other responsibilities, but the primary focus has always been driving results.<\/span><\/p>\n<h2><strong>3. What motivated you to take the leap and sign up for the cyber security course with the Institute of Data?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">It all started during my initial job interview with the executive director at the Institute of Data &#8211; Andrew Campbell, for a course advisor role. I remember him saying: <\/span><\/p>\n[su_quote]&#8221;Hanz, you sound like a great candidate for cyber security. But do you really want to be a course advisor?&#8221;[\/su_quote]\n<p><span style=\"font-weight: 400;\">Initially, I brushed it off because I thought <a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\">cyber security<\/a> did not match my professional skill set. However, the more I talked to people interested in the course, the more it sparked an internal debate about whether this was for me.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As I talked to people in my course advisor role, I was effectively doing secondary research to understand whether this could work for me. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I soon realized the course ticked all the boxes for me, so I decided the next best course of action was to take the course. <\/span><\/p>\n<h2><strong>4. Why did you choose to study with the Institute of Data over another institution?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The primary reason I chose to go with the Institute of Data is that I knew the data and statistics behind the scenes, and for me, the credibility and results were highly reassuring. <\/span><\/p>\n[su_quote]It was past contemplation for me, because even researching a new institute would have taken me a month or two, and everything about the Institute of Data plan was structured perfectly.[\/su_quote]\n<h2><strong>5. That sounds interesting! What techniques or methods did you use to help you get through the course?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The best method was to focus on the small steps. Also, practicing outside study hours with a compound effect mentality helped me. I learned this method by reading a book called <\/span><a href=\"https:\/\/www.goodreads.com\/book\/show\/9420697-the-compound-effect\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">The Compound Effect<\/span><\/a><span style=\"font-weight: 400;\"> by Darren Hardy. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is what I incorporated into my learning method while I was studying.<\/span><\/p>\n[su_quote]Being proactive as a learner is also important, which was another plus point of being a geek. I focused on the topics we had just learned and did more reading and practice to understand them better.[\/su_quote]\n<p><span style=\"font-weight: 400;\">When you commit to learning, you must brush aside the uncertainty and work through the challenges.\u00a0<\/span><\/p>\n<h2><strong>6. Multiple resources are available as part of the courses at the Institute of Data. Did you utilize any of these resources during the course?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">I utilized all of them, from the peer network and the assistance of the tutors to the job outcomes support team! <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a fresher in the course, I considered myself a non-IT individual despite a background in graphic design and an interest in technology. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I knew I would need all the support I could get, mainly because it had been a while since I studied formally. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the Institute of Data courses, there is always one instructor for every five students. We had seven students in our class, so we had two trainers- one lead trainer and one assistant trainer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In my course, the trainers ensured everyone was moving forward at the same pace, and the help was always there.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, if I had any issues with solving the lab work, I could consult a trainer, and we would immediately shift to solution mode.\u00a0<\/span><\/p>\n[su_quote]\u201cSo for any issue I raised, they would ask to look at my process of finding the solution first, and before helping me, they would make sure that I tried to find the answers independently.\u201d\u00a0[\/su_quote]\n<p><span style=\"font-weight: 400;\">This helped tremendously because, by the end of the course, I could solve problems and find answers by myself. In addition, solving a challenging question by yourself builds up your problem-solving skills, and you can remember the solution for much longer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initially, I was also concerned about whether taking the course remotely would be a good idea.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I had never taken a class this way before, and I felt that with IT, I would need someone to review my computer monitors if I needed help.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, it turned out to be a significant benefit at the end of the day.<\/span><\/p>\n[su_quote]It worked perfectly with my schedule, I never had to worry about parking, and I never felt distanced from my instructors because their support was always there.[\/su_quote]\n<p><span style=\"font-weight: 400;\">With the job outcome program, the primary benefit is that we have access to the coach from the very beginning of the course. So I got in touch with them early to set up a goal and a timeline for how I could plan to transition into the industry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I showed them what I could do, my level, and where I wanted to go. Based on that, they can provide practical advice that helps my skills and mindset stay relevant to the tech industry.<\/span><\/p>\n<h2><strong>7. What was your experience with building your capstone project?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">For my capstone project, the topic was Cyber Security &#8211; Maturity Through Social Engineering<\/span><span style=\"font-weight: 400;\">. In my prior positions, I had seen the issues businesses face with their security first-hand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, there is a definite lack of awareness and initiative among smaller companies regarding <a href=\"https:\/\/www.institutedata.com\/us\/blog\/9-types-of-cybersecurity-threats\/\">cyber security threats<\/a>. <\/span><span style=\"font-weight: 400;\">I believe there are three reasons for this:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Businesses are concerned more about making money than spending and investing it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Smaller-sized companies are generally either afraid of technology or need help understanding it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They believe that since they are a smaller business, cyber criminals will not consider attacking them.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">I considered two quotes while attempting to <\/span><span style=\"font-weight: 400;\">increase the <\/span><span style=\"font-weight: 400;\">cyber security<\/span><span style=\"font-weight: 400;\"> maturity of the target firms.<\/span><\/p>\n[su_quote]The first quote says: &#8220;Hackers don&#8217;t cause breaches; people do.&#8221;[\/su_quote]\n<p><span style=\"font-weight: 400;\">And that is true- the weakest part of cyber security is the people involved with the businesses. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, another quote that flips that weakness and turns the perspective into one of strength is\u2026\u00a0<\/span><\/p>\n[su_quote]&#8221;People are not the weakest link in cyber security. They&#8217;re the strongest link because they&#8217;re the first defense line in cyber security.&#8221;[\/su_quote]\n<p><span style=\"font-weight: 400;\">For the soft side of my project, I devised a small poster of 10 ways that the target firms could apply to become cyber secure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the technical side of my project, I did a physical and ethical penetration test on a friend&#8217;s business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I used a few targeted social engineering techniques to obtain their password. I had their permission to conduct these tests.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The added benefit was that, as a result of my penetration tests, we trained their team to protect against these threats, and I think this is a great project outcome.<\/span><\/p>\n<h2><strong>8. Has the Institute of Data&#8217;s cyber security certification prepared you for the real-world industry?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Yes, I feel ready! <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The day I finished the course, I felt both disbelief and excitement. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Going forward, there will be an initial learning curve since I have yet to learn many things, and there is also the challenge of getting that first job and settling into it. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But, I am ready for the future and excited to begin a new role in cyber security after finishing my contract with the Institute of Data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The core idea of the course is to prepare students for a job in the real world from day one. I love that my mind muscles are stretched daily, and I constantly learn new things daily. <\/span><\/p>\n<h2><span style=\"font-weight: 400;\"><strong>9. What advice would you give those making a career change or considering a career change in cyber security?<\/strong> <\/span><\/h2>\n<p><span style=\"font-weight: 400;\">If I have to summarise my advice in one sentence, it is this:\u00a0<\/span><\/p>\n[su_quote]&#8221;You are enough; you can do it&#8221;.\u00a0[\/su_quote]\n<p><span style=\"font-weight: 400;\">With most students, there is a pattern of three questions during their initial planning:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Can I do it?\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does it work?\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Is it worth it?<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The answer to all these lies in how serious you are. If you&#8217;re serious and want to make a change, it is all possible, and yes- you are &#8220;enough&#8221;.<\/span><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">If you are looking for a career transition into tech and pursuing your dream job, book a <\/span><a href=\"https:\/\/www.institutedata.com\/us\/consultation\/\"><span style=\"font-weight: 400;\">career consultation<\/span><\/a><span style=\"font-weight: 400;\"> with one of our experts at the Institute of Data and start your journey with an actionable plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can connect with <\/span><a href=\"https:\/\/www.linkedin.com\/in\/hanz-johannes\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Hanz<\/span><\/a><span style=\"font-weight: 400;\"> and follow his professional journey on LinkedIn.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hanz Johannes has had an eventful career trajectory filled with intuitive decision-making and problem-solving. His passion was always rooted in design and tech, and his job roles ranged from graphic design to sales and marketing.\u00a0 We have the pleasure of working with Hanz at the Institute of Data, where his intuitive nature and proactive &amp;&hellip;<\/p>\n","protected":false},"author":1,"featured_media":44453,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1834,2735,588,902,949],"tags":[785,1142,1143],"class_list":["post-44223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies","category-case-study-3","category-cyber-security-us","category-interview-us","category-job-opportunities-us","tag-cyber-security-us","tag-interview-us","tag-job-opportunities-us"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/44223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=44223"}],"version-history":[{"count":1,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/44223\/revisions"}],"predecessor-version":[{"id":58089,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/44223\/revisions\/58089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/44453"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=44223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/categories?post=44223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=44223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}