For any other questions that you have that may not be on this list please contact me on the “CONNECT” page with any other additional questions.
Where are you from?
A: Baton Rouge, LA
Why did you move from Louisiana?
A: I didn’t have much structure back home and didn’t know that I could pursue what I was gifted as a career with until I moved out of state.
What school did you attend for cybersecurity?
A: Montgomery College
How did you get into cybersecurity?
A: I started pursuing an undergrad degree in Cybersecurity from Montgomery College. While I was pursuing my degree I participated in capture the flag events (CTFs), hackathons, and joined the Cybersecurity Club at Montgomery College.
When did you fall in love with cybersecurity?
A: When I came across the degree in the catalog while pursuing my undergrad degree which was Spring semester 2015. I started my studies officially Fall 2015.
What did you do before cybersecurity?
A: Check out my LinkedIn here: https://www.linkedin.com/in/tailortolliver/
Are you just studying or are you also working?
A: While pursuing my undergrad degree I was going to school full-time and working full-time. Now that i’ve graduated I’m still studying while working full-time but I’m self-taught and doing that part-time.
Are you in cybersecurity just for the money?
A: Even though there is tons of money to make in this field I didn’t choose it because of that. I chose it because when I read the the description of what the career entailed in my school’s catalog my heart fluttered. It was really love at first sight.
Is there a specific path to get into cybersecurity?
A: There is no specific path to get into cybersecurity. There are recommended paths but everyone has their own unique way of entering the field. I help provide what I believe is the best way to enter the field in my consulting service.
How did you get into consulting and what does a consultant's day to day work look like?
A: I was constantly getting asked how did I get into cybersecurity and what were the best ways to get into the field. I started realizing that responding to 25-50 DMs a week was very time consuming. The online community that I run, Digital Empire, many of the members in there suggested I start a consulting service for those that want to pick my brain and get mentorship from me in regards to entering the field.
Currently my day consists of me getting call requests from clients through my Clarity link, clarity.fm/digitalempress, agreeing on a day and time, and giving them advice on how I think they should go about entering into the career field. I also get emails requesting mentorship from me as well.
If my clients believe they need additional guidance after the initial call I suggest them sending me over their resume so that I can critique it. I also give them my recommended guideline on how to achieve what role they are looking for in cybersecurity.
How can I set up a consulting call with you?
A: A: Click HERE
Can you mentor me?
A: I sure can. (:
I offer mentorship in the following areas:
Cybersecurity Career Advice
Social Media Branding
Refer to previous question to schedule a consultation call.
Insights on how to get into cybersecurity when you don’t yet know everything?
A: Just start studying, networking with those who are also at the same level with you, and those that are already in the field. I also recommend finding someone doing exactly what you want to do and reading up on their blogs, connecting with them, and mimicking their career moves.
What are your favorite Cybrary courses for security engineers?
A: If you’re already a security engineer I suggest the “Penetration Tester” career path offered by Cybrary Insider Pro.
What books do you recommend for learning cybersecurity?
A: You can find all the books I recommend for the career field by clicking HERE
What are the best certs to obtain?
Cybersecurity Overview for Managers
Cybersecurity Risk Management for Managers
CompTIA Security+ Certification Prep
(ISC)2™ Systems Security Certified Practitioner
(ISC)2™ Certified Secure Software Lifecycle Professional (CSSLP)
Mobile and Device Security
Wireless Network Security (WNS)
Windows Operating System Security
CompTIA Advanced Security Practitioner Prep
Certified Ethical Hacker (EC-Council)
ISACA Certified Information Security Auditor (CISA)
ISACA Certified Information Security Manager (CISM)
Linux Operating System Security
What computer do you use?
2017 Macbook Pro