	{"id":5089,"date":"2016-11-09T09:21:20","date_gmt":"2016-11-09T02:21:20","guid":{"rendered":"http:\/\/science-technology.vn\/?p=5089"},"modified":"2016-11-09T09:21:20","modified_gmt":"2016-11-09T02:21:20","slug":"viec-lam-cong-nghe-tot-nhat-ngay-nay","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=5089","title":{"rendered":"Vi\u1ec7c l\u00e0m c\u00f4ng ngh\u1ec7 t\u1ed1t nh\u1ea5t ng\u00e0y nay"},"content":{"rendered":"<p>M\u1ed9t sinh vi\u00ean vi\u1ebft cho t\u00f4i: \u201cGi\u00e1o s\u01b0 k\u00ednh m\u1ebfn, \u0111\u00e2y l\u00e0 c\u00e2u h\u1ecfi nghi\u00eam ch\u1ec9nh, kh\u00f4ng ph\u1ea3i chuy\u1ec7n \u0111\u00f9a. Em mu\u1ed1n bi\u1ebft li\u1ec7u c\u00f3 vi\u1ec7c l\u00e0m n\u00e0o k\u00e9o d\u00e0i l\u00e2u, l\u00e0m \u0111\u01b0\u1ee3c nhi\u1ec1u ti\u1ec1n, nh\u01b0ng kh\u00f4ng bao gi\u1edd b\u1ecb sa th\u1ea3i? N\u1ebfu em mu\u1ed1n c\u00f3 vi\u1ec7c l\u00e0m n\u00e0y, em t\u00ecm ch\u00fang \u1edf \u0111\u00e2u?\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>T\u00f4i \u0111\u00e3 tr\u1ea3 l\u1eddi b\u1ea1n \u0111\u00f3: \u201c\u0110\u00e2y l\u00e0 c\u00e2u tr\u1ea3 l\u1eddi nghi\u00eam ch\u1ec9nh v\u00e0 kh\u00f4ng ph\u1ea3i chuy\u1ec7n \u0111\u00f9a. V\u00e2ng, c\u00f3 vi\u1ec7c l\u00e0m nh\u01b0 \u0111i\u1ec1u \u0111\u00f3 n\u1ebfu b\u1ea1n c\u00f3 k\u0129 n\u0103ng. Ng\u00e0y nay c\u00e1c c\u00f4ng ti tr\u00ean kh\u1eafp th\u1ebf gi\u1edbi \u0111ang g\u1eb7p kh\u00f3 kh\u0103n \u0111\u1ec3 t\u00ecm ra ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng an ninh cyber. \u1ede M\u0129 ng\u01b0\u1eddi ta \u01b0\u1edbc l\u01b0\u1ee3ng r\u1eb1ng c\u00f3 tr\u00ean 300,000 vi\u1ec7c l\u00e0m an ninh cyber nh\u01b0ng kh\u00f4ng c\u00f3 \u0111\u1ee7 ng\u01b0\u1eddi l\u1ea5p v\u00e0o. V\u1edbi nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng cyber h\u01a1n x\u1ea3y ra v\u00e0 li\u00ean t\u1ee5c t\u0103ng l\u00ean, k\u0129 n\u0103ng n\u00e0y l\u00e0 m\u1ea5u ch\u1ed1t cho c\u1ea3 ch\u00ednh ph\u1ee7 v\u00e0 c\u00e1c c\u00f4ng ti t\u01b0 nh\u00e2n. Theo B\u00e1o c\u00e1o vi\u1ec7c l\u00e0m Cybersecurity, thi\u1ebfu h\u1ee5t n\u00e0y c\u00f3 th\u1ec3 \u0111\u1ea1t t\u1edbi 1.5 tri\u1ec7u \u0111\u1ebfn n\u0103m 2020 \u1edf M\u0129 v\u00e0 tr\u00ean to\u00e0n c\u1ea7u, thi\u1ebfu h\u1ee5t n\u00e0y c\u00f3 th\u1ec3 ch\u1ea1m t\u1edbi 6 tri\u1ec7u v\u00ec m\u1ecdi n\u01b0\u1edbc \u0111\u1ec1u c\u1ea7n k\u0129 n\u0103ng n\u00e0y. Michael Kaiser, \u0111i\u1ec1u h\u00e0nh ch\u00ednh c\u1ee7a Li\u00ean minh an ninh cyber qu\u1ed1c gia, n\u00f3i: \u201cKhi vi\u1ec7c d\u00f9ng Internet t\u0103ng l\u00ean nhanh h\u01a1n s\u1ed1 ng\u01b0\u1eddi c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 n\u00f3, \u0111\u00e2y l\u00e0 vi\u1ec7c l\u00e0m t\u1ed1t nh\u1ea5t l\u00e0m ra nhi\u1ec1u ti\u1ec1n v\u00e0 k\u00e9o d\u00e0i trong th\u1eddi gian r\u1ea5t l\u00e2u.\u201d<\/p>\n<p>Ng\u00e0y nay t\u1ed9i ph\u1ea1m cyber \u0111\u00e3 \u0111\u1ea9y m\u1ecdi ch\u00ednh ph\u1ee7 v\u00e0o vi\u1ec7c t\u1ec9nh t\u00e1o v\u00ec h\u1ecd kh\u00f4ng bi\u1ebft ai \u0111\u1ee9ng \u0111\u1eb1ng sau nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y. C\u00e1c c\u00f4ng ti t\u01b0 nh\u00e2n \u0111ang b\u1ecb \u0111e do\u1ea1 b\u1edfi c\u00e1c hackers \u0111\u00e1nh c\u1eafp th\u00f4ng tin, gi\u1eef d\u1eef li\u1ec7u c\u1ee7a h\u1ecd \u0111\u1ec3 \u0111\u00f2i ti\u1ec1n chu\u1ed9c, hay ph\u00e1 hu\u1ef7 th\u00f4ng tin tr\u00ean m\u00e1y t\u00ednh c\u1ee7a h\u1ecd qua ph\u1ea7n m\u1ec1m h\u1ea1i malware. V\u00e0i th\u00e1ng tr\u01b0\u1edbc \u0111\u00e2y, Nh\u00e0 Tr\u1eafng \u0111\u00e3 n\u00eau ra y\u00eau c\u1ea7u r\u1eb1ng \u201cM\u0129 c\u1ea7n h\u00e0nh \u0111\u1ed9ng ngay l\u1eadp t\u1ee9c \u0111\u1ec3 \u0111\u1ec1 c\u1eadp t\u1edbi vi\u1ec7c thi\u1ebfu h\u1ee5t \u0111ang t\u0103ng l\u00ean v\u00e0 ph\u00e1t tri\u1ec3n nhi\u1ec1u t\u00e0i n\u0103ng cyber ch\u1ea5t l\u01b0\u1ee3ng t\u1ed1t \u0111\u1ec3 b\u1ea3o v\u1ec7 \u0111\u1ea5t n\u01b0\u1edbc.\u201d\u00a0 Nh\u01b0ng thi\u1ebfu h\u1ee5t n\u00e0y kh\u00f4ng d\u1ec5 gi\u1ea3i quy\u1ebft v\u00ec ph\u1ea3i m\u1ea5t th\u1eddi gian d\u00e0i \u0111\u1ec3 ph\u00e1t tri\u1ec3n \u0111\u1ee7 c\u00e1c k\u0129 s\u01b0 an ninh cyber. V\u1ea5n \u0111\u1ec1 l\u00e0 c\u00f4ng ngh\u1ec7 thay \u0111\u1ed5i nhanh ch\u00f3ng, v\u00e0 m\u1ed1i \u0111e do\u1ea1 c\u0169ng thay \u0111\u1ed5i m\u1ecdi l\u00fac n\u1eefa. Kh\u00f3 ph\u00e1t tri\u1ec3n ch\u01b0\u01a1ng tr\u00ecnh \u0111\u00e0o t\u1ea1o \u0111\u1ec3 \u0111\u00e0o t\u1ea1o m\u1ecdi ng\u01b0\u1eddi khi nhi\u1ec1u th\u1ee9 \u0111ang thay \u0111\u1ed5i. M\u1ed9t nh\u00e0 chuy\u00ean nghi\u1ec7p an ninh cyber gi\u1ea3i th\u00edch: \u201cB\u1ea1n ph\u1ea3i kh\u00f4ng ch\u1ec9 h\u1ecdc nhanh m\u00e0 c\u00f2n ph\u1ea3i th\u01b0\u1eddng xuy\u00ean \u0111i tr\u01b0\u1edbc c\u00e1c hackers v\u00e0 \u0111i\u1ec1u \u0111\u00f3 l\u00e0 kh\u00f4ng d\u1ec5. Trong vi\u1ec7c l\u00e0m n\u00e0y, b\u1ea1n h\u1ecdc nh\u1eefng th\u1ee9 m\u1edbi m\u1ecdi ng\u00e0y, m\u1ecdi tu\u1ea7n v\u00e0 m\u1ecdi th\u00e1ng.\u201d<\/p>\n<p>Khi c\u00e1c nh\u00e0 chuy\u00ean nghi\u1ec7p an ninh cyber ki\u1ec3m \u0111i\u1ec3m l\u1ea1i m\u1ea1ng v\u00e0 h\u1ec7 th\u1ed1ng \u0111\u1ec3 t\u00ecm l\u1ed7i, h\u1ecd th\u1ea5y b\u1ea3n th\u00e2n h\u1ecd ph\u1ea3i \u0111\u1ea5u l\u1ea1i nhi\u1ec1u hacker chuy\u00ean nghi\u1ec7p, ng\u01b0\u1eddi r\u1ea5t gi\u1ecfi trong vi\u1ec7c t\u00ecm &#8220;l\u1ed7 h\u1edf&#8221; \u0111\u1ec3 t\u1ea5n c\u00f4ng v\u00e0 tr\u1eadn chi\u1ebfn n\u00e0y \u0111ang tr\u1edf n\u00ean d\u1eef d\u1ed9i m\u1ecdi l\u00fac.<\/p>\n<p>V\u00ec nhu c\u1ea7u m\u1ea5u ch\u1ed1t n\u00e0y, ph\u1ea7n l\u1edbn nh\u1eefng ng\u01b0\u1eddi l\u00e0m vi\u1ec7c trong l\u0129nh v\u1ef1c n\u00e0y nh\u1eadn \u0111\u01b0\u1ee3c nhi\u1ec1u \u0111\u1ec1 ngh\u1ecb vi\u1ec7c l\u00e0m t\u1eeb c\u00e1c c\u00f4ng ti kh\u00e1c, v\u00e0 m\u1ed9t s\u1ed1 trong nh\u1eefng \u0111\u1ec1 ngh\u1ecb n\u00e0y l\u00e0 tuy\u1ec7t v\u1eddi.\u00a0 Nh\u1eefng ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng cao trong an ninh cyber v\u00e0 l\u00e3nh \u0111\u1ea1o t\u1ed5 an ninh t\u1ea1i c\u00f4ng ti c\u00f3 th\u1ec3 l\u00e0m \u0111\u01b0\u1ee3c t\u1eeb USD $200,000 t\u1edbi USD $250,000 m\u1ed9t n\u0103m. L\u01b0\u01a1ng trung b\u00ecnh cho m\u1ee9c v\u00e0o ngh\u1ec1 l\u00e0 qu\u00e3ng USD $110,000. Nh\u1eefng ng\u01b0\u1eddi c\u00f3 th\u1ec3 thi\u1ebft k\u1ebf, tri\u1ec3n khai v\u00e0 qu\u1ea3n l\u00ed an ninh m\u1ea1ng c\u00f3 th\u1ec3 l\u00e0m \u0111\u01b0\u1ee3c USD $150,000 t\u1edbi $180,000 m\u1ed9t n\u0103m, nhi\u1ec1u h\u01a1n b\u1ea5t k\u00ec vi\u1ec7c l\u00e0m c\u00f4ng ngh\u1ec7 n\u00e0o kh\u00e1c.<\/p>\n<p>Tr\u01b0\u1edbc khi t\u00ecm \u0111\u01b0\u1ee3c vi\u1ec7c l\u00e0m, b\u1ea1n c\u00f3 th\u1ec3 c\u1ea7n c\u00f3 \u0111\u00e0o t\u1ea1o n\u00e0o \u0111\u00f3. C\u00f3 v\u00e0i m\u00f4n h\u1ecdc trong MOOC m\u00e0 b\u1ea1n c\u00f3 th\u1ec3 xem x\u00e9t t\u1edbi:<\/p>\n<p><a href=\"https:\/\/www.edx.org\/course\/cyberwar-surveillance-security-adelaidex-cyber101x-0\">https:\/\/www.edx.org\/course\/cyberwar-surveillance-security-adelaidex-cyber101x-0<\/a><\/p>\n<p><a href=\"https:\/\/www.edx.org\/course\/cyber-security-economics-delftx-secon101x\">https:\/\/www.edx.org\/course\/cyber-security-economics-delftx-secon101x<\/a><\/p>\n<p>&#8212;English version&#8212;<\/p>\n<p>&nbsp;<\/p>\n<p>The best technology job today<\/p>\n<p>A student wrote to me: \u201cDear Professor, this is a serious question, not a joke. I would like to know if\u00a0 there is any job that last a long time, make a lot of money, but never get laid off? If I want to have this job, where do I find them?\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>I answered him: \u201cThis is a serious answer and not a joke. Yes, there is a job like that if you have the skills. Today companies all over the world are having difficulty to find people with cyber security skills. In the U.S. it is estimated that there are over 300,000 cyber security jobs opportunities but not enough people to fill. With more cyber attacks happen and continue to rise, this skill is critical for both governments and private companies. According to the Cybersecurity Jobs Report, the shortage may reach 1.5 million by 2020 in the U.S. and globally, the shortage could hit 6 million because every country needs this skill. Michael Kaiser, chief executive of the National Cyber Security Alliance, said: \u201cAs the Internet usage is growing faster than people who can protect it, this is the best job that makes a lot of money and lasts a very long time.\u201d<\/p>\n<p>Today cybercrime has put every government on alert because they do not know who is behind these attacks. Private companies are being a threat by hackers stealing information, holding their data for ransom, or destroying information on their computers via malware. A few months ago, the White House put out a request that \u201cThe U.S. needs immediate actions to address the growing shortage and develop a lot of well-qualified cyber security talent to protect our country.\u201d\u00a0 But this shortage is not easy to solve because it would take a long time to develop enough cyber security engineer. The issue is technology changes quickly, and the threat also changes all the time too. It is difficult to develop training programs to train people where many things are changing. A cyber security professional explained: \u201cYou have to not only learn quickly but also constantly to keep ahead of hackers and it is not easy. In this job, you learn new things every day, every week and every month.\u201d<\/p>\n<p>As cyber security professionals review networks and systems for flaws, they find themselves go against many professional hackers who are also very good at finding \u201chole\u201d to attack and the battle is becoming fierce all the time.<\/p>\n<p>Because of the critical needs, most people who work in this field receive many job offers from other companies, and some of these offers are excellent.\u00a0 People who have high skills in cyber security and leading security teams at companies can make between USD $200,000 to and USD $250,000 a year. The average salary for entry-level is about USD $110,000. People who can design, deploy and manage network security can make USD $150,000 to $180,000 a year which is much more than any other technology job.<\/p>\n<p>Before finding the job, you may need to get some trainings. There are few courses in MOOCs that you may want to consider:<\/p>\n<p><a href=\"https:\/\/www.edx.org\/course\/cyberwar-surveillance-security-adelaidex-cyber101x-0\">https:\/\/www.edx.org\/course\/cyberwar-surveillance-security-adelaidex-cyber101x-0<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.edx.org\/course\/cyber-security-economics-delftx-secon101x\">https:\/\/www.edx.org\/course\/cyber-security-economics-delftx-secon101x<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u1ed9t sinh vi\u00ean vi\u1ebft cho t\u00f4i: \u201cGi\u00e1o s\u01b0 k\u00ednh m\u1ebfn, \u0111\u00e2y l\u00e0 c\u00e2u h\u1ecfi nghi\u00eam ch\u1ec9nh, kh\u00f4ng ph\u1ea3i chuy\u1ec7n \u0111\u00f9a. Em mu\u1ed1n bi\u1ebft li\u1ec7u c\u00f3 &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,26],"tags":[],"class_list":["post-5089","post","type-post","status-publish","format-standard","hentry","category-loi-khuyen-cho-sinh-vien","category-xu-huong-cong-nghe"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/5089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5089"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/5089\/revisions"}],"predecessor-version":[{"id":5090,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/5089\/revisions\/5090"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}