What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven′t had much experience? What if you′re not 30 anymore?
Here′s the crash course in how to discover, apply for, and land the IT security job you want. Written by a squad of highly credentialed security professionals, this guide prepares you with the technical knowledge, interview skills, strategies, and job search techniques you need to find and get the perfect job.
Meet every job search challenge
- What does and doesn′t belong on your résumé
How to survive a telephone interview
All about firewall technologies, devices, deployment strategies, and management
A review of security essentials, regulations, legislation, and guidelines
The effects of state cyber security laws, Sarbanes–Oxley, and international standards
A refresher course in network fundamentals
Everything you should know about wireless, security posture, and tools
When and how to say "no"
Chapter 1: Finding, Interviewing for, and Getting the Job.
Pursuing a Degree.
The Perfect Job.
Accepting or Rejecting the Offer.
Nontechnical Interview Questions.
Chapter 2: Knowing Networks: Fundamentals.
Chapter 3: Knowing Security: Fundamentals.
Adjust Your Thinking.
Data Classification and Labeling.
Ethics in Information Security.
Daily Security Responsibilities.
Chapter 4: Understanding Regulations, Legislation, and Guidance.
Regulations, Legislation, and Guidance Defined.
Why Does an Employer Care?
Why Should You Care?
Government– and DoD–Specific Information.
Commercial Information Security.
Using This Information in the Interview.
Chapter 5: Knowing Firewalls: Fundamentals.
Chapter 6: Knowing Virtual Private Networks.
Goals and Assumptions.
The Cryptography of VPNs.
IP Security Review.
Alternatives to IPsec.
Chapter 7: Knowing IDS/IPS/IDP.
What Questions Do You Want to Ask Me?
Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They′ Ask.
Wireless Cards and Chipsets.
Wireless Drivers for Linux.
WLAN Detection (WarDriving).
Rogue Wireless Devices.
Chapter 9: Finding Your Posture.
History of Information Security.
Modern Information Security.
Determining the Security Posture.
Prioritizing the Vulnerabilities.
Chapter 10: Tools.
Enumeration, Port Scanning, and Banner Grabbing.
Password Compliance Testing.