+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Breaking into Information Security

  • ID: 2899365
  • Book
  • 268 Pages
  • Elsevier Science and Technology
1 of 3

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.

Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there.

From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

  • The most practical guide to starting your career in information security, or advancing to the next level
  • Presented in a "level-up” gaming framework for career progression, with a "Learn, Do, Teach” approach through three tiers of InfoSec jobs
  • Provides examples of specific roles and career paths in each job tier so you can identify and max out skills for the role you want
  • Learn how to advance to management and training roles, as well as the specific skills you need to become an independent consultant
  • Find out about career "booster paths" to help you advance your career at high speed

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 3

Tier 00: Career Basics

Tier 01: Learn

Tier 02: Do

Tier 03: Teach
Leading Others and Lateral Career Paths

Tier 04: Career Booster Paths


Note: Product cover images may vary from those shown
3 of 3


4 of 3
More, Josh
Josh has over fifteen years of experience in IT, and ten years working in Security. Though today, he primarily works as a security consultant, he has also worked in roles ranging from user to developer to system administrator. He holds several security and technical certifications and serves in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssoftware.com. As security works best from a holistic approach, he works all angles: risk assessments, posture analysis, incident response, malware analysis, infrastructure defense, system forensics, employee training and business strategy. Josh More works at RJS Software Systems, a national data management and security company.
Stieber, Anthony J.
Anthony J. Stieber has over 18 years of experience in the information technology industry working in academia, banks, retail, and insurance; designing enterprise security architectures, installing military and commercial firewalls; engineering medical diagnostic systems; reverse-engineering Internet stores; encrypting Fortune 100 enterprises; providing expertise for court cases; speaking at information security conferences; becoming an apprentice locksmith and a published writer.
Liu, Chris
Chris Liu has over 15 years of information technology experience, a CISSP, CISM, and no idea how he ended up where is. He has been a help desk technician, network administrator, quality assurance engineer, release manager, IT manager, instructor, developer, consultant, and product development manager, and is currently an information security professional. He is proof that careers sometimes only make sense in retrospect.
Note: Product cover images may vary from those shown