Chris Butler & Russ Rogers 
IT Security Interviews Exposed [PDF ebook] 
Secrets to Landing Your Next Information Security Job

Підтримка
* Technology professionals seeking higher-paying security jobs
need to know security fundamentals to land the job-and this book
will help

* Divided into two parts: how to get the job and a security crash
course to prepare for the job interview

* Security is one of today’s fastest growing IT specialties, and
this book will appeal to technology professionals looking to segue
to a security-focused position

* Discusses creating a resume, dealing with headhunters,
interviewing, making a data stream flow, classifying security
threats, building a lab, building a hacker’s toolkit, and
documenting work

* The number of information security jobs is growing at an
estimated rate of 14 percent a year, and is expected to reach 2.1
million jobs by 2008
€20.99
методи оплати

Зміст

Acknowledgments.

Introduction.

Chapter 1: Finding, Interviewing for, and Getting the
Job.

Qualifications.

Pursuing a Degree.

The Perfect Job.

Job Search.

Interviewing.

Money Talks.

Accepting or Rejecting the Offer.

Summary.

Nontechnical Interview Questions.

Chapter 2: Knowing Networks: Fundamentals.

Introduction.

Questions.

Recommended Reading.

Chapter 3: Knowing Security: Fundamentals.

Adjust Your Thinking.

Core Values.

Basic Concepts.

Managing Risk.

Data Classification and Labeling.

Ethics in Information Security.

Daily Security Responsibilities.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 4: Understanding Regulations, Legislation, and
Guidance.

Regulations, Legislation, and Guidance Defined.

Why Does an Employer Care?

Why Should You Care?

Government- and Do D-Specific Information.

Commercial Information Security.

Using This Information in the Interview.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 5: Knowing Firewalls: Fundamentals.

Firewall Technologies.

Major Vendors.

Device Types.

Management.

Deployment Strategies.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 6: Knowing Virtual Private Networks.

Goals and Assumptions.

The Cryptography of VPNs.

IP Security Review.

Implementing IPsec.

Alternatives to IPsec.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 7: Knowing IDS/IPS/IDP.

Introduction.

Questions.

What Questions Do You Want to Ask Me?

Recommended Reading.

Chapter 8: Everything You Ever Wanted to Know about Wireless
but Were Afraid They’ Ask.

The Fundamentals.

Wireless Cards and Chipsets.

Wireless Drivers for Linux.

WLAN Detection (War Driving).

Wireless Security.

Rogue Wireless Devices.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 9: Finding Your Posture.

History of Information Security.

Modern Information Security.

Security Objectives.

Determining the Security Posture.

Prioritizing the Vulnerabilities.

Vulnerability Management.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 10: Tools.

Enumeration, Port Scanning, and Banner Grabbing.

Wireless Enumeration.

Vulnerability Scanning.

Password Compliance Testing.

Network Sniffing.

Penetration Testing.

Learning.

Summary.

Interview Q&A.

Recommended Reading.

Additional Resources.

Index.
Придбайте цю електронну книгу та отримайте ще 1 БЕЗКОШТОВНО!
Мова Англійська ● Формат PDF ● Сторінки 240 ● ISBN 9780470192474 ● Розмір файлу 2.5 MB ● Видавець John Wiley & Sons ● Опубліковано 2007 ● Видання 1 ● Завантажувані 24 місяців ● Валюта EUR ● Посвідчення особи 2315308 ● Захист від копіювання Adobe DRM
Потрібен читач електронних книг, що підтримує DRM

Більше електронних книг того самого автора / Редактор

3 367 Електронні книги в цій категорі