Warenkorb
€ 0,00 0 Buch dabei,
portofrei

It Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

Sprache: Englisch.
Taschenbuch
It's not a job. It's THE job, and here's how to get it.

What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What … weiterlesen
Taschenbuch

27,99*

inkl. MwSt.
Portofrei
Lieferbar innerhalb von zwei Wochen
It Security Interviews Exposed: Secrets to Landing Your Next Information Security Job als Taschenbuch

Produktdetails

Titel: It Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
Autor/en: Chris Butler, Russ Rogers, Mason Ferratt

ISBN: 0471779873
EAN: 9780471779872
Sprache: Englisch.
JOHN WILEY & SONS INC

September 2007 - kartoniert - 218 Seiten

Beschreibung

It's not a job. It's THE job, and here's how to get it.

What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?

Here's the crash course in how to discover, apply for, and land the IT security job you want. Written by a squad of highly credentialed security professionals, this guide prepares you with the technical knowledge, interview skills, strategies, and job search techniques you need to find and get the perfect job.

Meet every job search challenge

* What does -- and doesn't -- belong on your résumé
*

How to survive a telephone interview
*

All about firewall technologies, devices, deployment strategies, and management
*

A review of security essentials, regulations, legislation, and guidelines
*

The effects of state cyber security laws, Sarbanes-Oxley, and international standards
*

A refresher course in network fundamentals
*

Everything you should know about wireless, security posture, and tools
*

When and how to say "no"

Inhaltsverzeichnis

Acknowledgments.

Introduction.

Chapter 1: Finding, Interviewing for, and Getting the Job.

Qualifications.

Pursuing a Degree.

The Perfect Job.

Job Search.

Interviewing.

Money Talks.

Accepting or Rejecting the Offer.

Summary.

Nontechnical Interview Questions.

Chapter 2: Knowing Networks: Fundamentals.

Introduction.

Questions.

Recommended Reading.

Chapter 3: Knowing Security: Fundamentals.

Adjust Your Thinking.

Core Values.

Basic Concepts.

Managing Risk.

Data Classification and Labeling.

Ethics in Information Security.

Daily Security Responsibilities.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 4: Understanding Regulations, Legislation, and Guidance.

Regulations, Legislation, and Guidance Defined.

Why Does an Employer Care?

Why Should You Care?

Government- and DoD-Specific Information.

Commercial Information Security.

Using This Information in the Interview.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 5: Knowing Firewalls: Fundamentals.

Firewall Technologies.

Major Vendors.

Device Types.

Management.

Deployment Strategies.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 6: Knowing Virtual Private Networks.

Goals and Assumptions.

The Cryptography of VPNs.

IP Security Review.

Implementing IPsec.

Alternatives to IPsec.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 7: Knowing IDS/IPS/IDP.

Introduction.

Questions.

What Questions Do You Want to Ask Me?

Recommended Reading.

Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask.

The Fundamentals.

Wireless Cards and Chipsets.

Wireless Drivers for Linux.

WLAN Detection (WarDriving).

Wireless Security.

Rogue Wireless Devices.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 9: Finding Your Posture.

History of Information Security.

Modern Information Security.

Security Objectives.

Determining the Security Posture.

Prioritizing the Vulnerabilities.

Vulnerability Management.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 10: Tools.

Enumeration, Port Scanning, and Banner Grabbing.

Wireless Enumeration.

Vulnerability Scanning.

Password Compliance Testing.

Network Sniffing.

Penetration Testing.

Learning.

Summary.

Interview Q&A.

Recommended Reading.

Additional Resources.

Index.

Portrait

The Experts
Chris Butler, CISSPSenior Solutions Architect, Intellitactics
Russ Rogers, CISSP Senior Cyber Security Analyst
Mason Ferratt, JNCIS-FWVFederal Systems Engineer, Juniper Networks
Greg Miles, CISSP President/Principal Consultant, Security Horizon
Ed Fuller, CISSP COO/Principal Consultant, Security Horizon
Chris Hurley, NSA IAM/IEM Senior Penetration Tester
Rob Cameron, JNCIS-FWV Security Solutions Engineer, Juniper Networks
Brian Kirouac, CISSP Principal Security Consultant, Security Horizon


Pressestimmen

"The book is readable and written in a light, witty style". (Info Security, September 2007)
Servicehotline
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
Filialhotline
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.
** Deutschsprachige eBooks und Bücher dürfen aufgrund der in Deutschland geltenden Buchpreisbindung und/oder Vorgaben von Verlagen nicht rabattiert werden. Soweit von uns deutschsprachige eBooks und Bücher günstiger angezeigt werden, wurde bei diesen kürzlich von den Verlagen der Preis gesenkt oder die Buchpreisbindung wurde für diese Titel inzwischen aufgehoben. Angaben zu Preisnachlässen beziehen sich auf den dargestellten Vergleichspreis.