Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

IT Security Interviews Exposed

Secrets to Landing Your Next Information Security Job
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780470192474
Veröffentl:
2007
Einband:
E-Book
Seiten:
240
Autor:
Chris Butler
eBook Typ:
PDF
eBook Format:
Reflowable
Kopierschutz:
2 - DRM Adobe
Sprache:
Englisch
Beschreibung:

* Technology professionals seeking higher-paying security jobsneed to know security fundamentals to land the job-and this bookwill help* Divided into two parts: how to get the job and a security crashcourse to prepare for the job interview* Security is one of today's fastest growing IT specialties, andthis book will appeal to technology professionals looking to segueto a security-focused position* Discusses creating a resume, dealing with headhunters,interviewing, making a data stream flow, classifying securitythreats, building a lab, building a hacker's toolkit, anddocumenting work* The number of information security jobs is growing at anestimated rate of 14 percent a year, and is expected to reach 2.1million jobs by 2008
Acknowledgments.Introduction.Chapter 1: Finding, Interviewing for, and Getting theJob.Qualifications.Pursuing a Degree.The Perfect Job.Job Search.Interviewing.Money Talks.Accepting or Rejecting the Offer.Summary.Nontechnical Interview Questions.Chapter 2: Knowing Networks: Fundamentals.Introduction.Questions.Recommended Reading.Chapter 3: Knowing Security: Fundamentals.Adjust Your Thinking.Core Values.Basic Concepts.Managing Risk.Data Classification and Labeling.Ethics in Information Security.Daily Security Responsibilities.Summary.Interview Q&A.Recommended Reading.Chapter 4: Understanding Regulations, Legislation, andGuidance.Regulations, Legislation, and Guidance Defined.Why Does an Employer Care?Why Should You Care?Government- and DoD-Specific Information.Commercial Information Security.Using This Information in the Interview.Summary.Interview Q&A.Recommended Reading.Chapter 5: Knowing Firewalls: Fundamentals.Firewall Technologies.Major Vendors.Device Types.Management.Deployment Strategies.Summary.Interview Q&A.Recommended Reading.Chapter 6: Knowing Virtual Private Networks.Goals and Assumptions.The Cryptography of VPNs.IP Security Review.Implementing IPsec.Alternatives to IPsec.Summary.Interview Q&A.Recommended Reading.Chapter 7: Knowing IDS/IPS/IDP.Introduction.Questions.What Questions Do You Want to Ask Me?Recommended Reading.Chapter 8: Everything You Ever Wanted to Know about Wirelessbut Were Afraid They' Ask.The Fundamentals.Wireless Cards and Chipsets.Wireless Drivers for Linux.WLAN Detection (WarDriving).Wireless Security.Rogue Wireless Devices.Summary.Interview Q&A.Recommended Reading.Chapter 9: Finding Your Posture.History of Information Security.Modern Information Security.Security Objectives.Determining the Security Posture.Prioritizing the Vulnerabilities.Vulnerability Management.Summary.Interview Q&A.Recommended Reading.Chapter 10: Tools.Enumeration, Port Scanning, and Banner Grabbing.Wireless Enumeration.Vulnerability Scanning.Password Compliance Testing.Network Sniffing.Penetration Testing.Learning.Summary.Interview Q&A.Recommended Reading.Additional Resources.Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga