Butler / Rogers / Ferratt | IT Security Interviews Exposed | E-Book | sack.de
E-Book

E-Book, Englisch, 240 Seiten, E-Book

Butler / Rogers / Ferratt IT Security Interviews Exposed

Secrets to Landing Your Next Information Security Job
1. Auflage 2007
ISBN: 978-0-470-19247-4
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Secrets to Landing Your Next Information Security Job

E-Book, Englisch, 240 Seiten, E-Book

ISBN: 978-0-470-19247-4
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



* Technology professionals seeking higher-paying security jobsneed to know security fundamentals to land the job-and this bookwill help
* Divided into two parts: how to get the job and a security crashcourse to prepare for the job interview
* Security is one of today's fastest growing IT specialties, andthis book will appeal to technology professionals looking to segueto a security-focused position
* Discusses creating a resume, dealing with headhunters,interviewing, making a data stream flow, classifying securitythreats, building a lab, building a hacker's toolkit, anddocumenting work
* The number of information security jobs is growing at anestimated rate of 14 percent a year, and is expected to reach 2.1million jobs by 2008

Butler / Rogers / Ferratt IT Security Interviews Exposed jetzt bestellen!

Weitere Infos & Material


Acknowledgments.
Introduction.
Chapter 1: Finding, Interviewing for, and Getting theJob.
Qualifications.
Pursuing a Degree.
The Perfect Job.
Job Search.
Interviewing.
Money Talks.
Accepting or Rejecting the Offer.
Summary.
Nontechnical Interview Questions.
Chapter 2: Knowing Networks: Fundamentals.
Introduction.
Questions.
Recommended Reading.
Chapter 3: Knowing Security: Fundamentals.
Adjust Your Thinking.
Core Values.
Basic Concepts.
Managing Risk.
Data Classification and Labeling.
Ethics in Information Security.
Daily Security Responsibilities.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 4: Understanding Regulations, Legislation, andGuidance.
Regulations, Legislation, and Guidance Defined.
Why Does an Employer Care?
Why Should You Care?
Government- and DoD-Specific Information.
Commercial Information Security.
Using This Information in the Interview.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 5: Knowing Firewalls: Fundamentals.
Firewall Technologies.
Major Vendors.
Device Types.
Management.
Deployment Strategies.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 6: Knowing Virtual Private Networks.
Goals and Assumptions.
The Cryptography of VPNs.
IP Security Review.
Implementing IPsec.
Alternatives to IPsec.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 7: Knowing IDS/IPS/IDP.
Introduction.
Questions.
What Questions Do You Want to Ask Me?
Recommended Reading.
Chapter 8: Everything You Ever Wanted to Know about Wirelessbut Were Afraid They' Ask.
The Fundamentals.
Wireless Cards and Chipsets.
Wireless Drivers for Linux.
WLAN Detection (WarDriving).
Wireless Security.
Rogue Wireless Devices.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 9: Finding Your Posture.
History of Information Security.
Modern Information Security.
Security Objectives.
Determining the Security Posture.
Prioritizing the Vulnerabilities.
Vulnerability Management.
Summary.
Interview Q&A.
Recommended Reading.
Chapter 10: Tools.
Enumeration, Port Scanning, and Banner Grabbing.
Wireless Enumeration.
Vulnerability Scanning.
Password Compliance Testing.
Network Sniffing.
Penetration Testing.
Learning.
Summary.
Interview Q&A.
Recommended Reading.
Additional Resources.
Index.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.