IT Security Interviews Exposed

IT Security Interviews Exposed

Secrets to Landing Your Next Information Security Job

Butler, Chris; Hurley, Chris; Kirouac, Brian; Rogers, Russ; Ferratt, Mason; Cameron, Rob; Miles, Greg; Fuller, Ed

John Wiley & Sons Inc

07/2007

240

Mole

Inglês

9780471779872

15 a 20 dias

1002

Descrição não disponível.
Acknowledgments. Introduction.

Chapter 1: Finding, Interviewing for, and Getting the Job.

Qualifications.

Pursuing a Degree.

The Perfect Job.

Job Search.

Interviewing.

Money Talks.

Accepting or Rejecting the Offer.

Summary.

Nontechnical Interview Questions.

Chapter 2: Knowing Networks: Fundamentals.

Introduction.

Questions.

Recommended Reading.

Chapter 3: Knowing Security: Fundamentals.

Adjust Your Thinking.

Core Values.

Basic Concepts.

Managing Risk.

Data Classification and Labeling.

Ethics in Information Security.

Daily Security Responsibilities.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 4: Understanding Regulations, Legislation, and Guidance.

Regulations, Legislation, and Guidance Defined.

Why Does an Employer Care?

Why Should You Care?

Government- and DoD-Specific Information.

Commercial Information Security.

Using This Information in the Interview.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 5: Knowing Firewalls: Fundamentals.

Firewall Technologies.

Major Vendors.

Device Types.

Management.

Deployment Strategies.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 6: Knowing Virtual Private Networks.

Goals and Assumptions.

The Cryptography of VPNs.

IP Security Review.

Implementing IPsec.

Alternatives to IPsec.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 7: Knowing IDS/IPS/IDP.

Introduction.

Questions.

What Questions Do You Want to Ask Me?

Recommended Reading.

Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask.

The Fundamentals.

Wireless Cards and Chipsets.

Wireless Drivers for Linux.

WLAN Detection (WarDriving).

Wireless Security.

Rogue Wireless Devices.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 9: Finding Your Posture.

History of Information Security.

Modern Information Security.

Security Objectives.

Determining the Security Posture.

Prioritizing the Vulnerabilities.

Vulnerability Management.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 10: Tools.

Enumeration, Port Scanning, and Banner Grabbing.

Wireless Enumeration.

Vulnerability Scanning.

Password Compliance Testing.

Network Sniffing.

Penetration Testing.

Learning.

Summary.

Interview Q&A.

Recommended Reading.

Additional Resources.

Index.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
job; ideal; employers expect; affects; skills; much experience; discover; crash course; credentialed; highly; squad; guide; knowledge; prepares; technical; techniques; search; perfect; every; telephone; interview; review