Getting an Information Security Job For Dummies
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Gregory Peter H.. Getting an Information Security Job For Dummies
Introduction
About This Book
Foolish Assumptions
Icons Used in This Book
Beyond the Book
Where to Go from Here
Part I. So You Want to Be an InfoSec Professional
Chapter 1. Securing Your Future in Information Security
Why Does Information Security Matter?
A Brief History of Cybercrime
Knowing Your Adversaries
Organizations Hiring InfoSec Professionals
Chapter 2. Understanding InfoSec Roles: One Day in the Life
Getting Security Experience Where You Are Now
Getting an Entry-level Security Position
Rolling Up Your Sleeves as a Security Practitioner
Getting to the Top in Security Management
Understanding Success in a Security Job
Chapter 3. Exploring Current Issues in Information Security
Malware and Exploits
Assaults on Organizations
Disruptive Trends
Regulatory Compliance and Privacy
Information Security Standards
Part II. Having the Right Stuff
Chapter 4. Education, Training, and Certifications
Higher Education
Vendor Certifications
Industry Certifications
Chapter 5. Key Technology Concepts
Access Control
Telecommunications and Network Security
Software Development Security
Cryptography
Physical and Environmental Security
Chapter 6. Key Management Concepts
Information Security Governance and Risk Management
Security Architecture and Design
Security Operations
Business Continuity and Disaster Recovery Planning
Legal, Regulations, Investigations, and Compliance
Part III. Finding a Job with the Right Organization
Chapter 7. Life as a Security Consultant
Is Consulting Right for You?
Working for a Consulting Firm
Going It Alone as an Independent Consultant
The Good, The Bad, and The Ugly of Consulting
Chapter 8. Working for a Security Vendor
Working in Sales as a Pre-Sales Engineer
Rolling Up Your Sleeves as an Implementation Engineer
Helping Customers in Technical Support
Watching the Fort for a Managed Security Service Provider
Chapter 9. Working as an In-House Security Professional
Living Your Destiny
Working in the Private Sector
One Size Doesn’t Fit All: Small and Large Businesses
Chaos versus Calm: Growth, Mergers, and Acquisitions
Working in Global Enterprises
Living on the Edge with a Startup
Working for a Nonprofit Organization
Chapter 10. Serving in the Public Sector or Academia
Working for a Federal, State, or Local Agency
Working for a Military or Defense Contractor
Going Back to School
Part IV
Getting Hired!
Chapter 11. Branding Yourself for Your Dream Career
Meeting People
Business Networking with LinkedIn
Networking through Facebook
Tweeting with Twitter
Starting a Blog
Writing Articles and E-Books
Segregating Your Personal and Professional Lives
Working with Recruiters
Chapter 12. Creating a Winning Resume
The Basics of a Great Resume
Formatting Your Resume
Tailoring Your Resume
Types of Resumes
What Not to Put in Your Resume
Examples of Winning Resumes
Chapter 13. Getting Attention with Your Cover Letter
Cover Letter Scenarios
Essential Elements of the Cover Letter
Chapter 14. The Interview: Bringing Your Resume to Life
Knowing Why Interviews Are Important
Being Prepared for the Interview
Types of Interviews and Tips for Each
Your Turn to Ask Questions
Focusing on the Goal
Chapter 15. After the Interview
Writing a Thank-You Letter
Following Up
Other Sources of Information about You
Negotiating the Offer
Breaking Up Is Hard to Do
Welcome Aboard!
Part V. The Part of Tens
Chapter 16. Ten Organizations for InfoSec Professionals
ASIS International
Center for Internet Security (CIS)
CERT Coordination Center (CERT/CC)
Cloud Security Alliance (CSA)
International Council of Electronic Commerce Consultants (EC-Council)
Information Systems Security Association (ISSA)
InfraGard
International Information Systems Security Certification Consortium [(ISC)2]
ISACA
SANS (System Administration, Networking, and Security) Institute
Chapter 17. Ten Security Resources to Help You Stay Current
Center for Education and Research in Information Assurance and Security (CERIAS)
Dark Reading
Department of Homeland Security (DHS) Daily Open Source Infrastructure Report
Computer Security Resource Center: NIST Special Publications
Hakin9
Information Security Magazine
ISACA Journal
Risks Digest
SANS Reading Room
Hacker's Quarterly
Chapter 18. Ten Essential Security References
Framework for Improving Critical Infrastructure Cybersecurity
Cloud Controls Matrix (CCM)
Unified Compliance Framework (UCF)
ISO27001
Open Web Application Security Project (OWASP)
Center for Internet Security (CIS)
Common Vulnerabilities and Exposures (CVE)
COBIT 5 Toolkit
U.S. and International Technology Laws
Top 125 Network Security Tools
Bonus Resource: InfoSysSec
Chapter 19. Ten Great Questions to Ask Your Interviewer
How Has Your Department Contributed to the Success of the Company?
What Are Some of the Biggest Challenges Your Department Is Facing?
What Keeps You Excited About Coming to Work Every Day?
What Do You Like About Working Here?
Can You Describe How We Would Be Working Together?
What Is the Makeup of the Team or Organization?
What Are the Key Traits of Your Most Successful Employees?
How Would You Define Success During the First 90 Days?
Do You Have Any Concerns About Me That I Can Address Now?
What Is Your Next Step in the Selection Process?
Glossary
About the Author
Dedication
Author’s Acknowledgments
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Getting an Information Security Job For Dummies®
Visit www.dummies.com/cheatsheet/gettinganinformationsecurityjob to view this book's cheat sheet.
.....
Hobbyists and enthusiasts
Because the term hacker has been maligned in recent years, I prefer to use the term computer hobbyist to describe computer enthusiasts who love to explore computers to understand more about how they work. Hackers, hobbyists, and enthusiasts – let’s agree that they’re all about the same.
.....