Chris Butler et al, IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
Wiley | ISBN: 0471779873 | July 23, 2007 | 218 pages | PDF | 1.7 MB
Wiley | ISBN: 0471779873 | July 23, 2007 | 218 pages | PDF | 1.7 MB
- Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help
- Divided into two parts: how to get the job and a security crash course to prepare for the job interview
- Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position
- Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting work
- The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008
From the Back Cover
It's not a job. It's THE job, and here's how to get it.
What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?
Here's the crash course in how to discover, apply for, and land the IT security job you want. Written by a squad of highly credentialed security professionals, this guide prepares you with the technical knowledge, interview skills, strategies, and job search techniques you need to find and get the perfect job.
Meet every job search challenge
* What does — and doesn't — belong on your résumé
* How to survive a telephone interview
* All about firewall technologies, devices, deployment strategies, and management
* A review of security essentials, regulations, legislation, and guidelines
* The effects of state cyber security laws, Sarbanes-Oxley, and international standards
* A refresher course in network fundamentals
* Everything you should know about wireless, security posture, and tools
* When and how to say "no"