Introduction to US cybersecurity careers
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is v...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Massachusetts :
Syngress
2015.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629486706719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Table of contents
- Author Biography
- Contributing Editor Biography
- Chapter 1 - US Cybersecurity Jobs
- 1.1 - US cybersecurity job titles
- 1.2 - General "hacker" classifications
- 1.2.1 - White Hat Hacker
- 1.2.2 - Black Hat Hacker
- 1.2.3 - Gray Hat Hacker
- 1.2.4 - Blue Hat Hacker
- 1.2.5 - Blue and Red Teams
- 1.3 - The concept of "being bad to be good"
- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's)
- Chapter 2 - The US Cybersecurity Industry
- 2.1 - Current and expected growth of the cybersecurity industry
- 2.1.1 - Worldwide Cybersecurity Spending
- 2.1.2 - Growth Driver 1: Cybercrime
- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT)
- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue
- 2.1.5 - Growth Driver 4: Regulatory Compliance
- 2.2 - Employment opportunities
- 2.2.1 - Private Sector Demand
- 2.2.2 - Public Sector Demand
- 2.3 - 2015 Salary guide for cybersecurity professionals
- 2.4 - Entry-level positions
- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job
- 3.1 - Tip 1: develop the right attitude
- 3.2 - Tip 2: curiosity is key
- 3.3 - Tip 3: develop technical prowess
- 3.4 - Tip 4: get involved in your local community
- 3.5 - Tip 5: take part in competitions
- 3.6 - Tip 6: join newsletters and read blogs
- 3.7 - Tip 7: master popular hacking tools
- 3.8 - Tip 8: become a Kali Linux power user
- 3.9 - Tip 9: create a home lab
- 3.10 - Tip 10: become a code monkey
- 3.11 - Tip 11: find bugs!
- 3.12 - Tip 12: participate in open-source projects
- 3.13 - Tip 13: brush up on your written skills
- 3.14 - Tip 14: attend cybersecurity conferences and volunteer
- 3.15 - Tip 15: learn Linux!
- 3.16 - Tip 16: get work experience
- 3.17 - Tip 17: government sponsored initiatives.
- Chapter 4 - Networking Advice for Cybersecurity Job Seekers
- 4.1 - Using LinkedIn to secure a cybersecurity job
- 4.2 - How to identify influencers
- 4.3 - What not to do on LinkedIn
- 4.4 - Using Twitter to secure a cybersecurity job
- Chapter 5 - How to Create a Cybersecurity Resume
- 5.1 - Resume advice
- 5.1.1 - The Basics
- 5.1.2 - Making the Most of Your Skills
- 5.1.3 - Making the Most of Your Interests
- 5.1.4 - Keep Your Resume Updated
- 5.2 - Cybersecurity resume
- 5.2.1 - Federal Internship Resume Tips
- Chapter 6 - Cybersecurity Job Resources
- 6.1 - Should you do an unpaid internship?
- 6.2 - US federal internships and graduate opportunities
- Types of Internships and Opportunities
- Government Internship Opportunities with the Federal Government Intelligence Agencies
- IC Agency Employment Websites
- 6.3 - The Federal Hiring Process
- 6.4 - US private sector internships and graduate opportunities
- 6.5 - US recruitment organizations
- Chapter 7 - Interview Hacks and Tips
- 7.1 - Pitch yourself like a cyber pro by asking these questions
- 7.2 - Have anecdotes ready
- 7.3 - Be awesome to the receptionist!
- 7.4 - Organize informational interviews
- Chapter 8 - Suggested Beginner and Intermediate Cybersecurity Training and Certifications
- 8.1 - Recognized professional cybersecurity certifications
- 8.1.1 - Benefits of Certification
- 8.2 - Best schools for cybersecurity
- 8.3 - Scholarship opportunities
- Chapter 9 - Summary
- 9.1 - Wrap up and summary.