0

My Bag

0.00

Download App

It Security Interviews Exposed: Secrets To Landing Your Next Information Security Job 6.0%OFF

It Security Interviews Exposed: Secrets To Landing Your Next Information Security Job

by Chris Butler Russ Rogers Mason Ferratt Greg Miles Ed Fuller Chris Hurley Rob Cameron Brian Kirouac

  • ISBN

    :  

    9788126513871

  • Publisher

    :  

    Wiley India Pvt Ltd

  • Binding

    :  

    paperback

  • Pages

    :  

    238

  • Year

    :  

    2007

179.0

6.0% OFF

168.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    This book is a Security Crash Course to prepare for the all-important job interview, where even technology professionals seeking the higher-paying coveted security jobs, will have to know security fundamentals to land the job.

  • Author Biography

    Chris Butler is a Network Security engineering and management professional responsible for projects and staffing at leading companies such as Edward Jones, Discovery Communications, GCI, OPNET, Butler University. He is certified as a CISSP, CCNA, and CCSE/CCSA Checkpoint Expert. Russ Rogers is Principal Security Consultant for Security Horizon with contract support for the National Security Agency and the Defense Information Systems Agency. He is editor-in-chief of The Security Journal and Professor of Network Security at the University of Advancing Technology in Tempe, AZ and co-founder of the Security Tribe information security research web site at www.securitytribe.com. Greg Miles Ph.D., CISSP, CISM, IAM, is VP of Security Horizon with years of information security experience in Federal and commercial sectors and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and NASA. Greg holds a Ph.D. in Engineering Management, a Masters in Business Administration, and a Bachelors in Electrical Engineering. Mason Ferratt MSEE, BSME is a senior network security analyst with large-scale network security engineering experience for numerous government clients. He holds an MS in Electrical Engineering and BS in Mechanical Engineering, holds a Top Secret/SCI clearance, and is an IEEE member. Chris Hurley (Roamer) is a Senior Penetration Tester. He is the founder of WorldWide WarDrive, spurred by security professionals and hobbyists to generate awareness of insecurities in wireless networks and is the lead of DEF CON's WarDriving Conest. Ed Fuller CISSP, GSEC, IAM , has over 26 years of experience in Operations, Tactical, and Computer Information Systems and Security. Ed serves as a Lead Instructor for the National Security Agencies (NSA) Information Assurance Methodology (IAM). Ed holds a B.S. degree in Information Systems Management, certification in SANS GSEC and CISSP. Table of Contents  Acknowledgments.  Introduction. Chapter 1: Finding, Interviewing for, and Getting the Job.           o Qualifications.           o Pursuing a Degree.           o The Perfect Job.           o Job Search.           o Interviewing.           o Money Talks.           o Accepting or Rejecting the Offer.           o Summary.           o Nontechnical Interview Questions. Chapter 2: Knowing Networks: Fundamentals.           o Introduction.           o Questions.           o Recommended Reading. Chapter 3: Knowing Security: Fundamentals.           o Adjust Your Thinking.           o Core Values.           o Basic Concepts.           o Managing Risk.           o Data Classification and Labeling.           o Ethics in Information Security.           o Daily Security Responsibilities.           o Summary.           o Interview Q&A.           o Recommended Reading. Chapter 4: Understanding Regulations, Legislation, and Guidance.           o Regulations, Legislation, and Guidance Defined.           o Why Does an Employer Care?           o Why Should You Care?           o Government- and DoD-Specific Information.           o Commercial Information Security.           o Using This Information in the Interview.           o Summary.           o Interview Q&A.           o Recommended Reading. Chapter 5: Knowing Firewalls: Fundamentals.           o Firewall Technologies.           o Major Vendors.           o Device Types.           o Management.           o Deployment Strategies.           o Summary.           o Interview Q&A.           o Recommended Reading. Chapter 6: Knowing Virtual Private Networks.           o Goals and Assumptions.           o The Cryptography of VPNs.           o IP Security Review.           o Implementing IPsec.           o Alternatives to IPsec.           o Summary.           o Interview Q&A.           o Recommended Reading. Chapter 7: Knowing IDS/IPS/IDP.           o Introduction.           o Questions.           o What Questions Do You Want to Ask Me?           o Recommended Reading. Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask.           o The Fundamentals.           o Wireless Cards and Chipsets.           o Wireless Drivers for Linux.           o WLAN Detection (WarDriving).           o Wireless Security.           o Rogue Wireless Devices.           o Summary.           o Interview Q&A.           o Recommended Reading. Chapter 9: Finding Your Posture.           o History of Information Security.           o Modern Information Security.           o Security Objectives.           o Determining the Security Posture.           o Prioritizing the Vulnerabilities.           o Vulnerability Management.           o Summary.           o Interview Q&A.           o Recommended Reading. Chapter 10: Tools.           o Enumeration, Port Scanning, and Banner Grabbing.           o Wireless Enumeration.           o Vulnerability Scanning.           o Password Compliance Testing.           o Network Sniffing.           o Penetration Testing.           o Learning.           o Summary.           o Interview Q&A.           o Recommended Reading.           o Additional Resources.           o Index.  

Related Items

-

of

  • OFFER

    Network Security,A Hackers Perspective

    Ankit Fadia

    Starts At

    375.0

    399.0

    6% OFF

  • OFFER

    Professional Asp.Net 3.5 Security, Membership, And Role Management With C# And Vb

    Bilal Haidar

    Starts At

    545.0

    699.0

    22% OFF

  • OFFER

    Administering Windows Vista Security:The Big Surprises

    Byron Hynes Mark Minasi

    Starts At

    314.0

    349.0

    10% OFF

  • OFFER

    Cryptography & Network Security

    Atul Kahate

    Starts At

    323.0

    410.0

    21% OFF

  • OFFER

    Network Security Essentials : Applications and Standards

    William Stallings

    Starts At

    486.0

    649.0

    25% OFF

  • OFFER

    RFID Handbook:Applications, Technology, Security, and Privacy

    Syed A. Ahson

    Starts At

    2660.0

    3500.0

    24% OFF

  • OFFER

    Use of Risk Analysis in Computer-Aided Persuasion (Nato Science for Peace and Security Series: E: Human and Societal Dynamics)

    E. Duman

    Starts At

    10890.0

    12663.0

    14% OFF

  • OFFER

    Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes: Volume 23 NATO Science for Peace and Security Series - D: Information ... D: Information and Communication Security)

    B. Preneel

    Starts At

    9276.0

    10787.0

    14% OFF

  • OFFER

    Engineering Methods and Tools for Software Safety and Security - Volume 22 NATO Science for Peace and Security Series -D: Information and Communication Security

    W. Sitou and T. Hoare

    Starts At

    8892.0

    11256.0

    21% OFF

  • OFFER

    Handbook of Security and Networks

    Yang Xiao

    Starts At

    22814.0

    26528.0

    14% OFF

  • Open Source for Windows Administrators (Administrator's Advantage Series) (Charles River Media Networking/Security)

    Christian Gross

    Starts At

    4261.0

  • OFFER

    Internet Security Protocols: Protecting IP Traffic

    Uyless D. Black

    Starts At

    224.0

    295.0

    24% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 1 Item

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary