Acknowledgments | |
Introduction | |
Finding, Interviewing for, and Getting the Job | |
Qualifications | |
Pursuing a Degree | |
The Perfect Job | |
Job Search | |
Interviewing | |
Money Talks | |
Accepting or Rejecting the Offer | |
Summary | |
Nontechnical Interview Questions | |
Knowing Networks: Fundamentals | |
Introduction | |
Questions | |
Recommended Reading | |
Knowing Security: Fundamentals | |
Adjust Your Thinking | |
Core Values | |
Basic Concepts | |
Managing Risk | |
Data Classification and Labeling | |
Ethics in Information Security | |
Daily Security Responsibilities | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Understanding Regulations, Legislation, and Guidance | |
Regulations, Legislation, and Guidance Defined | |
Why Does an Employer Care? | |
Why Should You Care? | |
Government- and DoD-Specific Information | |
Commercial Information Security | |
Using This Information in the Interview | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Knowing Firewalls: Fundamentals | |
Firewall Technologies | |
Major Vendors | |
Device Types | |
Management | |
Deployment Strategies | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Knowing Virtual Private Networks | |
Goals and Assumptions | |
The Cryptography of VPNs | |
IP Security Review | |
Implementing IPsec | |
Alternatives to IPsec | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Knowing IDS/IPS/IDP | |
Introduction | |
Questions | |
What Questions Do You Want to Ask Me? | |
Recommended Reading | |
Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask | |
The Fundamentals | |
Wireless Cards and Chipsets | |
Wireless Drivers for Linux | |
WLAN Detection (WarDriving) | |
Wireless Security | |
Rogue Wireless Devices | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Finding Your Posture | |
History of Information Security | |
Modern Information Security | |
Security Objectives | |
Determining the Security Posture | |
Prioritizing the Vulnerabilities | |
Vulnerability Management | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Tools | |
Enumeration, Port Scanning, and Banner Grabbing | |
Wireless Enumeration | |
Vulnerability Scanning | |
Password Compliance Testing | |
Network Sniffing | |
Penetration Testing | |
Learning | |
Summary | |
Interview Q&A | |
Recommended Reading | |
Additional Resources | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |