Introduction to US Cybersecurity Careers.
Material type:
- text
- computer
- online resource
- 9780128027431
- 005.8023/73
- TK5105.59 -- .D359 2015eb
Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! -- 3.12 - Tip 12: participate in open-source projects -- 3.13 - Tip 13: brush up on your written skills -- 3.14 - Tip 14: attend cybersecurity conferences and volunteer -- 3.15 - Tip 15: learn Linux! -- 3.16 - Tip 16: get work experience -- 3.17 - Tip 17: government sponsored initiatives.
Chapter 4 - Networking Advice for Cybersecurity Job Seekers -- 4.1 - Using LinkedIn to secure a cybersecurity job -- 4.2 - How to identify influencers -- 4.3 - What not to do on LinkedIn -- 4.4 - Using Twitter to secure a cybersecurity job -- Chapter 5 - How to Create a Cybersecurity Resume -- 5.1 - Resume advice -- 5.1.1 - The Basics -- 5.1.2 - Making the Most of Your Skills -- 5.1.3 - Making the Most of Your Interests -- 5.1.4 - Keep Your Resume Updated -- 5.2 - Cybersecurity resume -- 5.2.1 - Federal Internship Resume Tips -- Chapter 6 - Cybersecurity Job Resources -- 6.1 - Should you do an unpaid internship? -- 6.2 - US federal internships and graduate opportunities -- Types of Internships and Opportunities -- Government Internship Opportunities with the Federal Government Intelligence Agencies -- IC Agency Employment Websites -- 6.3 - The Federal Hiring Process -- 6.4 - US private sector internships and graduate opportunities -- 6.5 - US recruitment organizations -- Chapter 7 - Interview Hacks and Tips -- 7.1 - Pitch yourself like a cyber pro by asking these questions -- 7.2 - Have anecdotes ready -- 7.3 - Be awesome to the receptionist! -- 7.4 - Organize informational interviews -- Chapter 8 - Suggested Beginner and Intermediate Cybersecurity Training and Certifications -- 8.1 - Recognized professional cybersecurity certifications -- 8.1.1 - Benefits of Certification -- 8.2 - Best schools for cybersecurity -- 8.3 - Scholarship opportunities -- Chapter 9 - Summary -- 9.1 - Wrap up and summary.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.