Description

Book Synopsis
  • Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help
  • Divided into two parts: how to get the job and a security crash course to prepare for the job interview
  • Security is one of today''s fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position
  • Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker''s toolkit, and documenting work
  • The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008


Trade Review
"The book is readable and written in a light, witty style". (Info Security, September 2007)

Table of Contents
Acknowledgments.

Introduction.

Chapter 1: Finding, Interviewing for, and Getting the Job.

Qualifications.

Pursuing a Degree.

The Perfect Job.

Job Search.

Interviewing.

Money Talks.

Accepting or Rejecting the Offer.

Summary.

Nontechnical Interview Questions.

Chapter 2: Knowing Networks: Fundamentals.

Introduction.

Questions.

Recommended Reading.

Chapter 3: Knowing Security: Fundamentals.

Adjust Your Thinking.

Core Values.

Basic Concepts.

Managing Risk.

Data Classification and Labeling.

Ethics in Information Security.

Daily Security Responsibilities.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 4: Understanding Regulations, Legislation, and Guidance.

Regulations, Legislation, and Guidance Defined.

Why Does an Employer Care?

Why Should You Care?

Government- and DoD-Specific Information.

Commercial Information Security.

Using This Information in the Interview.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 5: Knowing Firewalls: Fundamentals.

Firewall Technologies.

Major Vendors.

Device Types.

Management.

Deployment Strategies.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 6: Knowing Virtual Private Networks.

Goals and Assumptions.

The Cryptography of VPNs.

IP Security Review.

Implementing IPsec.

Alternatives to IPsec.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 7: Knowing IDS/IPS/IDP.

Introduction.

Questions.

What Questions Do You Want to Ask Me?

Recommended Reading.

Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask.

The Fundamentals.

Wireless Cards and Chipsets.

Wireless Drivers for Linux.

WLAN Detection (WarDriving).

Wireless Security.

Rogue Wireless Devices.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 9: Finding Your Posture.

History of Information Security.

Modern Information Security.

Security Objectives.

Determining the Security Posture.

Prioritizing the Vulnerabilities.

Vulnerability Management.

Summary.

Interview Q&A.

Recommended Reading.

Chapter 10: Tools.

Enumeration, Port Scanning, and Banner Grabbing.

Wireless Enumeration.

Vulnerability Scanning.

Password Compliance Testing.

Network Sniffing.

Penetration Testing.

Learning.

Summary.

Interview Q&A.

Recommended Reading.

Additional Resources.

Index.

IT Security Interviews Exposed

Product form

£16.99

Includes FREE delivery

RRP £19.99 – you save £3.00 (15%)

Order before 4pm tomorrow for delivery by Tue 20 Jan 2026.

A Paperback / softback by Chris Butler, Russ Rogers, Mason Ferratt

Out of stock


    View other formats and editions of IT Security Interviews Exposed by Chris Butler

    Publisher: John Wiley & Sons Inc
    Publication Date: 24/07/2007
    ISBN13: 9780471779872, 978-0471779872
    ISBN10: 0471779873

    Description

    Book Synopsis
    • Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help
    • Divided into two parts: how to get the job and a security crash course to prepare for the job interview
    • Security is one of today''s fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position
    • Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker''s toolkit, and documenting work
    • The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008


    Trade Review
    "The book is readable and written in a light, witty style". (Info Security, September 2007)

    Table of Contents
    Acknowledgments.

    Introduction.

    Chapter 1: Finding, Interviewing for, and Getting the Job.

    Qualifications.

    Pursuing a Degree.

    The Perfect Job.

    Job Search.

    Interviewing.

    Money Talks.

    Accepting or Rejecting the Offer.

    Summary.

    Nontechnical Interview Questions.

    Chapter 2: Knowing Networks: Fundamentals.

    Introduction.

    Questions.

    Recommended Reading.

    Chapter 3: Knowing Security: Fundamentals.

    Adjust Your Thinking.

    Core Values.

    Basic Concepts.

    Managing Risk.

    Data Classification and Labeling.

    Ethics in Information Security.

    Daily Security Responsibilities.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Chapter 4: Understanding Regulations, Legislation, and Guidance.

    Regulations, Legislation, and Guidance Defined.

    Why Does an Employer Care?

    Why Should You Care?

    Government- and DoD-Specific Information.

    Commercial Information Security.

    Using This Information in the Interview.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Chapter 5: Knowing Firewalls: Fundamentals.

    Firewall Technologies.

    Major Vendors.

    Device Types.

    Management.

    Deployment Strategies.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Chapter 6: Knowing Virtual Private Networks.

    Goals and Assumptions.

    The Cryptography of VPNs.

    IP Security Review.

    Implementing IPsec.

    Alternatives to IPsec.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Chapter 7: Knowing IDS/IPS/IDP.

    Introduction.

    Questions.

    What Questions Do You Want to Ask Me?

    Recommended Reading.

    Chapter 8: Everything You Ever Wanted to Know about Wireless but Were Afraid They' Ask.

    The Fundamentals.

    Wireless Cards and Chipsets.

    Wireless Drivers for Linux.

    WLAN Detection (WarDriving).

    Wireless Security.

    Rogue Wireless Devices.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Chapter 9: Finding Your Posture.

    History of Information Security.

    Modern Information Security.

    Security Objectives.

    Determining the Security Posture.

    Prioritizing the Vulnerabilities.

    Vulnerability Management.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Chapter 10: Tools.

    Enumeration, Port Scanning, and Banner Grabbing.

    Wireless Enumeration.

    Vulnerability Scanning.

    Password Compliance Testing.

    Network Sniffing.

    Penetration Testing.

    Learning.

    Summary.

    Interview Q&A.

    Recommended Reading.

    Additional Resources.

    Index.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account