Getting an Information Security Job For Dummies

Author:

Language: English

Approximative price 27.34 €

In Print (Delivery period: 14 days).

Add to cartAdd to cart
Publication date:
336 p. · 18.5x23.4 cm · Paperback
Get prepared for your Information Security job search!

Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, and much more.
  • Covers the certifications needed for various jobs in the Information Security field
  • Offers guidance on writing an attention-getting resume
  • Provides access to helpful videos, along with other online bonus materials
  • Offers advice on branding yourself and securing your future in Information Security
If you're a student, recent graduate, or professional looking to break into the field of Information Security, this hands-on, friendly guide has you covered.

Introduction 1

About This Book 1

Foolish Assumptions 2

Icons Used in This Book 2

Beyond the Book 3

Where to Go from Here 3

Part I: So You Want to Be an InfoSec Professional 5

Chapter 1: Securing Your Future in Information Security 7

Chapter 2: Understanding InfoSec Roles: One Day in the Life 21

Chapter 3: Exploring Current Issues in Information Security 41

Part II: Having the Right Stuff 67

Chapter 4: Education, Training, and Certifications 69

Chapter 5: Key Technology Concepts 103

Chapter 6: Key Management Concepts 131

Part III: Finding a Job with the Right Organization 155

Chapter 7: Life as a Security Consultant 157

Chapter 8: Working for a Security Vendor 165

Chapter 9: Working as an In-House Security Professional 169

Chapter 10: Serving in the Public Sector or Academia 177

Part IV: Getting Hired! 183

Chapter 11: Branding Yourself for Your Dream Career 185

Chapter 12: Creating a Winning Resume 207

Chapter 13: Getting Attention with Your Cover Letter 227

Chapter 14: The Interview: Bringing Your Resume to Life 237

Chapter 15: After the Interview 251

Part V: The Part of Tens 269

Chapter 16: Ten Organizations for InfoSec Professionals 271

Chapter 17: Ten Security Resources to Help You Stay Current 277

Chapter 18: Ten Essential Security References 281

Chapter 19: Ten Great Questions to Ask Your Interviewer 285

Glossary 293

Index 311

This book appeals to all prospective employees in Information Security careers seeking to (1) understand the field of Information Security, (2) acquire the necessary certifications, education and skills associated with a career in Information Security and (3) brand themselves as strong, competitive candidates so as to achieve success in the Information Security job market. In 2013, there were 209,749 U.S. job postings in Information Security, a number that grew 74% from its 2007 figure and which surpassed six–year growth trends in other IT positions by a multiple of nearly 2.5, according to a Burning Glass Technologies report.

Peter H. Gregory, CISSP, CISA, CRISC, C|CISO, CCSK, QSA, is a director of strategic services at a national security consulting firm and the author of over thirty books on security and emerging technology. He is an advisory board member and lead instructor at the University of Washington continuing education program in information systems security.