Book description
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.
Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there.
From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
- The most practical guide to starting your career in information security, or advancing to the next level
- Presented in a “level-up gaming framework for career progression, with a “Learn, Do, Teach approach through three tiers of InfoSec jobs
- Provides examples of specific roles and career paths in each job tier so you can identify and max out skills for the role you want
- Learn how to advance to management and training roles, as well as the specific skills you need to become an independent consultant
- Find out about career "booster paths" to help you advance your career at high speed
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Author Biographies
- Acknowledgments
- Chapter 0.1: Introduction
- Chapter 0.2: Models
- Chapter 0.3: Model Failures
- Chapter 1.0: Tier 1—Learn
- Chapter 1.1: Tier 1—Log Reviewer
- Chapter 1.2: Tier 1—Patch Management
- Chapter 1.3: Tier 1—Help Desk
- Chapter 1.3.1: Tier 1—Help Desk—Story
- Chapter 1.4: Tier 1—Coder/Developer
- Chapter 1.5: Tier 1—System Administrator
- Chapter 1.5.1: Tier 1— System Administrator Story
- Chapter 1.6: Tier 1—Network Administrator
- Chapter 1.6.1: Tier 1—Network Administrator
- Chapter 1.7: Tier 1—Security Coordinator
- Chapter 1.8: Tier 1—Trainer-Educator
- Chapter 1.8.1: Tier 1—Trainer-Educator
- Chapter 1.9: Tier 1—Quality Tester
- Chapter 1.9.1: Tier 1—Quality Tester Story
- Chapter 1.a: Tier 1—Subject Matter Specialist
- Chapter 2.0: Tier 2.0—Do
- Chapter 2.1: Tier 2—Pen Tester
- Chapter 2.2: Tier 2—Vulnerability Management
- Chapter 2.3: Tier 2—Security Assessor
- Chapter 2.4: Tier 2—Risk Assessor
- Chapter 2.5: Tier 2—Auditor
- Chapter 2.6: Tier 2—Incident Responder
- Chapter 2.6.1: Tier 2—Incident Responder—Story
- Chapter 2.7: Tier 2—Wildcard
- Chapter 2.7.1: Tier 2—Wildcard—Story
- Chapter 2.8: Tier 2—Advanced Help Desk—Help Desk Supervisor
- Chapter 2.9: Tier 2—Security Facilitator
- Chapter 2.9.1: Tier 2—Security Facilitator—Story
- Chapter 2.a: Tier 2—Policy Administrator
- Chapter 2.b: Tier 2—Trainer-Educator
- Chapter 2.c: Tier 2—Quality Assurance
- Chapter 2.d: Tier 2—Subject Matter Expert
- Chapter 2.d.1: Tier 2—Subject Matter Expert—Story
- Chapter 2.e: Tier 2—Lateral: Physical Security
- Chapter 2.f: Tier 2—Lateral: Military
- Chapter 2.g: Tier 2—Lateral: Law Enforcement
- Chapter 2.g.1: Tier 2—Lateral: Law Enforcement—Story
- Chapter 2.h: Tier 2—Lateral: Legal—Lawyers
- Chapter 2.i: Tier 2—Lateral: Sales
- Chapter 2.j: Tier 2—Lateral: Project Management
- Chapter 2.k: Tier 2—Lateral: Non-IT Engineering—Architecture—Science
- Chapter 2.l: Tier 2—Lateral: Accounting
- Chapter 2.m: Tier 2—Lateral: Business Analyst
- Chapter 3.0: Tier 3—Teach
- Chapter 3.1: Tier 3—Pen Test Lead
- Chapter 3.2: Tier 3—Security Architect
- Chapter 3.3: Tier 3—Lead Auditor
- Chapter 3.4: Tier 3—Lead Security-Risk Assessor
- Chapter 3.5: Tier 3—Tiger Team Member—Tiger Team Lead (Red Team)
- Chapter 3.6: Tier 3—Security Consultant
- Chapter 3.7: Tier 3—Security Management (CSO, CISO, CPO)
- Chapter 3.8: Tier 3—Lateral: CPA
- Chapter 3.a: Tier 3—Lateral: General Management
- Chapter 3.b: Tier 3—Lateral: Technical Architect
- Chapter 3.c: Tier 3—Lateral: Entrepreneur
- Chapter 3.c.1: Tier 3—Lateral: Entrepreneur—Story
- Chapter 3.d: Tier 3—Lateral: Academia
- Chapter 4.0: Boosting
- Chapter 4.1: Boosting—Author (Blogs, Magazines, Books)
- Chapter 4.2: Boosting—Developer (Open Source)
- Chapter 4.3: Boosting—Developer/Entrepreneur (Closed or Open Source)
- Chapter 4.4: Boosting—Evangelist (Security, Privacy)
- Chapter 4.5: Boosting—Researcher (Security, Vulnerability, Etc.)
- Chapter 4.6: Boosting—Speaker (Local Events, Podcasts, Webcasts, Etc.)
- Chapter 4.7: Community Support (Documentation, Bug Prioritization, Project Management)
- Chapter 4.8: Conference Support (Founding, Attending, Volunteering, Running, Leading)
- Chapter 4.9: User Group Support (Founding, Attending, Volunteering, Running, Leading)
- Conclusion
- Appendix
- Subject Index
- Congratulations
Product information
- Title: Breaking into Information Security
- Author(s):
- Release date: December 2015
- Publisher(s): Syngress
- ISBN: 9780128009895
You might also like
book
Information Security Policy Development for Compliance
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …