توضیحاتی در مورد کتاب Cybersecurity Career Guide
نام کتاب : Cybersecurity Career Guide
عنوان ترجمه شده به فارسی : راهنمای شغلی امنیت سایبری
سری :
نویسندگان : Alyssa Miller
ناشر : Manning
سال نشر : 2022
تعداد صفحات : 368
ISBN (شابک) : 1617298204 , 9781617298202
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 11 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Cybersecurity Career Guide
Copyright
dedication
contents
front matter
preface
acknowledgments
about this book
Who should read this book
How this book is organized
liveBook discussion forum
Other online resources
about the author
about the cover illustration
Part 1 Exploring cybersecurity careers
1 This thing we call cybersecurity
1.1 What is cybersecurity
1.2 The role of cybersecurity
1.2.1 Cybersecurity in the business world
1.2.2 Cybersecurity defending society
1.3 The cybersecurity culture
1.3.1 Privacy and liberty
1.3.2 Open information sharing
1.3.3 Do no harm
1.4 The cybersecurity “industry”
1.4.1 Is cybersecurity an industry?
1.4.2 The effects of digital transformation
1.4.3 The human element
1.4.4 The internet of everything
1.4.5 So, is cybersecurity an industry?
1.5 The value of human diversity in cybersecurity
1.5.1 The cybersecurity diversity gap
1.5.2 Why it matters
1.5.3 How it applies to your career path
Summary
2 The cybersecurity career landscape
2.1 The many disciplines of cybersecurity
2.1.1 Security operations
2.1.2 Digital forensics and incident response
2.1.3 Security architecture and design
2.1.4 Security assessment and verification
2.1.5 Application, software, and product security
2.1.6 Governance and compliance
2.1.7 Education and awareness
2.1.8 Sales and sales support
2.1.9 Leaders and executives
2.2 Characteristics of a security professional
2.2.1 Inventors and creators
2.2.2 Obsessively inquisitive
2.2.3 Compulsive learning
2.2.4 Idealism
2.2.5 Forget about the “infosec rockstar”
2.3 Considerations of anonymity
Summary
3 Help wanted, skills in a hot market
3.1 Job seekers vs. job openings
3.2 Cybersecurity job role progression
3.2.1 Entry-level roles
3.2.2 Senior roles
3.2.3 Architect roles
3.2.4 Security leadership
3.2.5 Executive leadership
3.3 Common skills for security roles
3.3.1 Common technical skills
3.3.2 Soft skills
Summary
Part 2 Preparing for and mastering your job search
4 Taking the less traveled path
4.1 The entry-level challenge
4.1.1 Considering cybersecurity degree programs
4.1.2 Finding your path to security
4.2 Know yourself
4.2.1 Identifying the authentic you
4.2.2 Finding your passion
4.2.3 Developing your personal objective
4.3 Own yourself
4.3.1 Technical capabilities
4.3.2 Core skills
4.3.3 Soft skills
4.3.4 The capabilities inventory
4.4 Connect yourself
4.4.1 Choosing a focus discipline
4.4.2 Identifying gaps and challenges
Summary
5 Addressing your capabilities gap
5.1 The alphabet soup of security certifications
5.1.1 Security certification overview
5.1.2 (ISC)2 Certified Information Systems Security Professional
5.1.3 CompTIA Security+
5.1.4 EC-Council Certified Ethical Hacker
5.1.5 Other certifications
5.1.6 How many is too many?
5.2 Academic cybersecurity programs
5.2.1 Degree programs
5.2.2 Advanced research programs
5.3 Less formal skills building
5.3.1 Industry conferences
5.3.2 CTFs, playgrounds, and personal labs
5.3.3 Webinars, podcasts, and live-stream events
5.3.4 Other community meetups
Summary
6 Resumes, applications, and interviews
6.1 Mastering the resume
6.1.1 One document is not enough
6.1.2 Format
6.1.3 Check the boxes
6.1.4 Proofreading
6.2 Choosing and applying to job openings
6.2.1 Using job search tools
6.2.2 Finding the right roles
6.2.3 Matching requirements
6.2.4 Office, remote, or hybrid working environments
6.3 Crushing the job interviews
6.3.1 The recruiter or HR screen
6.3.2 The hiring manager interview
6.3.3 The technical interview
6.4 Considering the job offer
6.4.1 Don’t rush things
6.4.2 Negotiating for something better
6.4.3 Employment agreements
Summary
Part 3 Building for long-term success
7 The power of networking and mentorship
7.1 Building a professional network
7.1.1 Social media
7.1.2 Industry groups and networking events
7.1.3 Other meetups, conferences, and events
7.1.4 Making your network productive
7.2 Exploring the role of mentorship
7.2.1 Qualities of a good mentor
7.2.2 What to expect from a mentor
7.2.3 What your mentor expects
7.2.4 How many mentors should a person have
7.3 Managing the mentor relationship
7.3.1 Forms of mentoring relationships
7.3.2 Structure of a mentoring relationship
7.3.3 Ending a mentor relationship
7.4 Building those relationships
Summary
8 The threat of impostor syndrome
8.1 Defining impostor syndrome
8.1.1 What is impostor syndrome?
8.1.2 Why do we care about impostor syndrome?
8.1.3 Who experiences impostor syndrome?
8.2 Understanding the causes of impostor syndrome
8.2.1 Perfectionism
8.2.2 Industry expectations
8.2.3 Comparison to others
8.2.4 Lack of representation
8.2.5 Diminishing accomplishments
8.3 Overcoming impostor syndrome
8.3.1 Avoid competition
8.3.2 Set goals and define what success means to you
8.3.3 Turn to colleagues and peers
8.3.4 Be a resource to others
8.3.5 Acknowledge and celebrate your achievements
Summary
9 Achieving success
9.1 Overcoming challenges in cybersecurity careers
9.1.1 Burnout
9.1.2 Gatekeeping
9.1.3 Stagnation
9.2 Building your career strategy
9.2.1 Describe your long-term vision
9.2.2 Identify your personal growth needs
9.2.3 Build a 1, 3, 5 plan
9.3 Pivoting
9.3.1 Recognize when change is needed
9.3.2 You need to pivot, now what?
9.3.3 Shoot your shot
9.4 Putting it all into motion
Summary
glossary
index