Breaking into Information Security
eBook - ePub

Breaking into Information Security

Crafting a Custom Career Path to Get the Job You Really Want

  1. 268 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Breaking into Information Security

Crafting a Custom Career Path to Get the Job You Really Want

About this book

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture, " including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there.From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.- The most practical guide to starting your career in information security, or advancing to the next level- Presented in a "level-up gaming framework for career progression, with a "Learn, Do, Teach approach through three tiers of InfoSec jobs- Provides examples of specific roles and career paths in each job tier so you can identify and max out skills for the role you want- Learn how to advance to management and training roles, as well as the specific skills you need to become an independent consultant- Find out about career "booster paths" to help you advance your career at high speed

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Breaking into Information Security by Josh More,Anthony J. Stieber,Chris Liu in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Author Biographies
  6. Acknowledgments
  7. Chapter 0.1: Introduction
  8. Chapter 0.2: Models
  9. Chapter 0.3: Model Failures
  10. Chapter 1.0: Tier 1—Learn
  11. Chapter 1.1: Tier 1—Log Reviewer
  12. Chapter 1.2: Tier 1—Patch Management
  13. Chapter 1.3: Tier 1—Help Desk
  14. Chapter 1.3.1: Tier 1—Help Desk—Story
  15. Chapter 1.4: Tier 1—Coder/Developer
  16. Chapter 1.5: Tier 1—System Administrator
  17. Chapter 1.5.1: Tier 1— System Administrator Story
  18. Chapter 1.6: Tier 1—Network Administrator
  19. Chapter 1.6.1: Tier 1—Network Administrator
  20. Chapter 1.7: Tier 1—Security Coordinator
  21. Chapter 1.8: Tier 1—Trainer-Educator
  22. Chapter 1.8.1: Tier 1—Trainer-Educator
  23. Chapter 1.9: Tier 1—Quality Tester
  24. Chapter 1.9.1: Tier 1—Quality Tester Story
  25. Chapter 1.a: Tier 1—Subject Matter Specialist
  26. Chapter 2.0: Tier 2.0—Do
  27. Chapter 2.1: Tier 2—Pen Tester
  28. Chapter 2.2: Tier 2—Vulnerability Management
  29. Chapter 2.3: Tier 2—Security Assessor
  30. Chapter 2.4: Tier 2—Risk Assessor
  31. Chapter 2.5: Tier 2—Auditor
  32. Chapter 2.6: Tier 2—Incident Responder
  33. Chapter 2.6.1: Tier 2—Incident Responder—Story
  34. Chapter 2.7: Tier 2—Wildcard
  35. Chapter 2.7.1: Tier 2—Wildcard—Story
  36. Chapter 2.8: Tier 2—Advanced Help Desk—Help Desk Supervisor
  37. Chapter 2.9: Tier 2—Security Facilitator
  38. Chapter 2.9.1: Tier 2—Security Facilitator—Story
  39. Chapter 2.a: Tier 2—Policy Administrator
  40. Chapter 2.b: Tier 2—Trainer-Educator
  41. Chapter 2.c: Tier 2—Quality Assurance
  42. Chapter 2.d: Tier 2—Subject Matter Expert
  43. Chapter 2.d.1: Tier 2—Subject Matter Expert—Story
  44. Chapter 2.e: Tier 2—Lateral: Physical Security
  45. Chapter 2.f: Tier 2—Lateral: Military
  46. Chapter 2.g: Tier 2—Lateral: Law Enforcement
  47. Chapter 2.g.1: Tier 2—Lateral: Law Enforcement—Story
  48. Chapter 2.h: Tier 2—Lateral: Legal—Lawyers
  49. Chapter 2.i: Tier 2—Lateral: Sales
  50. Chapter 2.j: Tier 2—Lateral: Project Management
  51. Chapter 2.k: Tier 2—Lateral: Non-IT Engineering—Architecture—Science
  52. Chapter 2.l: Tier 2—Lateral: Accounting
  53. Chapter 2.m: Tier 2—Lateral: Business Analyst
  54. Chapter 3.0: Tier 3—Teach
  55. Chapter 3.1: Tier 3—Pen Test Lead
  56. Chapter 3.2: Tier 3—Security Architect
  57. Chapter 3.3: Tier 3—Lead Auditor
  58. Chapter 3.4: Tier 3—Lead Security-Risk Assessor
  59. Chapter 3.5: Tier 3—Tiger Team Member—Tiger Team Lead (Red Team)
  60. Chapter 3.6: Tier 3—Security Consultant
  61. Chapter 3.7: Tier 3—Security Management (CSO, CISO, CPO)
  62. Chapter 3.8: Tier 3—Lateral: CPA
  63. Chapter 3.a: Tier 3—Lateral: General Management
  64. Chapter 3.b: Tier 3—Lateral: Technical Architect
  65. Chapter 3.c: Tier 3—Lateral: Entrepreneur
  66. Chapter 3.c.1: Tier 3—Lateral: Entrepreneur—Story
  67. Chapter 3.d: Tier 3—Lateral: Academia
  68. Chapter 4.0: Boosting
  69. Chapter 4.1: Boosting—Author (Blogs, Magazines, Books)
  70. Chapter 4.2: Boosting—Developer (Open Source)
  71. Chapter 4.3: Boosting—Developer/Entrepreneur (Closed or Open Source)
  72. Chapter 4.4: Boosting—Evangelist (Security, Privacy)
  73. Chapter 4.5: Boosting—Researcher (Security, Vulnerability, Etc.)
  74. Chapter 4.6: Boosting—Speaker (Local Events, Podcasts, Webcasts, Etc.)
  75. Chapter 4.7: Community Support (Documentation, Bug Prioritization, Project Management)
  76. Chapter 4.8: Conference Support (Founding, Attending, Volunteering, Running, Leading)
  77. Chapter 4.9: User Group Support (Founding, Attending, Volunteering, Running, Leading)
  78. Conclusion
  79. Appendix
  80. Subject Index
  81. Congratulations