InfoSec Career Hacking: Sell Your Skillz, Not Your Soul“InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world. * The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities * Teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies * Provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
3 | |
27 | |
Determine Whats Out There | 51 |
Basic Tactics for Successful Exploitation | 83 |
The Laws of Security | 129 |
No Place Like home Creating an Attack Lab | 159 |
Vulnerability Disclosure | 211 |
Classes of Attack | 241 |
Other editions - View all
Common terms and phrases
adversary algorithms allow anti-virus attack buffer overflows certifications chapter CISSP clearance client components configuration contract create database denial of service designed detection disclosure disk e-mail employers encryption engineering example experience exploit Figure firewall FISMA Flawfinder Frequently Asked Questions given an attempt hacker hardware host HP-UX implementation information leakage information security INFOSEC INFOSEC professionals interface Internet interview KNOPPIX Linux look mailing list malicious malware Microsoft Nessus NIST Nmap offer letter operating system options packages password perform port probably problems Protocol remote requirements résumé RIAA rootkit router server skills Solaris someone SPARC SPARCstation specific sure Syngress target tasks technical testing tion topics understand UNIX vendor virtual machine VMWare vulnerability assessment Windows
Popular passages
Page 9 - to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life.
Page i - Through this site, we've been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only solutions@syngress.com program. Once you have registered, you will enjoy several benefits, including: • Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format.
Page ix - With his core competencies residing in high-tech remote management, international expansion, application security, protocol analysis, and search algorithm technology, Foster has conducted numerous code reviews for commercial OS components, Win32 application assessments, and reviews on commercialgrade cryptography implementations. Foster is a seasoned speaker and has presented throughout North America at conferences, technology forums, security summits, and research symposiums with highlights at the...
Page ix - McAfee) and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc.