InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

Front Cover
Syngress, Jun 2, 2005 - Computers - 448 pages
0 Reviews
“InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them.

Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world.

* The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities

* Teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies

* Provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The TargetsWhat I Want to Be When I Grow Up or at Least Get Older
3
Social Engineering for Profit
27
Determine Whats Out There
51
Basic Tactics for Successful Exploitation
83
The Laws of Security
129
No Place Like home Creating an Attack Lab
159
Vulnerability Disclosure
211
Classes of Attack
241
Integrate and Imitate
293
Vulnerability RemediationWork Within the System
339
Incident Response Putting Out Fires Without Getting Burned
365
Show Me the Money
401
Index
429
Related Titles
442
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 9 - to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life.
Page i - Through this site, we've been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only solutions@syngress.com program. Once you have registered, you will enjoy several benefits, including: • Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format.
Page ix - With his core competencies residing in high-tech remote management, international expansion, application security, protocol analysis, and search algorithm technology, Foster has conducted numerous code reviews for commercial OS components, Win32 application assessments, and reviews on commercialgrade cryptography implementations. Foster is a seasoned speaker and has presented throughout North America at conferences, technology forums, security summits, and research symposiums with highlights at the...
Page ix - McAfee) and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc.

About the author (2005)

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.

Bibliographic information