academic cybersecurity programs 84 – 88
advanced research programs 87 – 88
acknowledging and celebrating 146 – 147
advanced research programs 87 – 88
application, software, and product security discipline 25
ARPANET (Advanced Research Projects Agency Network) 4
ATSs (applicant tracking systems) 96
BBSs (bulletin board systems) 10
behavioral-based questions 112
academic cybersecurity programs 84 – 88
advanced research programs 87 – 88
degree programs – 87
less formal skills building 88 – 92
CTFs (capture-the-flags), playgrounds, personal labs 90 – 91
webinars, podcasts, and live-stream events 91 – 92
security certifications 77 – 84
CEH (Certified Ethical Hacker) 82 – 83
CISSP (Certified Information Systems Security Professional) 79 – 80
capabilities inventory 69 – 71, 160 – 161
capture-the-flags (CTFs) 55, 90 – 91
anonymity, considerations 31 – 32
building career strategy 154 – 158
building 1, 3, 5 plan 157 – 158
identifying personal growth needs 156 – 157
disciplines of cybersecurity 18 – 29
application, software, and product security 25
DFIR (digital forensics and incident response) 20 – 21
education and awareness 26 – 27
leaders and executives 28 – 29
sales and sales support 27 – 28
security architecture and design 21 – 22
security assessment and verification 22 – 24
security professional characteristics 29 – 31
inventors and creators 29 – 30
CASB (cloud access security broker) 98
CEH (Certified Ethical Hacker) 82 – 83
CERT (Computer Emergency Response Team) 5
CEUs (continuing education units) 81
CISA (Cybersecurity and Infrastructure Security Agency) 9, 24
CISO (chief information security officer) 28
CISSP (Certified Information Systems Security Professional) 79 – 80
cloud and cloud native technology 41 – 42
CTFs (capture-the-flags) 55, 90 – 91
CTSS (Compatible Time-Sharing System) 4
CVE (Common Vulnerabilities and Exposures) database 24
anonymity, considerations of 31 – 32
application, software, and product security 25
DFIR (digital forensics and incident response) 20 – 21
education and awareness 26 – 27
leaders and executives 28 – 29
sales and sales support 27 – 28
security architecture and design 21 – 22
security assessment and verification 22 – 24
cybersecurity diversity gap 15
effects of digital transformation 13
security professional characteristics 29 – 31
inventors and creators 29 – 30
Cybersecurity and Infrastructure Security Agency (CISA) 9, 24
cybersecurity industry, use of term 12
degree programs 54 – 55, 85 – 87
DFIR (digital forensics and incident response) 20 – 21
DoS (denial-of-service) attacks 7
EC-Council (International Council of E-Commerce Consultants) 82 – 83
ECEs (EC-Council continuing education) 82
education and awareness discipline 26 – 27
emotional intelligence 47 – 48
empathy 47 – 48
EMR (electronic medical record) systems 6
cybersecurity degree programs 54 – 55
finding path to security 55 – 56
executives 28 – 29, 39
governance and compliance discipline 26
GPEN (SANS GIAC Penetration Tester) 84
hybrid working environments 106 – 107
ICSs (industrial control systems) 43 – 44
career progression and 136 – 137
comparison to others 140 – 141
diminishing accomplishments 141 – 142
industry expectations 139 – 140
acknowledging and celebrating achievements 146 – 147
avoiding competition 142 – 143
being resource to others 145 – 146
setting goals and defining success 143 – 144
turning to colleagues and peers 144 – 145
effects of digital transformation 13
expectations and impostor syndrome 139 – 140
groups and networking events 121 – 123
International Information System Security Certification Consortium (ISC)2 15, 79 – 80
recruiter or HR screen 108 – 109
IR (incident response) personnel 20
(ISC)2 (International Information System Security Certification Consortium) 15, 79 – 80
IT (information technology), defined 5
recruiter or HR screen 108 – 109
negotiating for something better 114 – 115
matching requirements 104 – 105
office, remote, or hybrid working environments 106 – 107
using job search tools 101 – 102
leaders 28 – 29
liberty 10 – 11
MTUs (master terminal units) 44
network communications and administration 41
building professional network 120 – 124
industry groups and networking events 121 – 123
making network productive 123 – 124
negotiating for something better 114 – 115
office working environments 106 – 107
OSINT (open source intelligence) 22 – 23
OWASP (Open Web Application Security Project) 122
passion 45, 58 – 60
personal growth needs 156 – 157
physical penetration testers 43
pivoting 72, 149, 158 – 161
capabilities inventory 160 – 161
recognize when change is needed 159 – 160
PLCs (programmable logic controllers) 44
privacy 10 – 11
professional network 120 – 124
industry groups and networking events 121 – 123
making network productive 123 – 124
remote terminal units (RTUs) 44
remote working environments 106 – 107
impostor syndrome and 136 – 137
RTUs (remote terminal units) 44
sales and sales support 27 – 28
SANS GIAC Penetration Tester (GPEN) 84
SCADA (supervisory control and data acquisition) 44
SDLC (software development life cycle) 25
security architecture and design discipline 21 – 22
security assessment and verification discipline 22 – 24
security certifications 77 – 84
security operations discipline 19 – 20
choosing focus discipline 71 – 72
identifying gaps and challenges 72 – 74
cybersecurity degree programs 54 – 55
finding path to security 55 – 56
developing personal objective 60 – 62
identifying authentic self 56 – 58
capabilities inventory 69 – 71
technical capabilities 63 – 64
SIEM (security incident and event management) 21
job seekers vs. job openings 34 – 36
empathy/emotional intelligence 47 – 48
multitasking and organizational skills 48
speaking and presentation skills 49
cloud and cloud native technology 41 – 42
ICSs (industrial control systems) 43 – 44
network communications and administration 41
software development/programming 40 – 41
social engineering 23, 42 – 43
SOC (security operations center) 19
empathy/emotional intelligence 47 – 48
multitasking and organizational skills 48
speaking and presentation skills 49
software development life cycle (SDLC) 25
success 143 – 144, 148 – 162
building career strategy 154 – 158
building 1, 3, 5 plan 157 – 158
identifying personal growth needs 156 – 157
overcoming challenges 149 – 153
capabilities inventory 160 – 161
recognize when change is needed 159 – 160
supervisory control and data acquisition (SCADA) 44
cloud and cloud native technology 41 – 42
ICSs (industrial control systems) 43 – 44
network communications and administration 41
software development/programming 40 – 41
vulnerability management 24, 99
3.16.212.217