Part 1 Exploring cybersecurity careers
1 This thing we call cybersecurity
Cybersecurity in the business world
Cybersecurity defending society
1.4 The cybersecurity “industry”
The effects of digital transformation
So, is cybersecurity an industry?
1.5 The value of human diversity in cybersecurity
The cybersecurity diversity gap
How it applies to your career path
2 The cybersecurity career landscape
2.1 The many disciplines of cybersecurity
Digital forensics and incident response
Security architecture and design
Security assessment and verification
Application, software, and product security
2.2 Characteristics of a security professional
Forget about the “infosec rockstar”
2.3 Considerations of anonymity
3 Help wanted, skills in a hot market
3.1 Job seekers vs. job openings
3.2 Cybersecurity job role progression
3.3 Common skills for security roles
Part 2 Preparing for and mastering your job search
4 Taking the less traveled path
Considering cybersecurity degree programs
Developing your personal objective
Identifying gaps and challenges
5 Addressing your capabilities gap
5.1 The alphabet soup of security certifications
Security certification overview
(ISC)2 Certified Information Systems Security Professional
EC-Council Certified Ethical Hacker
5.2 Academic cybersecurity programs
5.3 Less formal skills building
CTFs, playgrounds, and personal labs
Webinars, podcasts, and live-stream events
6 Resumes, applications, and interviews
6.2 Choosing and applying to job openings
Office, remote, or hybrid working environments
6.3 Crushing the job interviews
Negotiating for something better
Part 3 Building for long-term success
7 The power of networking and mentorship
7.1 Building a professional network
Industry groups and networking events
Other meetups, conferences, and events
Making your network productive
7.2 Exploring the role of mentorship
How many mentors should a person have
7.3 Managing the mentor relationship
Forms of mentoring relationships
Structure of a mentoring relationship
7.4 Building those relationships
8 The threat of impostor syndrome
8.1 Defining impostor syndrome
Why do we care about impostor syndrome?
Who experiences impostor syndrome?
8.2 Understanding the causes of impostor syndrome
8.3 Overcoming impostor syndrome
Set goals and define what success means to you
Acknowledge and celebrate your achievements
9.1 Overcoming challenges in cybersecurity careers
9.2 Building your career strategy
Describe your long-term vision
Identify your personal growth needs
Recognize when change is needed
9.4 Putting it all into motion
3.145.125.51