contents

dedication

front matter

preface

acknowledgments

about this book

about the author

about the cover illustration

Part 1 Exploring cybersecurity careers

1 This thing we call cybersecurity

1.1 What is cybersecurity

1.2 The role of cybersecurity

Cybersecurity in the business world

Cybersecurity defending society

1.3 The cybersecurity culture

Privacy and liberty

Open information sharing

Do no harm

1.4 The cybersecurity “industry”

Is cybersecurity an industry?

The effects of digital transformation

The human element

The internet of everything

So, is cybersecurity an industry?

1.5 The value of human diversity in cybersecurity

The cybersecurity diversity gap

Why it matters

How it applies to your career path

2 The cybersecurity career landscape

2.1 The many disciplines of cybersecurity

Security operations

Digital forensics and incident response

Security architecture and design

Security assessment and verification

Application, software, and product security

Governance and compliance

Education and awareness

Sales and sales support

Leaders and executives

2.2 Characteristics of a security professional

Inventors and creators

Obsessively inquisitive

Compulsive learning

Idealism

Forget about the “infosec rockstar”

2.3 Considerations of anonymity

3 Help wanted, skills in a hot market

3.1 Job seekers vs. job openings

3.2 Cybersecurity job role progression

Entry-level roles

Senior roles

Architect roles

Security leadership

Executive leadership

3.3 Common skills for security roles

Common technical skills

Soft skills

Part 2 Preparing for and mastering your job search

4 Taking the less traveled path

4.1 The entry-level challenge

Considering cybersecurity degree programs

Finding your path to security

4.2 Know yourself

Identifying the authentic you

Finding your passion

Developing your personal objective

4.3 Own yourself

Technical capabilities

Core skills

Soft skills

The capabilities inventory

4.4 Connect yourself

Choosing a focus discipline

Identifying gaps and challenges

5 Addressing your capabilities gap

5.1 The alphabet soup of security certifications

Security certification overview

(ISC)2 Certified Information Systems Security Professional

CompTIA Security+

EC-Council Certified Ethical Hacker

Other certifications

How many is too many?

5.2 Academic cybersecurity programs

Degree programs

Advanced research programs

5.3 Less formal skills building

Industry conferences

CTFs, playgrounds, and personal labs

Webinars, podcasts, and live-stream events

Other community meetups

6 Resumes, applications, and interviews

6.1 Mastering the resume

One document is not enough

Format

Check the boxes

Proofreading

6.2 Choosing and applying to job openings

Using job search tools

Finding the right roles

Matching requirements

Office, remote, or hybrid working environments

6.3 Crushing the job interviews

The recruiter or HR screen

The hiring manager interview

The technical interview

6.4 Considering the job offer

Don’t rush things

Negotiating for something better

Employment agreements

Part 3 Building for long-term success

7 The power of networking and mentorship

7.1 Building a professional network

Social media

Industry groups and networking events

Other meetups, conferences, and events

Making your network productive

7.2 Exploring the role of mentorship

Qualities of a good mentor

What to expect from a mentor

What your mentor expects

How many mentors should a person have

7.3 Managing the mentor relationship

Forms of mentoring relationships

Structure of a mentoring relationship

Ending a mentor relationship

7.4 Building those relationships

8 The threat of impostor syndrome

8.1 Defining impostor syndrome

What is impostor syndrome?

Why do we care about impostor syndrome?

Who experiences impostor syndrome?

8.2 Understanding the causes of impostor syndrome

Perfectionism

Industry expectations

Comparison to others

Lack of representation

Diminishing accomplishments

8.3 Overcoming impostor syndrome

Avoid competition

Set goals and define what success means to you

Turn to colleagues and peers

Be a resource to others

Acknowledge and celebrate your achievements

9 Achieving success

9.1 Overcoming challenges in cybersecurity careers

Burnout

Gatekeeping

Stagnation

9.2 Building your career strategy

Describe your long-term vision

Identify your personal growth needs

Build a 1, 3, 5 plan

9.3 Pivoting

Recognize when change is needed

You need to pivot, now what?

Shoot your shot

9.4 Putting it all into motion

glossary

index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.125.51