Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title page
Table of Contents
Copyright
Author Biography
Introduction
Chapter 1: US Cybersecurity Jobs
Abstract
1.1. US cybersecurity job titles
1.2. General “hacker” classifications
1.3. The concept of “being bad to be good”
1.4. Key penetration tester “knowledge, skills, and abilities” (KSA’s)
Chapter 2: The US Cybersecurity Industry
Abstract
2.1. Current and expected growth of the cybersecurity industry
2.2. Employment opportunities
2.3. 2015 salary guide for cybersecurity professionals
2.4. Entry-level positions
Chapter 3: 17 Tips on How to Land Your First Cybersecurity Job
Abstract
3.1. Tip 1: develop the right attitude
3.2. Tip 2: curiosity is key
3.3. Tip 3: develop technical prowess
3.4. Tip 4: get involved in your local community
3.5. Tip 5: take part in competitions
3.6. Tip 6: join newsletters and read blogs
3.7. Tip 7: master popular hacking tools
3.8. Tip 8: become a Kali Linux power user
3.9. Tip 9: create a home lab
3.10. Tip 10: become a code monkey
3.11. Tip 11: find bugs!
3.12. Tip 12: participate in open-source projects
3.13. Tip 13: brush up on your written skills
3.14. Tip 14: attend cybersecurity conferences and volunteer
3.15. Tip 15: learn Linux!
3.16. Tip 16: get work experience
3.17. Tip 17: government sponsored initiatives
Chapter 4: Networking Advice for Cybersecurity Job Seekers
Abstract
4.1. Using LinkedIn to secure a cybersecurity job
4.2. How to identify influencers
4.3. What not to do on LinkedIn
4.4. Using Twitter to secure a cybersecurity job
Chapter 5: How to Create a Cybersecurity Resume
Abstract
5.1. Resume advice
5.2. Cybersecurity resume
Chapter 6: Cybersecurity Job Resources
Abstract
6.1. Should you do an unpaid internship?
6.2. US federal internships and graduate opportunities
6.3. The Federal Hiring Process
6.4. US private sector internships and graduate opportunities
6.5. US recruitment organizations
Chapter 7: Interview Hacks and Tips
Abstract
7.1. Pitch yourself like a cyber pro by asking these questions
7.2. Have anecdotes ready
7.3. Be awesome to the receptionist!
7.4. Organize informational interviews
Chapter 8: Suggested Beginner and Intermediate Cybersecurity Training and Certifications
Abstract
8.1. Recognized professional cybersecurity certifications
8.2. Best schools for cybersecurity
8.3. Scholarship opportunities
Chapter 9: Summary
Abstract
9.1. Wrap up and summary
← Prev
Back
Next →
← Prev
Back
Next →