To get the most out of this book
To get the most out of this book, it’s important to understand why you want to work in cybersecurity and to practice for your job interview. We suggest writing out the questions that you think the interviewer will ask you based on the job you are applying for, then do your best to answer those questions.
Doing this will help you during the job interview, ensuring that you are not stumbling around for answers to the interviewers’ questions. This book is not intended to be read cover to cover, although you can do that. Instead, we suggest that you read Chapter 1, Hacking Yourself, Chapter 15, Behavioral Interview Questions, and Chapter 16, Final Thoughts, and then read only the chapters for the job roles that you are applying to. The information in all chapters will be beneficial to you, but by focusing on the job interview that is in front of you, you will be in a much better position to succeed. For example, if you are interviewing for a SOC Analyst job, the chapter on CISO interview questions will still be informative, but your main focus should be on the SOC Analyst interview questions, since that is the job interview you have next week.
After reading this book, it’s critical that you actually apply the knowledge. People often say knowledge is power, but in reality, applied knowledge is the real superpower. The more you practice for your job interview in advance, the easier the job interview usually is.
Also, after you apply the information in this book and do well in your job interview, please share a post on social media and tag the authors because we care about your success and want to see your wins.
Download the color images
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://packt.link/gbp/9781835461297.
Conventions used
There are a number of text conventions used throughout this book.
CodeInText
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: “You can use the sleep
command, and if the web app sleeps for a period of time, it could indicate that it is vulnerable.”
Bold: Indicates a new term, an important word, or words that you see on the screen. For instance, words in menus or dialog boxes appear in the text like this. For example: “I worked on a project integrating CrowdStrike with our SIEM system, using RESTful APIs.”
Warnings or important notes appear like this.
Tips and tricks appear like this.