How to get the most out of this book
If you're reading this book and only have a short time before your job interview, let me share some wisdom on how to get the most out of it.
This book is not intended to be read from cover to cover, although it can be.
I would suggest reading through at least Part 1 (Hacking Yourself) and Part 4 (Common Behavioral Interview Questions), plus the individual job role that you're interviewing for (assuming it's one listed in this book).
Many of the behavioral interview questions near the back of this book have been asked in interviews I've done, and some of the questions may be asked verbatim in your interview. This is why it's important to prepare for your interview.
I want to stress that the technology mentioned in this book will likely change over the years, so the technical interview questions should not be taken as a Holy Grail guide but rather as a more general guide to the types of questions an employer may ask you during an interview. Also, you may see questions on various tools that are used in each job role.
The questions you get about tools in an interview depend a lot on the company you are interviewing with and the tools they use.
The most important thing to remember is that having an understanding of the type of tool (that is, security information and event management (SIEM), endpoint detection and response (EDR), fuzzer, and so on) is more important than trying to get experience with every tool out there (it's impossible to be an expert in everything).
I also want to mention that this book could not possibly cover every possible interview question you might get (and I've had some strange questions asked of me over the years), but I've made every effort to include some of the most common ones after interviewing hundreds of cybersecurity professionals in these roles and going through hundreds of interviews myself over the years.