Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hack the Cybersecurity Interview

You're reading from   Hack the Cybersecurity Interview Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles

Arrow left icon
Product type Paperback
Published in Aug 2024
Publisher Packt
ISBN-13 9781835461297
Length 344 pages
Edition 2nd Edition
Arrow right icon
Authors (3):
Arrow left icon
Tia Hopkins Tia Hopkins
Author Profile Icon Tia Hopkins
Tia Hopkins
Christophe Foulon Christophe Foulon
Author Profile Icon Christophe Foulon
Christophe Foulon
Ken Underhill Ken Underhill
Author Profile Icon Ken Underhill
Ken Underhill
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Hacking Yourself 2. Cybersecurity Engineer FREE CHAPTER 3. SOC Analyst 4. Penetration Tester 5. Digital Forensic Analyst 6. Cryptographer/Cryptanalyst 7. GRC/Privacy Analyst 8. Security Auditor 9. Malware Analyst 10. Cybersecurity Manager 11. Cybersecurity Sales Engineer 12. Cybersecurity Product Manager 13. Cybersecurity Project Manager 14. CISO 15. Behavioral Interview Questions 16. Final Thoughts 17. Other Books You May Enjoy
18. Index

Index

Symbols

<script> tags

performing 57

.pdb file 148

.reloc section 149

.rsrc section 149

A

Absolute Virtual Address (AVA) 146

Acceptable Use Policy (AUP) 34

Address Resolution Protocol (ARP) 38, 45

poisoning 46

administrative cases 79

administrative control 119

administrative metadata 75

Advanced Encryption Standard (AES) 74, 97, 198

versus Rivest-Shamir-Adleman (RSA) 74

alert tags

performing 57

American Institute of Certified Public Accountants (AICPA) 163

criteria 163, 164

URL 163

anti-forensic techniques 84

AnyRun 141

APC injection 152

APKTool 58

application control

versus general control 124

versus system control 124

Application Programming Interface (API)

versus web application 67

application security program

setting up 166, 167

Artificial Intelligence (AI) 45, 231

assumed breach 130

asymmetric encryption 95

Digital Signature Algorithm...

lock icon The rest of the chapter is locked
arrow left Previous Section
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image