Page 13 -
P. 13
Index
Note: Boldface page numbers indicate illustrations. Certified Network Defender (CND) certification, 35, 40
Certified Secure Software Lifecycle Professional (CSSLP)
Active Directory (Windows tool), 9 certification, 18
Adhikari, Avishek, 68 Chapman University, 5
Alert Logic, 9 Compact (magazine), 64–65
Alexander, Candy, 19 CompTIA, 13, 14
American Bar Association (ABA), 56 CompTIA Security+ certification, 11, 69
Anderson, Robert, Jr., 48 Computer Hacking Forensic Investigator (CHFI) certification, 45
Armed Forces Communications and Electronics Association computer security incident response teams (CSIRTs), 38–39
(AFCEA), 73 cryptanalysis, described, 67
Association of Certified Fraud Examiners, 65 Crypto Currency Certification Consortium, 73
Atlantic (magazine), 30 cryptography, described, 67
cryptologists
BankInfoSecurity (website), 71, 72 advancement opportunities, 71–72
Barbee, Steve, 68, 71, 72 basic facts about, 67
Big Four accounting firms, 62–63, 64 career paths, 67–68
“black hats,” 4–5, 74–75 certification and security clearance, 69
blue teams, 25, 34 earnings, 71
Boardman, Ruth, 55 educational requirements, 69
Bourke, Triona, 60 employers, 68, 70
Bowens, O’Shea information sources, 73
on blue team exercises, 34 internships, 70
on career advancement as cyber incident responder, 39 job description, 67–68, 71
on personal skills needed by cyber incident responders, job outlook, 72–73
36–37 personal skills and qualities, 70
Breaking into Information Security: Crafting a Custom Career CSO (website), 34, 38
Path to Get the Job You Really Want (Meyers), 35 CSO from IDG, 40
Bugcrowd, 29 cyberattackers, 4–5
Bureau of Labor Statistics (BLS) cybercrime, difficulty of protecting against, 5
cybersecurity career possibilities, 77 cyber incident responders
earnings of mathematicians, 71 advancement opportunities, 39
job outlook basic facts about, 33
accountants and auditors, 64 certification and licensing, 35–36
information security analysts, 14 earnings, 39
lawyers, 55 educational requirements, 35
employers, 37–38
Capture the Flag events, 31 information sources, 40–41
Career Corner, The (podcast), 51 job description, 33–35, 37, 38–39
Cassidy, Richard, 9 job outlook, 40
Centre for Information Policy Leadership, 56 mentors for, 36
certification and licensing networking and internships, 36
cryptologists, 67, 69 other terms for, 33
cyber incident responders, 33, 35–36 personal skills and qualities, 36–37
data privacy attorneys, 50, 52 CyberPatriot: The National Youth Cyber Education Program,
digital forensics investigators, 42, 45 31, 48–49
ethical hackers, 25, 27 cybersecurity, importance of, 4
information security analysts, 8, 11 Cybersecurity Ventures, 7, 40
information security architects, 16, 18
security auditors, 58, 60–61 data encryption programs, 9
Certified Ethical Hacker (CEH) certification, 27, 30, 32 data privacy attorneys
Certified Fraud Examiner certification, 60, 65 advancement opportunities, 55
Certified Information Privacy Professional certification, 52 basic facts about, 50
Certified Information Security Manager (CISM) certification, 18 certification and licensing, 52
Certified Information Systems Auditor (CISA) certification, 60, earnings, 54–55
62 educational requirements, 52
Certified Information Systems Security Professional (CISSP) employers, 53–54
certification, 11, 36, 69 information sources, 56–57
Certified in Risk and Information Systems Control (CRISC) job description, 50–51, 54
certification, 11, 60 job outlook, 55–56
Certified Internal Auditor certification, 60 networking and internships, 53
78