Cyber Security Interview Tips | Interview Topics Cyber Security Interview Preparation 2021
Summary
TLDRIn this video, Sandra dives into essential cybersecurity interview preparation tips, focusing on both technical and behavioral aspects. She emphasizes the importance of understanding encryption, security protocols, and tools, as well as the CIA triad and the cyber kill chain. Sandra also discusses the significance of OSI model knowledge, security attacks, and common practices. She encourages viewers to leverage resources like CompTIA Security+ for foundational concepts and to practice deductive reasoning for scenario-based questions, highlighting the value of a strong learning mindset in the field.
Takeaways
- 👩💻 The video is aimed at helping individuals prepare for cybersecurity job interviews, covering both technical and behavioral aspects.
- 🔒 The script emphasizes the importance of understanding encryption, including algorithms like AES and SHA, and the difference between symmetric and asymmetric encryption.
- 🔍 It highlights the significance of knowing security protocols and port numbers, which are often tested in cybersecurity interviews.
- 🛠️ The video suggests that having knowledge of common security tools such as Burp Suite, Metasploit, and Fiddler is essential for cybersecurity roles.
- 🔑 The CIA triad (Confidentiality, Integrity, and Availability) is presented as a fundamental concept in cybersecurity that interviewees should grasp.
- 💡 The script introduces the Cyber Kill Chain as a critical model for understanding the structure of an attack, useful for pen testing and ethical hacking roles.
- 🚨 The importance of understanding security prevention and detection mechanisms, such as intrusion prevention systems and firewall configurations, is stressed.
- 🌐 The OSI model is mentioned as a key networking concept that interviewees should be familiar with to discuss network layer issues during interviews.
- 🔒 The video covers common security attacks like XSS, SQL Injection, and CSRF, advising to check OWASP's list for more vulnerabilities.
- 👀 It advises on the importance of recognizing and understanding phishing attacks and common security practices to prevent them.
- 🤔 Scenario walkthroughs are presented as a common interview technique, where interviewees must apply their knowledge to given situations and think critically.
Q & A
What are the two main types of cybersecurity interview questions discussed in the video?
-The video discusses two main types of cybersecurity interview questions: technical questions related to cybersecurity topics, and behavioral questions that involve answering questions about scenarios and basic 'tell me about yourself' questions.
Why are cybersecurity interview questions often considered difficult to answer?
-Cybersecurity interview questions are considered difficult because many of them are straightforward and require specific knowledge. If you are asked a question like 'What port is HTTPS on?', you either know the answer or you don't, making it hard to bluff or talk around the question.
What is the importance of understanding encryption algorithms in cybersecurity interviews?
-Understanding encryption algorithms is crucial because interviewers often ask about different types of encryption, their security, and appropriate use cases. Knowing common algorithms like AES, SHA, and MD families, as well as the differences between symmetric and asymmetric encryption, can help in answering these questions confidently.
How does the video suggest preparing for cybersecurity interviews in terms of security protocols and port numbers?
-The video suggests that candidates should know standard port numbers and their uses, as well as when to use them. It also recommends reviewing the CompTIA Security+ exam materials for a good list of protocols and port numbers, as this certification covers a lot of the foundational knowledge required for cybersecurity roles.
What is the significance of the CIA triad in cybersecurity, and how does it relate to interviews?
-The CIA triad consists of Confidentiality, Integrity, and Availability, which are the three pillars of cybersecurity. Understanding these concepts is important for interviews because they form the basis of many security discussions and scenarios, allowing candidates to demonstrate their foundational knowledge of cybersecurity principles.
Why is knowledge of security tools important for cybersecurity interviews?
-Knowledge of security tools is important because interviewers may ask about common tools used in the field, such as Burp Suite, Metasploit, and Fiddler. Having a general understanding of these tools and their purposes can help candidates answer questions and demonstrate their readiness for a cybersecurity role.
What is the Cyber Kill Chain, and how does it relate to cybersecurity interviews?
-The Cyber Kill Chain is a model that outlines the stages of a cyber attack, from the identification of a target to the execution of the attack and control over the target system. Understanding this model is beneficial in interviews, especially for pen testing or ethical hacking roles, as it helps candidates think like an attacker and understand the structure of an attack.
How can the OSI model help candidates prepare for cybersecurity interviews?
-The OSI model represents the different layers of a network, and knowing it can help candidates answer interview questions related to network issues and solutions. It provides a framework for understanding where specific network problems might occur and how they can be addressed.
What are some common security attacks that candidates should be familiar with for cybersecurity interviews?
-Candidates should be familiar with common security attacks such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF). The OWASP list of common attacks is a good resource to study, as these vulnerabilities are often the focus of penetration testing and are likely to be discussed in interviews.
Why is understanding network security and access controls important for cybersecurity interviews?
-Understanding network security and access controls is important because interviewers may present scenarios involving network diagrams or configurations and ask candidates to identify issues or suggest improvements. Knowledge of network components like routers, proxies, and DNS servers, as well as concepts like honeypots, is crucial for these types of questions.
How can scenario walkthroughs in interviews test a candidate's understanding of cybersecurity?
-Scenario walkthroughs in interviews can test a candidate's critical thinking and deductive reasoning skills by presenting them with a situation, such as a network attack or a security configuration issue. Candidates are expected to use their knowledge to analyze the scenario and propose solutions or identify problems.
Outlines
📺 Introduction to Cybersecurity Interview Prep
Sandra introduces her channel focused on work blogs, cybersecurity, and careers in technology. She announces a highly requested topic on interview prep for cybersecurity jobs, covering both technical and behavioral interview aspects. She emphasizes the importance of knowing standard cybersecurity protocols and tools, sharing her personal experiences and tips for job seekers in the field.
🔐 Key Topics in Cybersecurity Interviews
Sandra discusses essential topics for cybersecurity interviews, including encryption algorithms, hashing algorithms, and the differences between symmetric and asymmetric encryption. She highlights the importance of understanding common algorithms like AES and SHA, and the significance of the Comptia Security Plus certification as a study resource for these topics.
🛡️ Security Protocols and Tools
Sandra emphasizes the necessity of knowing security protocols and port numbers, recalling her own interview experiences with technical quizzes. She advises familiarizing oneself with standard port numbers and the functionalities of various security tools such as Burp Suite, Metasploit, and Fiddler. Knowing these tools and their purposes can be crucial during interviews.
⚙️ CIA Triad and Cyber Kill Chain
Sandra explains the CIA Triad—Confidentiality, Integrity, and Availability—as foundational concepts in cybersecurity. She describes their importance in scenarios like preventing DDoS attacks. Additionally, she introduces the Cyber Kill Chain, a military concept applied to cybersecurity to understand and counteract attacks, stressing its relevance for roles in pen testing and ethical hacking.
🛡️ Security Prevention and Detection
Sandra covers intrusion prevention and detection systems, firewall configurations, and the significance of physical security in cybersecurity. She discusses potential interview questions related to securing firewalls and networks, and highlights the importance of understanding physical security measures to prevent data breaches via physical access.
🔍 Common Security Attacks and Practices
Sandra discusses common security attacks such as SQL injection, cross-site scripting, and phishing. She emphasizes the need to understand these attacks for interviews and recommends resources like OWASP and Hack The Box for practical knowledge. She also highlights general security practices and scenario walkthroughs to demonstrate deductive reasoning and problem-solving skills during interviews.
🔧 Practical Security Knowledge
Sandra highlights the importance of practical knowledge in cybersecurity, including the OSI model and network security concepts like routers, proxies, and DNS servers. She advises understanding these components for interview scenarios that may involve network diagrams and security configurations. Practical examples and common interview questions are provided to illustrate key points.
📧 Phishing and Common Security Practices
Sandra delves into phishing attacks, explaining their reliance on human psychology. She covers different types of phishing and emphasizes their significance in cybersecurity. She also discusses common security practices, like avoiding public Wi-Fi and using screen filters, that are essential for protecting sensitive information in professional environments.
📝 Scenario Walkthroughs and General Advice
Sandra wraps up with advice on scenario walkthroughs in interviews, emphasizing the importance of critical thinking and deductive reasoning. She encourages viewers to research company-specific interview questions on platforms like Glassdoor and to focus on understanding high-level concepts even without hands-on experience. She reassures viewers about handling unfamiliar topics during interviews by explaining their thought process and reasoning.
Mindmap
Keywords
💡Cyber Security
💡Encryption
💡Security Protocols
💡Security Tools
💡CIA Triad
💡Cyber Kill Chain
💡Intrusion Detection and Prevention Systems
💡Common Security Attacks
💡OSI Model
💡Access Controls
💡Phishing Attacks
💡Scenario Walkthroughs
Highlights
The video discusses interview preparation for cybersecurity jobs, focusing on technical and behavioral aspects.
Technical cybersecurity questions often require definitive knowledge, such as understanding of HTTPS port numbers.
Encryption is a key topic, including algorithms, hashing, and differences between symmetric and asymmetric encryption.
The video emphasizes the importance of knowing common encryption algorithms like AES, SHA, and MD.
Security protocols and port numbers are critical, with the video suggesting studying for the CompTIA Security+ exam for guidance.
Knowledge of security tools like Burp Suite, Fiddler, and Metasploit is essential for cybersecurity roles.
The CIA triad (Confidentiality, Integrity, Availability) forms the foundation of cybersecurity.
The Cyber Kill Chain is highlighted as a crucial concept for understanding the structure of cyber attacks.
Security prevention and detection tools, such as intrusion prevention systems and firewalls, are discussed.
Physical security measures, like server room design and Faraday cages, are important for protecting against attacks.
Common security attacks, including XSS, SQL Injection, and CSRF, are outlined with resources for further study.
The OSI model is introduced as essential knowledge for understanding network layers and potential security issues.
Network security and access controls are detailed, including the function of routers, hubs, and proxy servers.
Phishing attacks are explained, emphasizing the psychological aspects and common types of phishing.
Common security practices, such as avoiding public Wi-Fi and using screen filters, are recommended.
Scenario walkthroughs are presented as a method for demonstrating critical thinking and deductive reasoning during interviews.
The video concludes with advice on how to approach unknown topics during interviews and the importance of showing a willingness to learn.
Transcripts
hey guys welcome and welcome back to my
channel this is sandra and i make videos
all about work blog cyber security and
having a career in technology
and if this video was helpful to you
please give it a thumbs up so more
people can find it through the youtube
algorithm
so today we're going to be discussing a
highly requested video from you guys
which is interview prep for cyber
security jobs and this is definitely a
big topic especially when i was
interviewing graduating college
and looking for entry-level
cybersecurity roles so i kind of split
this into the more technical side of
cybersecurity questions
and topics as well as the more
behavioral interviews where you're kind
of just answering questions about
walkthroughs scenarios
and just basic behavioral tell me about
yourself questions
and i also have time stamps all over the
video so you can definitely jump around
depending on what topics that you
already know okay so from my experience
interviewing for cyber security roles a
lot of it comes down to questions that
are easy to ask and unfortunately a lot
of the questions are either you know it
or you don't
because if someone asks you like what
port is https that's something you know
or you don't know you know it's not
something that you can like bs around
or try to like talk around and that's
what makes cyber security interviews a
bit harder
especially because i come from a coding
background where you're kind of
able to solve a problem using multiple
different scenarios
like even if you don't know how to use
hash maps you can get to a problem
maybe trying to use a different way or
brute force so if that noted
one of the first topics is encryption
this goes from encryption algorithms
hashing algorithms the differences
between the few which ones are secure
and which ones are depreciated and no
longer being used
or which ones you would use in which
scenarios and there's also very niche
algorithms like two fish and you should
try to look up the most common
algorithms
to just have an idea of what they are
and what they do of course the most
common ones are aes
sha md and everything in those families
so i would definitely recommend at least
looking into those
so you have an idea as well as the
differences between a symmetric and
asymmetric encryption as well as block
ciphers versus stream ciphers and those
will be the main things in encryption
that are very high level enough to be
asked during a standard cyber security
analyst or cyber security interview and
honestly a lot of the topics that are
interviewable
are actually found in the comptia
security plus exam which is a
certification that i actually took last
year so if you guys are interested
definitely check out the link below i
made a video about resources i use
and even if you don't want the
certification it's always good to study
because it's also a very good resource
for all the material in cyber security
at a high level
that you can study just for interviews
okay so the next thing is security
protocols and port numbers so in my
first interview for a cyber security
role
it was actually for a cyber security
internship i was given a quiz
that literally asks me things like what
is the port number for this um what port
number is this
one would you use this protocol versus
the other and different things like that
and then afterwards we kind of went over
the answers and reviewed them
so that was definitely a very
anxiety-inducing interview
but also it just goes to show that a lot
of these questions
are straight up like you know it or you
don't and that's why i feel like i
really want to stress the importance of
you should know standard port numbers
you should know what they do you should
know when to use them
and you should also know if you're given
a network scenario which also i'm going
to talk about later
and they're asking you what's wrong with
this network and maybe you're doing an
nmap scan of all the open ports
and you're there to see okay so what's
wrong with this right now are there any
port numbers that are open that are
really suspicious so that's why it's
really important because if you see
a port number for a remote desktop
protocol but you don't know that that's
what that port is for
then that question is already like over
your head and then that's when you might
start like getting worried a little bit
so that's why i feel like it's really
important to know those basic standard
protocols
and again comptia security plus has a
pretty good list of protocols
and port numbers that you should at
least know and i believe there's about
20 or 30 of them so i will link that
below okay so another thing is security
tool
knowledge this one sounds really basic
but honestly when i was even studying
for software development or software
engineering roles
they would ask me questions like oh what
is mongodb what kind of language is
python
is python interpreted language and
different standard general questions
like that
so that's why i feel like you should
have a general knowledge of the
different tools that are used
for example burp suite is probably one
of the biggest ones in pen testing
fiddler is a big one metasploit is also
a big one but it may not be as commonly
used as something like burp suite
but generally you should know that oh
yeah burp suite is used as a proxy and
you can use that to take in traffic from
your browser and basically analyze it
you should also know the difference and
know different examples of packet
sniffers
network scanners port scanners as well
as just different tools
that the community uses as well as open
source tools whether that's for open
source intelligence or any other role
that you're looking for
especially if you're going for a
beginner type role the most easiest
thing that you could do
is look up top 10 most common tools used
in cybersecurity
and then you'll find those and at least
you'll know the idea so if a scenario
comes up or a walkthrough
or a question comes up like do you know
what burp suite is or what does burp
suite do or
what is verbs be used for like you at
least know how to answer high level
those questions and then you can always
go from there and say hey i know high
level what this is
it's xyz but i would also love to learn
more and do my own research on the job
and i'm willing to learn
so i feel like that's the key point the
fact that you know a bunch of high level
things
but you're always willing to learn and i
feel like that's one big thing that a
lot of the interviews
that you're going to be going in at
least for cyber security are going to be
looking for and honestly any role
like every interview is really trying to
see like how much your willingness is to
learn
and how passionate you are about the
topic so that's why i feel like those
are really important
especially for entry-level roles okay so
the next thing is the cia concepts
and the cia triad or the cia triangle is
kind of like
the really basic foundation of cyber
security all right this looks weird but
and it's basically confidentiality
integrity and availability these are the
three
pillars of cyber security
confidentiality of course is just making
sure that outsiders don't know your
information
they don't know any confidential info
integrity is can we make sure that
no one is changing this information
without our permission or only the right
people are changing this information
and how can we trust this information
and making sure that it's you know as
accurate as possible and availability is
the last pillar which a lot of people
don't know is
actually a really super important part
of cyber security because availability
talks about ddos attacks talks about
being able to keep
your applications online for users to
use because that in itself is a cyber
security attack
if someone brings down your network and
your customers are no longer able to
access your website
that is an attack on availability and if
you worked at any company
for any amount of time you know that
availability costs a lot of money
all the downtime that your company has
especially on an application that might
be widely used by clients that could
potentially be thousands millions of
dollars going down the drain because
your application is offline so that's
why availability is one of the most
important parts of cyber security
hence the cia triad so i would
definitely try to hammer down
these concepts and know if you're given
a scenario like you work at x by company
there's like this application that needs
to be secure
you want to implement these logs and you
also want to implement some kind of
preventative measures for ddos attacks
what are the cia concepts that are used
in this scenario and then you can know
okay well if you want logs that means
you want to make sure you know who's
changing the data know that they're
trustworthy make sure that integrity
is there for any information that's on
that application and then if they're
trying to prevent a ddos attack then
they're mostly trying to
account for availability for the
application and of course that's just an
example question that i just thought of
and there's also going to be a lot of
deductive reasoning
so you should always try to think as
logically as possible okay what's the
first step i should do
and what does this mean and you should
always ask why and how
for these questions especially when
you're in an interview where they're
doing some kind of walkthrough
or scenario and they're trying to get
you to give them a solution or trying to
get you to say what would you do if this
happened
so you should always think with the end
user in mind the client in mind
protecting as much
of the customers or the clients or the
company's assets as possible
which leads me pretty well into the
cyber kill chain
and this is something that one of my red
team mentors says is really really
important
and honestly i never thought about this
before i actually got into cyber
security even when i was studying for
interviews i didn't really think about
this but this was originally used as a
military term
that basically talks about the structure
of an attack and i can include some kind
of
diagram on the screen that can
potentially help as well as links below
if you guys are interested in learning
more
but this is one of the most important
things that pen testers and red tumors
and ethical hackers think about because
this is basically the anatomy of an
attack from the time when an attacker
identifies a target to deciding how they
can
attack a vulnerability that the target
might have exploiting the target
controlling the target and then
basically reach command and control so
you want to keep in mind these concepts
and try to understand
potentially if you're given a scenario
for this attack happen where in the
cyber kill chain is this um how can we
stop it and different things like that
so you always want to keep that in mind
especially when you're going for a pen
testing role or some kind of ethical
hacking role
okay so the next thing is security
prevention and security detection so
there are a bunch of different tools out
there that are very high level
again you should really look at comptia
security plus concepts because i feel
like they were just really helpful in
helping a beginner like me understand
especially because i haven't been in
this field for that long
these are the concepts that would be
really good to know for a potential
interview
and this goes from intrusion prevention
and intrusion detection systems
firewalls how to configure a firewall
and you can look online for various
examples of this this is also tested in
security plus
where a potential question could be that
you're given some kind of network and
you're told
you need to secure this firewall like
what would you change based on this
example companies third-party networks
extranets
and various different secure and
non-secure zones in their network i feel
like understanding at least a high level
of
firewall configurations is also very
important and also don't forget physical
security because if you think about it
that is also really important
for example did you know that in server
rooms or like rooms with very important
machinery
they don't have crawl spaces or like
those vents in the ceilings
because someone could potentially sneak
into that essentially plug in a usb
and exfiltrate data and i feel like
that's why it's really important to know
high level
all these things to the point where
you're thinking about parking lot lights
fences faraday cages um which basically
stop electromagnetic
interference so there's basically a lot
of things that you can think about and
again these topics are on security plus
so let me just add a link below for all
this comptia security plus topics
i i just feel like it'll be really
helpful to you guys okay so this video
is getting kind of long
and the next thing is common security
attacks so the most common ones like
crosstalk scripting
sql injection cross-site request forgery
there's a lot of different attacks out
there
and there's actually a list of most
common attacks by owasp so i can link
that below and you can check it out
and a lot of pen testing teams also look
for these common attacks because
they are common vulnerabilities so
definitely check that out and learn a
bit more if you're interested
and i can also link below hack the box
as well as a few other resources that
you can use to get some
beginner pen testing experience because
even if you're not going for a print
testing role
these will be really helpful for you to
kind of understand the mind of an
attacker and what they're trying to do
so then when you get an interview
question that has to do with an attack
or some intruder in the network
then you kind of know like okay what are
you going to try to do next they're in
this person's account
they're trying to they're probably
trying to elevate their privileges or
find some kind of admin user
that they can take advantage of and run
higher level attacks or take more
control of the system
and then you can go from there so that's
why it's really good to understand high
level
all these roles and all these different
things in the network that kind of work
together
so then you can answer in the best way
possible in any scenario or walk-through
interview that you might have
and of course the next thing is the osi
model which is basically all the layers
in the network and honestly there are
acronyms out there i don't remember the
exact one that i had
but i can put some on the screen or drop
some examples on the screen
and honestly once you remember them it
would be really easy to kind of recall
them like
okay this is a data link layer oh that's
a network layer this is the physical
layer like eventually you're gonna be
able to differentiate those especially
during an interview since i feel like
those are some of the really basic
levels because from my experience even
on this current team
there are times when people are like oh
yeah that's a network layer problem so
that's probably not something that we're
worrying about or
oh that's an application layer problem
so blah blah blah so there's a lot of
different things that you can infer
based on what layer of the network that
it is and that's why it's really
important to know the osi model
at a high level at least so you can kind
of answer questions about them in a
potential interview
i need to take a breath or something all
right network security and access
controls
so this of course is very generic you
should at least know the different
pieces of equipment
or technology that sit on your network
and control network access
for example what is a router what is a
hub what is a proxy server
where is your dns server and what are
all those little components that are in
your network that are securing it
and where are you putting each thing for
example your internal network is going
to be behind a firewall
and you might be shown a diagram during
your interview where people are like
okay this is
a example of a network setup what is
wrong with this picture is something
wrong with it or
what would you do to improve it so
there's a lot of questions that could go
into that
and of course that's another reason why
it's really important to know like hey
oh it's a dns server i know what that
does we're like oh why isn't there a
firewall between the internal network
and the extranet
which also goes into basic cyber
security concepts like honeypot or
honeynet which are basically
bait networks that companies set up to
kind of make attackers think that they
got into the real network
and they can also analyze what attackers
are doing to learn more about
how they're attacking and different
things that you're trying to do or
different things that they're actually
looking for
and the next thing is phishing attacks
so of course phishing
is very common um you guys probably have
hella spam emails
with little notes that say oh this might
be a phishing email don't click on any
links and there's lots of different
types of fishing there's fishing there's
whaling
and a bunch of different other ones so
that's definitely something that you can
look into and
fishing i feel like is more like human
psychology and a lot of people i know
actually in cybersecurity have a
psychology background
um because it's all about human behavior
and what makes humans do something
and there's actually legit concepts
around fishing that are actually studied
to understand what makes people
want to do something and a lot of that
sadly is driven on fear
greed use of authority so there's
definitely a lot you can look into there
and because of that it's actually a
really easy topic to get questions on in
an interview
and i would say that you would
definitely want to get those correct
because this is a lot of human
psychology
and if you did end up working for that
company and you click on some email that
is
really fishy you know like fishy and
that actually proves to be a threat to
the network for that company
um that could be a really bad thing so
phishing is a really important topic
that you want to get down okay so the
next thing is common security practices
these will be little scenarios like you
shouldn't plug in a personal usb
into your work computer and then try to
take home a report to work on later
or you shouldn't use public wi-fi or you
should use some kind of screen filter or
dimmer
to make sure no one is shoulder surfing
you so basically very general
common security practices that you can
look into because you don't have to know
the exact word
but you can always say like yeah i
wouldn't use public network or
or i wouldn't just plug in my usb into a
server and then the last topic i want to
talk about was scenario walkthroughs
so i kind of sprinkled them all around
this video already
but it's basically just when they give
you some kind of diagram they give you
some kind of scenario
whether it's about an attack or how to
protect the network
or what to do better different things
like that those are the main questions
that are going to be
getting you to think on your feet as
well as making use of deductive
reasoning
so you can answer those questions as
best as possible based on your current
knowledge
and also i want to say that if you don't
know a question or an answer to the
question
that's okay like they don't expect you
to know everything especially
in your early career so i feel like the
best thing you can do is
take in all the information as much as
you can before your interview
and then see okay this is what i know
and that that is exactly what you're
going to tell the interviewer
so i may not be familiar with dns
servers but this is what i know about
firewalls and blah blah blah
like i feel like this shouldn't be right
or this shouldn't be placed here
um or i feel like you should add another
firewall here between this network and
this network
so there's a lot of things that you can
infer based on your current knowledge
so even if you don't know exactly
everything that's on that diagram they
don't expect you to
so that's okay don't let it freak you
out if they give you some kind of really
crazy diagram
or a scenario that you've never heard
about like oh they happen to an email
server
i don't know i never work with email
servers well that is okay
just tell them what you do know and talk
around what you think is the right
solution
but then try to put as much backing and
groundwork about it
as possible so you can explain your
ideas and kind of walk through what
you're thinking
because that's the most important thing
like knowing your mindset knowing
how you think about ideas critical
thinking and deductive reasoning
are probably the most important things
they are looking for in that interview
okay so i probably talked your ear off
but thank you guys so much for watching
and i'm sure this is not like this is
not a comprehensive list so i really
feel like you should definitely do your
own research
and look up questions for whatever
company that you're studying for and
look up glassdoor
questions and i'm sure if you look up
like the name of your company
and then like cyber security interview
questions something at least will come
up
and you can definitely use those to help
guide your studying but i feel like
these are just general topics that you
can look into
that can kind of help guide you for what
you should study for your next interview
and again i really feel like comptia
security plus topics and probably a plus
topics would be really helpful
just for studying for beginner level
interviews because they're probably not
going to be asking for like your
experience and what you've
already configured and already done
especially for you know only like
one or two years maybe zero years into
your
career so at least knowing these general
topics will show them that
hey this person kind of knows what
they're talking about even though they
haven't maybe done any hands-on work yet
they know at a high level what these
concepts are and how they work together
thank you guys so much for watching if
you like this video please give it a
thumbs up
i hope it was helpful if it was please
consider subscribing and turn on post
notifications
i post videos every wednesday at 2 p.m
and sundays at 12 p.m and feel free to
drop any ideas and suggestions that you
have
for studying for any cyber security
interviews that you've already completed
just in case it can help anyone else in
the community
and definitely drop any questions that
you guys might have as well thank you
guys so much for watching and i'll see
you guys in my next video
[Music]
bye
you
関連する他のビデオを見る
Top 50 🔥 Network Administrator Interview Questions and Answers
Breaking The Kill Chain: A Defensive Approach
Cyber Kill Chain | Cyber Kill Chain Explain | What is Cyber Kill Chain? Kill Chain | Cybersecurity
Network Security Model
Are Hackers the Biggest Threat to America’s Critical Infrastructure?
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
5.0 / 5 (0 votes)