Cyber Security Interview Tips | Interview Topics Cyber Security Interview Preparation 2021

Sandra Liu
28 Feb 202117:07

Summary

TLDRIn this video, Sandra dives into essential cybersecurity interview preparation tips, focusing on both technical and behavioral aspects. She emphasizes the importance of understanding encryption, security protocols, and tools, as well as the CIA triad and the cyber kill chain. Sandra also discusses the significance of OSI model knowledge, security attacks, and common practices. She encourages viewers to leverage resources like CompTIA Security+ for foundational concepts and to practice deductive reasoning for scenario-based questions, highlighting the value of a strong learning mindset in the field.

Takeaways

  • 👩‍💻 The video is aimed at helping individuals prepare for cybersecurity job interviews, covering both technical and behavioral aspects.
  • 🔒 The script emphasizes the importance of understanding encryption, including algorithms like AES and SHA, and the difference between symmetric and asymmetric encryption.
  • 🔍 It highlights the significance of knowing security protocols and port numbers, which are often tested in cybersecurity interviews.
  • 🛠️ The video suggests that having knowledge of common security tools such as Burp Suite, Metasploit, and Fiddler is essential for cybersecurity roles.
  • 🔑 The CIA triad (Confidentiality, Integrity, and Availability) is presented as a fundamental concept in cybersecurity that interviewees should grasp.
  • 💡 The script introduces the Cyber Kill Chain as a critical model for understanding the structure of an attack, useful for pen testing and ethical hacking roles.
  • 🚨 The importance of understanding security prevention and detection mechanisms, such as intrusion prevention systems and firewall configurations, is stressed.
  • 🌐 The OSI model is mentioned as a key networking concept that interviewees should be familiar with to discuss network layer issues during interviews.
  • 🔒 The video covers common security attacks like XSS, SQL Injection, and CSRF, advising to check OWASP's list for more vulnerabilities.
  • 👀 It advises on the importance of recognizing and understanding phishing attacks and common security practices to prevent them.
  • 🤔 Scenario walkthroughs are presented as a common interview technique, where interviewees must apply their knowledge to given situations and think critically.

Q & A

  • What are the two main types of cybersecurity interview questions discussed in the video?

    -The video discusses two main types of cybersecurity interview questions: technical questions related to cybersecurity topics, and behavioral questions that involve answering questions about scenarios and basic 'tell me about yourself' questions.

  • Why are cybersecurity interview questions often considered difficult to answer?

    -Cybersecurity interview questions are considered difficult because many of them are straightforward and require specific knowledge. If you are asked a question like 'What port is HTTPS on?', you either know the answer or you don't, making it hard to bluff or talk around the question.

  • What is the importance of understanding encryption algorithms in cybersecurity interviews?

    -Understanding encryption algorithms is crucial because interviewers often ask about different types of encryption, their security, and appropriate use cases. Knowing common algorithms like AES, SHA, and MD families, as well as the differences between symmetric and asymmetric encryption, can help in answering these questions confidently.

  • How does the video suggest preparing for cybersecurity interviews in terms of security protocols and port numbers?

    -The video suggests that candidates should know standard port numbers and their uses, as well as when to use them. It also recommends reviewing the CompTIA Security+ exam materials for a good list of protocols and port numbers, as this certification covers a lot of the foundational knowledge required for cybersecurity roles.

  • What is the significance of the CIA triad in cybersecurity, and how does it relate to interviews?

    -The CIA triad consists of Confidentiality, Integrity, and Availability, which are the three pillars of cybersecurity. Understanding these concepts is important for interviews because they form the basis of many security discussions and scenarios, allowing candidates to demonstrate their foundational knowledge of cybersecurity principles.

  • Why is knowledge of security tools important for cybersecurity interviews?

    -Knowledge of security tools is important because interviewers may ask about common tools used in the field, such as Burp Suite, Metasploit, and Fiddler. Having a general understanding of these tools and their purposes can help candidates answer questions and demonstrate their readiness for a cybersecurity role.

  • What is the Cyber Kill Chain, and how does it relate to cybersecurity interviews?

    -The Cyber Kill Chain is a model that outlines the stages of a cyber attack, from the identification of a target to the execution of the attack and control over the target system. Understanding this model is beneficial in interviews, especially for pen testing or ethical hacking roles, as it helps candidates think like an attacker and understand the structure of an attack.

  • How can the OSI model help candidates prepare for cybersecurity interviews?

    -The OSI model represents the different layers of a network, and knowing it can help candidates answer interview questions related to network issues and solutions. It provides a framework for understanding where specific network problems might occur and how they can be addressed.

  • What are some common security attacks that candidates should be familiar with for cybersecurity interviews?

    -Candidates should be familiar with common security attacks such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF). The OWASP list of common attacks is a good resource to study, as these vulnerabilities are often the focus of penetration testing and are likely to be discussed in interviews.

  • Why is understanding network security and access controls important for cybersecurity interviews?

    -Understanding network security and access controls is important because interviewers may present scenarios involving network diagrams or configurations and ask candidates to identify issues or suggest improvements. Knowledge of network components like routers, proxies, and DNS servers, as well as concepts like honeypots, is crucial for these types of questions.

  • How can scenario walkthroughs in interviews test a candidate's understanding of cybersecurity?

    -Scenario walkthroughs in interviews can test a candidate's critical thinking and deductive reasoning skills by presenting them with a situation, such as a network attack or a security configuration issue. Candidates are expected to use their knowledge to analyze the scenario and propose solutions or identify problems.

Outlines

00:00

📺 Introduction to Cybersecurity Interview Prep

Sandra introduces her channel focused on work blogs, cybersecurity, and careers in technology. She announces a highly requested topic on interview prep for cybersecurity jobs, covering both technical and behavioral interview aspects. She emphasizes the importance of knowing standard cybersecurity protocols and tools, sharing her personal experiences and tips for job seekers in the field.

05:01

🔐 Key Topics in Cybersecurity Interviews

Sandra discusses essential topics for cybersecurity interviews, including encryption algorithms, hashing algorithms, and the differences between symmetric and asymmetric encryption. She highlights the importance of understanding common algorithms like AES and SHA, and the significance of the Comptia Security Plus certification as a study resource for these topics.

10:01

🛡️ Security Protocols and Tools

Sandra emphasizes the necessity of knowing security protocols and port numbers, recalling her own interview experiences with technical quizzes. She advises familiarizing oneself with standard port numbers and the functionalities of various security tools such as Burp Suite, Metasploit, and Fiddler. Knowing these tools and their purposes can be crucial during interviews.

15:03

⚙️ CIA Triad and Cyber Kill Chain

Sandra explains the CIA Triad—Confidentiality, Integrity, and Availability—as foundational concepts in cybersecurity. She describes their importance in scenarios like preventing DDoS attacks. Additionally, she introduces the Cyber Kill Chain, a military concept applied to cybersecurity to understand and counteract attacks, stressing its relevance for roles in pen testing and ethical hacking.

🛡️ Security Prevention and Detection

Sandra covers intrusion prevention and detection systems, firewall configurations, and the significance of physical security in cybersecurity. She discusses potential interview questions related to securing firewalls and networks, and highlights the importance of understanding physical security measures to prevent data breaches via physical access.

🔍 Common Security Attacks and Practices

Sandra discusses common security attacks such as SQL injection, cross-site scripting, and phishing. She emphasizes the need to understand these attacks for interviews and recommends resources like OWASP and Hack The Box for practical knowledge. She also highlights general security practices and scenario walkthroughs to demonstrate deductive reasoning and problem-solving skills during interviews.

🔧 Practical Security Knowledge

Sandra highlights the importance of practical knowledge in cybersecurity, including the OSI model and network security concepts like routers, proxies, and DNS servers. She advises understanding these components for interview scenarios that may involve network diagrams and security configurations. Practical examples and common interview questions are provided to illustrate key points.

📧 Phishing and Common Security Practices

Sandra delves into phishing attacks, explaining their reliance on human psychology. She covers different types of phishing and emphasizes their significance in cybersecurity. She also discusses common security practices, like avoiding public Wi-Fi and using screen filters, that are essential for protecting sensitive information in professional environments.

📝 Scenario Walkthroughs and General Advice

Sandra wraps up with advice on scenario walkthroughs in interviews, emphasizing the importance of critical thinking and deductive reasoning. She encourages viewers to research company-specific interview questions on platforms like Glassdoor and to focus on understanding high-level concepts even without hands-on experience. She reassures viewers about handling unfamiliar topics during interviews by explaining their thought process and reasoning.

Mindmap

Keywords

💡Cyber Security

Cyber Security refers to the practice of protecting internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access. In the video, it is the central theme as the speaker discusses interview preparation for jobs in this field, highlighting the importance of understanding technical and behavioral aspects of cybersecurity roles.

💡Encryption

Encryption is the process of converting data into a code to prevent unauthorized access. The script mentions encryption algorithms and hashing as key topics for cybersecurity interviews, emphasizing the need to understand the difference between secure and deprecated algorithms, and their appropriate use in various scenarios.

💡Security Protocols

Security Protocols are a set of rules governing the ways in which data is transmitted and received over a network. The script underscores the importance of knowing standard port numbers and protocols for cybersecurity roles, as they are often the subject of direct questions in interviews, testing the candidate's knowledge of network security.

💡Security Tools

Security Tools are software programs or systems used to protect, monitor, and manage a network or system's security. The video script advises having a general knowledge of tools like Burp Suite, Metasploit, and Fiddler, which are commonly used in penetration testing and cybersecurity analysis.

💡CIA Triad

The CIA Triad stands for Confidentiality, Integrity, and Availability—three core principles that form the foundation of cybersecurity. The script explains that understanding these concepts is crucial for interviews as they represent the basic objectives of information security.

💡Cyber Kill Chain

The Cyber Kill Chain is a model that outlines the various stages of a cyber attack, from initial reconnaissance to the final delivery of payloads. The script mentions it as an important concept for understanding the structure of an attack, which is particularly relevant for roles in penetration testing and ethical hacking.

💡Intrusion Detection and Prevention Systems

Intrusion Detection and Prevention Systems (IDPS) are designed to identify and respond to malicious activities that threaten a network or system. The video script suggests that knowledge of these systems, including how to configure firewalls, is beneficial for cybersecurity interviews.

💡Common Security Attacks

Common Security Attacks such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF) are prevalent vulnerabilities that cybersecurity professionals must understand. The script recommends studying these attacks to be prepared for interview questions about common vulnerabilities and how to mitigate them.

💡OSI Model

The OSI Model, or Open Systems Interconnection Model, is a framework used to understand how data moves within a network. The script points out the importance of knowing the seven layers of the OSI model for cybersecurity interviews, as it helps in identifying and addressing issues at different network levels.

💡Access Controls

Access Controls are mechanisms used to restrict access to resources based on the identity of users or systems. The video script touches on the need to understand different types of access controls and network components that secure a network, which could be discussed in interviews to assess a candidate's understanding of network security.

💡Phishing Attacks

Phishing Attacks are attempts to trick individuals into revealing sensitive information or performing actions that compromise security. The script describes phishing as a common topic in cybersecurity interviews and emphasizes the importance of understanding human psychology and behavior in the context of security.

💡Scenario Walkthroughs

Scenario Walkthroughs are hypothetical situations presented in interviews to test a candidate's problem-solving skills and understanding of cybersecurity concepts. The script mentions that these walkthroughs require the candidate to think critically and use deductive reasoning to provide solutions based on their knowledge.

Highlights

The video discusses interview preparation for cybersecurity jobs, focusing on technical and behavioral aspects.

Technical cybersecurity questions often require definitive knowledge, such as understanding of HTTPS port numbers.

Encryption is a key topic, including algorithms, hashing, and differences between symmetric and asymmetric encryption.

The video emphasizes the importance of knowing common encryption algorithms like AES, SHA, and MD.

Security protocols and port numbers are critical, with the video suggesting studying for the CompTIA Security+ exam for guidance.

Knowledge of security tools like Burp Suite, Fiddler, and Metasploit is essential for cybersecurity roles.

The CIA triad (Confidentiality, Integrity, Availability) forms the foundation of cybersecurity.

The Cyber Kill Chain is highlighted as a crucial concept for understanding the structure of cyber attacks.

Security prevention and detection tools, such as intrusion prevention systems and firewalls, are discussed.

Physical security measures, like server room design and Faraday cages, are important for protecting against attacks.

Common security attacks, including XSS, SQL Injection, and CSRF, are outlined with resources for further study.

The OSI model is introduced as essential knowledge for understanding network layers and potential security issues.

Network security and access controls are detailed, including the function of routers, hubs, and proxy servers.

Phishing attacks are explained, emphasizing the psychological aspects and common types of phishing.

Common security practices, such as avoiding public Wi-Fi and using screen filters, are recommended.

Scenario walkthroughs are presented as a method for demonstrating critical thinking and deductive reasoning during interviews.

The video concludes with advice on how to approach unknown topics during interviews and the importance of showing a willingness to learn.

Transcripts

play00:00

hey guys welcome and welcome back to my

play00:01

channel this is sandra and i make videos

play00:03

all about work blog cyber security and

play00:05

having a career in technology

play00:06

and if this video was helpful to you

play00:07

please give it a thumbs up so more

play00:09

people can find it through the youtube

play00:10

algorithm

play00:11

so today we're going to be discussing a

play00:12

highly requested video from you guys

play00:14

which is interview prep for cyber

play00:16

security jobs and this is definitely a

play00:17

big topic especially when i was

play00:18

interviewing graduating college

play00:20

and looking for entry-level

play00:21

cybersecurity roles so i kind of split

play00:23

this into the more technical side of

play00:24

cybersecurity questions

play00:26

and topics as well as the more

play00:27

behavioral interviews where you're kind

play00:29

of just answering questions about

play00:30

walkthroughs scenarios

play00:31

and just basic behavioral tell me about

play00:34

yourself questions

play00:35

and i also have time stamps all over the

play00:36

video so you can definitely jump around

play00:38

depending on what topics that you

play00:39

already know okay so from my experience

play00:41

interviewing for cyber security roles a

play00:43

lot of it comes down to questions that

play00:45

are easy to ask and unfortunately a lot

play00:47

of the questions are either you know it

play00:48

or you don't

play00:49

because if someone asks you like what

play00:51

port is https that's something you know

play00:53

or you don't know you know it's not

play00:54

something that you can like bs around

play00:56

or try to like talk around and that's

play00:58

what makes cyber security interviews a

play00:59

bit harder

play01:00

especially because i come from a coding

play01:01

background where you're kind of

play01:03

able to solve a problem using multiple

play01:05

different scenarios

play01:06

like even if you don't know how to use

play01:07

hash maps you can get to a problem

play01:09

maybe trying to use a different way or

play01:10

brute force so if that noted

play01:12

one of the first topics is encryption

play01:14

this goes from encryption algorithms

play01:15

hashing algorithms the differences

play01:17

between the few which ones are secure

play01:18

and which ones are depreciated and no

play01:20

longer being used

play01:21

or which ones you would use in which

play01:22

scenarios and there's also very niche

play01:24

algorithms like two fish and you should

play01:25

try to look up the most common

play01:26

algorithms

play01:27

to just have an idea of what they are

play01:29

and what they do of course the most

play01:30

common ones are aes

play01:31

sha md and everything in those families

play01:34

so i would definitely recommend at least

play01:35

looking into those

play01:36

so you have an idea as well as the

play01:38

differences between a symmetric and

play01:39

asymmetric encryption as well as block

play01:41

ciphers versus stream ciphers and those

play01:43

will be the main things in encryption

play01:45

that are very high level enough to be

play01:47

asked during a standard cyber security

play01:49

analyst or cyber security interview and

play01:50

honestly a lot of the topics that are

play01:52

interviewable

play01:53

are actually found in the comptia

play01:55

security plus exam which is a

play01:56

certification that i actually took last

play01:58

year so if you guys are interested

play01:59

definitely check out the link below i

play02:01

made a video about resources i use

play02:02

and even if you don't want the

play02:04

certification it's always good to study

play02:06

because it's also a very good resource

play02:07

for all the material in cyber security

play02:09

at a high level

play02:10

that you can study just for interviews

play02:12

okay so the next thing is security

play02:13

protocols and port numbers so in my

play02:15

first interview for a cyber security

play02:16

role

play02:17

it was actually for a cyber security

play02:18

internship i was given a quiz

play02:20

that literally asks me things like what

play02:22

is the port number for this um what port

play02:24

number is this

play02:25

one would you use this protocol versus

play02:26

the other and different things like that

play02:28

and then afterwards we kind of went over

play02:30

the answers and reviewed them

play02:31

so that was definitely a very

play02:33

anxiety-inducing interview

play02:35

but also it just goes to show that a lot

play02:37

of these questions

play02:38

are straight up like you know it or you

play02:40

don't and that's why i feel like i

play02:41

really want to stress the importance of

play02:43

you should know standard port numbers

play02:45

you should know what they do you should

play02:46

know when to use them

play02:47

and you should also know if you're given

play02:49

a network scenario which also i'm going

play02:51

to talk about later

play02:52

and they're asking you what's wrong with

play02:53

this network and maybe you're doing an

play02:54

nmap scan of all the open ports

play02:56

and you're there to see okay so what's

play02:58

wrong with this right now are there any

play03:00

port numbers that are open that are

play03:01

really suspicious so that's why it's

play03:02

really important because if you see

play03:04

a port number for a remote desktop

play03:05

protocol but you don't know that that's

play03:07

what that port is for

play03:08

then that question is already like over

play03:10

your head and then that's when you might

play03:11

start like getting worried a little bit

play03:12

so that's why i feel like it's really

play03:14

important to know those basic standard

play03:15

protocols

play03:16

and again comptia security plus has a

play03:18

pretty good list of protocols

play03:20

and port numbers that you should at

play03:21

least know and i believe there's about

play03:23

20 or 30 of them so i will link that

play03:26

below okay so another thing is security

play03:28

tool

play03:28

knowledge this one sounds really basic

play03:30

but honestly when i was even studying

play03:31

for software development or software

play03:33

engineering roles

play03:34

they would ask me questions like oh what

play03:35

is mongodb what kind of language is

play03:37

python

play03:37

is python interpreted language and

play03:39

different standard general questions

play03:41

like that

play03:41

so that's why i feel like you should

play03:42

have a general knowledge of the

play03:43

different tools that are used

play03:44

for example burp suite is probably one

play03:46

of the biggest ones in pen testing

play03:48

fiddler is a big one metasploit is also

play03:50

a big one but it may not be as commonly

play03:51

used as something like burp suite

play03:53

but generally you should know that oh

play03:54

yeah burp suite is used as a proxy and

play03:56

you can use that to take in traffic from

play03:58

your browser and basically analyze it

play04:00

you should also know the difference and

play04:01

know different examples of packet

play04:03

sniffers

play04:04

network scanners port scanners as well

play04:06

as just different tools

play04:07

that the community uses as well as open

play04:09

source tools whether that's for open

play04:10

source intelligence or any other role

play04:12

that you're looking for

play04:13

especially if you're going for a

play04:14

beginner type role the most easiest

play04:16

thing that you could do

play04:16

is look up top 10 most common tools used

play04:19

in cybersecurity

play04:20

and then you'll find those and at least

play04:22

you'll know the idea so if a scenario

play04:24

comes up or a walkthrough

play04:25

or a question comes up like do you know

play04:27

what burp suite is or what does burp

play04:29

suite do or

play04:30

what is verbs be used for like you at

play04:31

least know how to answer high level

play04:33

those questions and then you can always

play04:34

go from there and say hey i know high

play04:36

level what this is

play04:37

it's xyz but i would also love to learn

play04:39

more and do my own research on the job

play04:41

and i'm willing to learn

play04:43

so i feel like that's the key point the

play04:45

fact that you know a bunch of high level

play04:46

things

play04:47

but you're always willing to learn and i

play04:48

feel like that's one big thing that a

play04:50

lot of the interviews

play04:51

that you're going to be going in at

play04:52

least for cyber security are going to be

play04:54

looking for and honestly any role

play04:55

like every interview is really trying to

play04:57

see like how much your willingness is to

play04:59

learn

play04:59

and how passionate you are about the

play05:01

topic so that's why i feel like those

play05:02

are really important

play05:03

especially for entry-level roles okay so

play05:05

the next thing is the cia concepts

play05:07

and the cia triad or the cia triangle is

play05:09

kind of like

play05:10

the really basic foundation of cyber

play05:11

security all right this looks weird but

play05:14

and it's basically confidentiality

play05:15

integrity and availability these are the

play05:17

three

play05:17

pillars of cyber security

play05:19

confidentiality of course is just making

play05:20

sure that outsiders don't know your

play05:22

information

play05:23

they don't know any confidential info

play05:24

integrity is can we make sure that

play05:27

no one is changing this information

play05:28

without our permission or only the right

play05:30

people are changing this information

play05:31

and how can we trust this information

play05:33

and making sure that it's you know as

play05:35

accurate as possible and availability is

play05:37

the last pillar which a lot of people

play05:38

don't know is

play05:39

actually a really super important part

play05:40

of cyber security because availability

play05:43

talks about ddos attacks talks about

play05:44

being able to keep

play05:45

your applications online for users to

play05:47

use because that in itself is a cyber

play05:49

security attack

play05:50

if someone brings down your network and

play05:52

your customers are no longer able to

play05:53

access your website

play05:54

that is an attack on availability and if

play05:56

you worked at any company

play05:58

for any amount of time you know that

play05:59

availability costs a lot of money

play06:01

all the downtime that your company has

play06:02

especially on an application that might

play06:04

be widely used by clients that could

play06:06

potentially be thousands millions of

play06:08

dollars going down the drain because

play06:09

your application is offline so that's

play06:11

why availability is one of the most

play06:12

important parts of cyber security

play06:14

hence the cia triad so i would

play06:16

definitely try to hammer down

play06:18

these concepts and know if you're given

play06:20

a scenario like you work at x by company

play06:22

there's like this application that needs

play06:23

to be secure

play06:24

you want to implement these logs and you

play06:26

also want to implement some kind of

play06:27

preventative measures for ddos attacks

play06:29

what are the cia concepts that are used

play06:31

in this scenario and then you can know

play06:33

okay well if you want logs that means

play06:34

you want to make sure you know who's

play06:36

changing the data know that they're

play06:37

trustworthy make sure that integrity

play06:39

is there for any information that's on

play06:41

that application and then if they're

play06:43

trying to prevent a ddos attack then

play06:44

they're mostly trying to

play06:45

account for availability for the

play06:47

application and of course that's just an

play06:48

example question that i just thought of

play06:50

and there's also going to be a lot of

play06:51

deductive reasoning

play06:52

so you should always try to think as

play06:53

logically as possible okay what's the

play06:55

first step i should do

play06:56

and what does this mean and you should

play06:57

always ask why and how

play06:59

for these questions especially when

play07:00

you're in an interview where they're

play07:01

doing some kind of walkthrough

play07:03

or scenario and they're trying to get

play07:04

you to give them a solution or trying to

play07:06

get you to say what would you do if this

play07:08

happened

play07:08

so you should always think with the end

play07:10

user in mind the client in mind

play07:11

protecting as much

play07:12

of the customers or the clients or the

play07:14

company's assets as possible

play07:16

which leads me pretty well into the

play07:18

cyber kill chain

play07:19

and this is something that one of my red

play07:21

team mentors says is really really

play07:23

important

play07:23

and honestly i never thought about this

play07:25

before i actually got into cyber

play07:26

security even when i was studying for

play07:28

interviews i didn't really think about

play07:29

this but this was originally used as a

play07:31

military term

play07:32

that basically talks about the structure

play07:34

of an attack and i can include some kind

play07:36

of

play07:36

diagram on the screen that can

play07:38

potentially help as well as links below

play07:40

if you guys are interested in learning

play07:41

more

play07:42

but this is one of the most important

play07:43

things that pen testers and red tumors

play07:45

and ethical hackers think about because

play07:47

this is basically the anatomy of an

play07:48

attack from the time when an attacker

play07:51

identifies a target to deciding how they

play07:53

can

play07:53

attack a vulnerability that the target

play07:55

might have exploiting the target

play07:56

controlling the target and then

play07:58

basically reach command and control so

play07:59

you want to keep in mind these concepts

play08:01

and try to understand

play08:02

potentially if you're given a scenario

play08:03

for this attack happen where in the

play08:05

cyber kill chain is this um how can we

play08:07

stop it and different things like that

play08:08

so you always want to keep that in mind

play08:09

especially when you're going for a pen

play08:11

testing role or some kind of ethical

play08:12

hacking role

play08:13

okay so the next thing is security

play08:14

prevention and security detection so

play08:16

there are a bunch of different tools out

play08:17

there that are very high level

play08:19

again you should really look at comptia

play08:21

security plus concepts because i feel

play08:22

like they were just really helpful in

play08:23

helping a beginner like me understand

play08:25

especially because i haven't been in

play08:27

this field for that long

play08:28

these are the concepts that would be

play08:29

really good to know for a potential

play08:31

interview

play08:31

and this goes from intrusion prevention

play08:33

and intrusion detection systems

play08:35

firewalls how to configure a firewall

play08:37

and you can look online for various

play08:38

examples of this this is also tested in

play08:40

security plus

play08:41

where a potential question could be that

play08:43

you're given some kind of network and

play08:44

you're told

play08:45

you need to secure this firewall like

play08:46

what would you change based on this

play08:48

example companies third-party networks

play08:50

extranets

play08:51

and various different secure and

play08:52

non-secure zones in their network i feel

play08:54

like understanding at least a high level

play08:55

of

play08:56

firewall configurations is also very

play08:57

important and also don't forget physical

play08:59

security because if you think about it

play09:00

that is also really important

play09:01

for example did you know that in server

play09:03

rooms or like rooms with very important

play09:05

machinery

play09:06

they don't have crawl spaces or like

play09:07

those vents in the ceilings

play09:09

because someone could potentially sneak

play09:10

into that essentially plug in a usb

play09:12

and exfiltrate data and i feel like

play09:14

that's why it's really important to know

play09:15

high level

play09:16

all these things to the point where

play09:17

you're thinking about parking lot lights

play09:19

fences faraday cages um which basically

play09:22

stop electromagnetic

play09:23

interference so there's basically a lot

play09:25

of things that you can think about and

play09:26

again these topics are on security plus

play09:28

so let me just add a link below for all

play09:30

this comptia security plus topics

play09:32

i i just feel like it'll be really

play09:33

helpful to you guys okay so this video

play09:35

is getting kind of long

play09:36

and the next thing is common security

play09:37

attacks so the most common ones like

play09:39

crosstalk scripting

play09:40

sql injection cross-site request forgery

play09:42

there's a lot of different attacks out

play09:43

there

play09:44

and there's actually a list of most

play09:45

common attacks by owasp so i can link

play09:47

that below and you can check it out

play09:49

and a lot of pen testing teams also look

play09:51

for these common attacks because

play09:52

they are common vulnerabilities so

play09:54

definitely check that out and learn a

play09:55

bit more if you're interested

play09:56

and i can also link below hack the box

play09:58

as well as a few other resources that

play10:00

you can use to get some

play10:01

beginner pen testing experience because

play10:03

even if you're not going for a print

play10:04

testing role

play10:05

these will be really helpful for you to

play10:06

kind of understand the mind of an

play10:08

attacker and what they're trying to do

play10:10

so then when you get an interview

play10:11

question that has to do with an attack

play10:12

or some intruder in the network

play10:14

then you kind of know like okay what are

play10:16

you going to try to do next they're in

play10:17

this person's account

play10:18

they're trying to they're probably

play10:18

trying to elevate their privileges or

play10:20

find some kind of admin user

play10:21

that they can take advantage of and run

play10:23

higher level attacks or take more

play10:24

control of the system

play10:26

and then you can go from there so that's

play10:27

why it's really good to understand high

play10:28

level

play10:29

all these roles and all these different

play10:31

things in the network that kind of work

play10:33

together

play10:33

so then you can answer in the best way

play10:35

possible in any scenario or walk-through

play10:37

interview that you might have

play10:38

and of course the next thing is the osi

play10:40

model which is basically all the layers

play10:42

in the network and honestly there are

play10:43

acronyms out there i don't remember the

play10:45

exact one that i had

play10:46

but i can put some on the screen or drop

play10:48

some examples on the screen

play10:49

and honestly once you remember them it

play10:51

would be really easy to kind of recall

play10:52

them like

play10:53

okay this is a data link layer oh that's

play10:55

a network layer this is the physical

play10:56

layer like eventually you're gonna be

play10:57

able to differentiate those especially

play10:59

during an interview since i feel like

play11:00

those are some of the really basic

play11:01

levels because from my experience even

play11:03

on this current team

play11:04

there are times when people are like oh

play11:06

yeah that's a network layer problem so

play11:07

that's probably not something that we're

play11:08

worrying about or

play11:09

oh that's an application layer problem

play11:11

so blah blah blah so there's a lot of

play11:12

different things that you can infer

play11:14

based on what layer of the network that

play11:15

it is and that's why it's really

play11:16

important to know the osi model

play11:18

at a high level at least so you can kind

play11:20

of answer questions about them in a

play11:21

potential interview

play11:23

i need to take a breath or something all

play11:26

right network security and access

play11:28

controls

play11:28

so this of course is very generic you

play11:31

should at least know the different

play11:32

pieces of equipment

play11:33

or technology that sit on your network

play11:35

and control network access

play11:37

for example what is a router what is a

play11:38

hub what is a proxy server

play11:40

where is your dns server and what are

play11:42

all those little components that are in

play11:43

your network that are securing it

play11:45

and where are you putting each thing for

play11:46

example your internal network is going

play11:48

to be behind a firewall

play11:49

and you might be shown a diagram during

play11:51

your interview where people are like

play11:52

okay this is

play11:53

a example of a network setup what is

play11:55

wrong with this picture is something

play11:56

wrong with it or

play11:57

what would you do to improve it so

play11:59

there's a lot of questions that could go

play12:00

into that

play12:01

and of course that's another reason why

play12:02

it's really important to know like hey

play12:04

oh it's a dns server i know what that

play12:06

does we're like oh why isn't there a

play12:07

firewall between the internal network

play12:09

and the extranet

play12:10

which also goes into basic cyber

play12:11

security concepts like honeypot or

play12:13

honeynet which are basically

play12:15

bait networks that companies set up to

play12:17

kind of make attackers think that they

play12:18

got into the real network

play12:19

and they can also analyze what attackers

play12:21

are doing to learn more about

play12:23

how they're attacking and different

play12:24

things that you're trying to do or

play12:25

different things that they're actually

play12:26

looking for

play12:27

and the next thing is phishing attacks

play12:29

so of course phishing

play12:30

is very common um you guys probably have

play12:32

hella spam emails

play12:33

with little notes that say oh this might

play12:35

be a phishing email don't click on any

play12:37

links and there's lots of different

play12:38

types of fishing there's fishing there's

play12:40

whaling

play12:40

and a bunch of different other ones so

play12:42

that's definitely something that you can

play12:43

look into and

play12:44

fishing i feel like is more like human

play12:45

psychology and a lot of people i know

play12:47

actually in cybersecurity have a

play12:48

psychology background

play12:50

um because it's all about human behavior

play12:52

and what makes humans do something

play12:53

and there's actually legit concepts

play12:55

around fishing that are actually studied

play12:57

to understand what makes people

play12:59

want to do something and a lot of that

play13:01

sadly is driven on fear

play13:02

greed use of authority so there's

play13:04

definitely a lot you can look into there

play13:05

and because of that it's actually a

play13:07

really easy topic to get questions on in

play13:08

an interview

play13:09

and i would say that you would

play13:10

definitely want to get those correct

play13:12

because this is a lot of human

play13:13

psychology

play13:13

and if you did end up working for that

play13:15

company and you click on some email that

play13:17

is

play13:18

really fishy you know like fishy and

play13:20

that actually proves to be a threat to

play13:21

the network for that company

play13:23

um that could be a really bad thing so

play13:24

phishing is a really important topic

play13:26

that you want to get down okay so the

play13:27

next thing is common security practices

play13:29

these will be little scenarios like you

play13:30

shouldn't plug in a personal usb

play13:32

into your work computer and then try to

play13:34

take home a report to work on later

play13:36

or you shouldn't use public wi-fi or you

play13:38

should use some kind of screen filter or

play13:40

dimmer

play13:40

to make sure no one is shoulder surfing

play13:42

you so basically very general

play13:44

common security practices that you can

play13:46

look into because you don't have to know

play13:47

the exact word

play13:48

but you can always say like yeah i

play13:50

wouldn't use public network or

play13:51

or i wouldn't just plug in my usb into a

play13:53

server and then the last topic i want to

play13:55

talk about was scenario walkthroughs

play13:57

so i kind of sprinkled them all around

play14:00

this video already

play14:01

but it's basically just when they give

play14:02

you some kind of diagram they give you

play14:04

some kind of scenario

play14:05

whether it's about an attack or how to

play14:07

protect the network

play14:08

or what to do better different things

play14:10

like that those are the main questions

play14:12

that are going to be

play14:12

getting you to think on your feet as

play14:14

well as making use of deductive

play14:16

reasoning

play14:16

so you can answer those questions as

play14:18

best as possible based on your current

play14:19

knowledge

play14:20

and also i want to say that if you don't

play14:23

know a question or an answer to the

play14:24

question

play14:24

that's okay like they don't expect you

play14:26

to know everything especially

play14:28

in your early career so i feel like the

play14:30

best thing you can do is

play14:31

take in all the information as much as

play14:33

you can before your interview

play14:34

and then see okay this is what i know

play14:37

and that that is exactly what you're

play14:38

going to tell the interviewer

play14:39

so i may not be familiar with dns

play14:41

servers but this is what i know about

play14:43

firewalls and blah blah blah

play14:45

like i feel like this shouldn't be right

play14:47

or this shouldn't be placed here

play14:48

um or i feel like you should add another

play14:50

firewall here between this network and

play14:51

this network

play14:52

so there's a lot of things that you can

play14:54

infer based on your current knowledge

play14:56

so even if you don't know exactly

play14:58

everything that's on that diagram they

play15:00

don't expect you to

play15:01

so that's okay don't let it freak you

play15:02

out if they give you some kind of really

play15:04

crazy diagram

play15:05

or a scenario that you've never heard

play15:06

about like oh they happen to an email

play15:08

server

play15:09

i don't know i never work with email

play15:10

servers well that is okay

play15:12

just tell them what you do know and talk

play15:14

around what you think is the right

play15:15

solution

play15:16

but then try to put as much backing and

play15:18

groundwork about it

play15:19

as possible so you can explain your

play15:21

ideas and kind of walk through what

play15:23

you're thinking

play15:23

because that's the most important thing

play15:25

like knowing your mindset knowing

play15:27

how you think about ideas critical

play15:28

thinking and deductive reasoning

play15:30

are probably the most important things

play15:32

they are looking for in that interview

play15:33

okay so i probably talked your ear off

play15:35

but thank you guys so much for watching

play15:36

and i'm sure this is not like this is

play15:38

not a comprehensive list so i really

play15:40

feel like you should definitely do your

play15:41

own research

play15:42

and look up questions for whatever

play15:43

company that you're studying for and

play15:45

look up glassdoor

play15:46

questions and i'm sure if you look up

play15:47

like the name of your company

play15:49

and then like cyber security interview

play15:51

questions something at least will come

play15:52

up

play15:53

and you can definitely use those to help

play15:54

guide your studying but i feel like

play15:56

these are just general topics that you

play15:57

can look into

play15:58

that can kind of help guide you for what

play16:00

you should study for your next interview

play16:02

and again i really feel like comptia

play16:03

security plus topics and probably a plus

play16:05

topics would be really helpful

play16:07

just for studying for beginner level

play16:08

interviews because they're probably not

play16:10

going to be asking for like your

play16:11

experience and what you've

play16:12

already configured and already done

play16:14

especially for you know only like

play16:16

one or two years maybe zero years into

play16:18

your

play16:19

career so at least knowing these general

play16:21

topics will show them that

play16:22

hey this person kind of knows what

play16:23

they're talking about even though they

play16:24

haven't maybe done any hands-on work yet

play16:26

they know at a high level what these

play16:28

concepts are and how they work together

play16:30

thank you guys so much for watching if

play16:31

you like this video please give it a

play16:32

thumbs up

play16:32

i hope it was helpful if it was please

play16:34

consider subscribing and turn on post

play16:36

notifications

play16:36

i post videos every wednesday at 2 p.m

play16:39

and sundays at 12 p.m and feel free to

play16:41

drop any ideas and suggestions that you

play16:42

have

play16:43

for studying for any cyber security

play16:44

interviews that you've already completed

play16:46

just in case it can help anyone else in

play16:48

the community

play16:48

and definitely drop any questions that

play16:50

you guys might have as well thank you

play16:51

guys so much for watching and i'll see

play16:53

you guys in my next video

play16:56

[Music]

play17:02

bye

play17:07

you

Rate This

5.0 / 5 (0 votes)

Related Tags
Cybersecurity InterviewJob PrepTechnical QuestionsBehavioral InterviewCareer AdviceSecurity ProtocolsEncryption BasicsCyber ThreatsInterview TipsCareer DevelopmentTech Industry