• Complain

Backdoor: Bypassing the Gatekeepers in Cybersecurity

Here you can read online Backdoor: Bypassing the Gatekeepers in Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. genre: Religion. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Backdoor: Bypassing the Gatekeepers in Cybersecurity
  • Author:
  • Genre:
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Backdoor: Bypassing the Gatekeepers in Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Backdoor: Bypassing the Gatekeepers in Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Backdoor is a 360-day strategy to help get anyone from any field into cybersecurity without the seemingly inevitable teeth marks of ferocious gatekeepers. It reveals another path that bypasses the heavily guarded gates and meanders through several unmanned doors that lead you right into centre of the industry.We really dont want you to break into cybersecurity; we want you to walk in.

Unknown: author's other books


Who wrote Backdoor: Bypassing the Gatekeepers in Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

Backdoor: Bypassing the Gatekeepers in Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Backdoor: Bypassing the Gatekeepers in Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

BACKDOOR

Bypassing the Gatekeepers in Cybersecurity

Femi Reis

Copyright 2021 by Oluwafemi Reis

All rights reserved in all media. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the author, except in the case of brief quotations embodied in critical articles and reviews.

Paperback Edition

ISBN 978-978-998-132-8

Cover Design by Mark Kolo

To the Norm Shakers: Zack Hill, Josh Mason, Naomi Buckwalter, Gerald Auger et al.

If ever theres a stampede at the gates, you know the people to look out for.

ContentsPrologue
One of the greatest things I love about cybersecurity is the community of - photo 1

One of the greatest things I love about cybersecurity is the community of well-meaning people within the industry who form a robust support system to help others get in. However, on the other end of this spectrum, is another community of people who, for one reason or the other, form an almost impervious restraining system to keep others from coming in and ensure that only a handful ever make it through. They are called the gatekeepers.

Over the years there has been lots of advice from the well-meaning community on how to negotiate with the gatekeepers, how to present yourself in a way that makes them let you in, how to prepare your rsum and answer hard interview questions. Now, while much of this advice is good and helpful, they are largely inside-the-box counsel and still leave many good folks at the mercy of ferocious gatekeepers. I myself have received and given a lot of counsel too, but after its all been said and done, I have come to realize that the fastest way to get into cybersecurity is to develop a plan that bypasses the gatekeepers altogether. That plan will be peculiar to you and owned by you, and wont be a one-size-fits-all plan. However, the plan will be reproducible in every context if the general principles are followed. Theres no point negotiating with the gatekeepers. Theres a backdoor and theres a plan, and this book is a framework for developing and implementing that plan for yourself.

Finally, before we delve in, I must mention that while I passionately share the Backdoor strategy in this bookfor I sure have seen it workby no means am I the Messiah, and so my word is not final; hence this book is not a call to abandon all youve known and done before, but rather it is a helpful and practical guide that promises to deliver commendable results whenever it is acted upon.

I hope it leads you to where youve always dreamed of being in this amazing industry.

My Story is Just Like Yours
The first time I ever got the incline to pursue a career in cybersecurity was - photo 2

The first time I ever got the incline to pursue a career in cybersecurity was in 2015. I was sitting in a room with professionals from diverse industries attending a training on leadership. The man who was leading the session veered off a bit from his subject and began to talk about the future of IT. He explained that, with the fast rise in global internet penetration and the rapid move of everything from real to virtual, security will be a huge concern in the future, and IT experts who are not yet in cybersecurity might want to consider exploring opportunities in that domain. Then, like a driver going off the road who suddenly realizes hes facing a tree, he veered back on course and continued with the theme of his subject, dropping the cybersecurity talk almost as quickly as he picked it.

Fast forward a few years and I knew I had to get into cybersecurity. Prominent in my pre-entry discovery was the fact that there was a great need for cybersecurity professionals. The demand was crazily high and the supply ridiculously low. The projections were equally staggeringby 2021 there would be 3.5 million unfilled cybersecurity jobs. Why would there be such a great need of hands and minds in any industry with few people rising to the occasion? I thought to myself.

I decided to take up the challenge and do the pivot I researched what it would - photo 3

I decided to take up the challenge and do the pivot. I researched what it would take to get started from entry level, and how best to proceed. I started pursuing the certifications that were necessary to guarantee my entry or at least help get my foot in the door. So, just like you, I took off with a cocktail of courses and certifications and made them as prominent as I could on my profile and rsum. It wasnt until I had gotten the entry-level skills and certifications as recommended that I made the shocking discovery Im sure youve also made.

There were more people trying to get in than I had imagined It wasnt as they - photo 4

There were more people trying to get in than I had imagined. It wasnt as they said! Could they have lied? Who are they in the first place? Whose word was I taking when I read that the demand for practitioners and professionals in the industry stupendously outweighed the supply? Had I been thoroughly misled by overzealous tech bloggers? As I asked these questions and studied the situation, I progressively realized that it was the exact shocking discovery of almost every person who took off at the start line with me. What could be the problem here? I suspended all my efforts at getting in and began to investigate the situation. I wasnt going to continue in the race of adding certifications and revamping my rsum and adding certifications and revamping my rsum till I finally squeezed my way in and came out like scrambled eggs on the other side of the gate, rather I devoted my time to quietly investigate the situation in order to find out what exactly the problem was.

I started walking around the building in search of the clog and I didnt have - photo 5

I started walking around the building in search of the clog, and I didnt have to look for long before I found it. He was right there at the gates.

Boy Was he big or was he BIG He was so huge there was no point fighting him - photo 6

Boy! Was he big or was he BIG! He was so huge there was no point fighting him, and besides, even if we pushed him down, there were so many others like him around. What hope could the Lilliputians have had if there were hundreds of Gullivers on their island? It dawned on me that there was no way we could fight these guys by throwing more certs at them. I had to come up with another plan.

I left the folks at the front gates and started taking a slow walk around the - photo 7

I left the folks at the front gates and started taking a slow walk around the building. I remembered that while studying for Security+ I had learnt about a backdoor through which hackers could gain privileged access into an operating system and do whatever they intended. What if there was a backdoor somewhere around here? I kept walking around the massive building, diverting the time I could have spent on cert preps into my careful exploration instead. I appeared to have disappeared from the scene. I knew I had travelled far from the gates when I stopped hearing the loud rumblings and grumblings of the crowd that was gathered there. Many times I felt I should just give up my search and go back to join my folks at the gates, especially when I heard the occasional cheerings that erupted whenever someone successfully made it in through the gates. My search was not yielding any results and I was going to go back to the gates. A question kept ringing in my head: Why am I doing this, when I know I could end up circling the entire perimeter of the building only to find myself back where I started at the gates again? The more I thought about that frightening possibility, the more I felt it was wise to abort my search and return to the gates. But then one beautiful day, just as though from out of the blues, I found something precious standing there.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Backdoor: Bypassing the Gatekeepers in Cybersecurity»

Look at similar books to Backdoor: Bypassing the Gatekeepers in Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Backdoor: Bypassing the Gatekeepers in Cybersecurity»

Discussion, reviews of the book Backdoor: Bypassing the Gatekeepers in Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.