Cyber Security Interview Questions and Answers | Vulnerabilities and Incident Response

preview_player
Показать описание
In this video, I will be answering some cybersecurity interview questions that I've been collecting over time. The goal of this video is to show some realistic questions that might be asked in your next interview and give some ideas on how to thoughtfully answer some of these questions. Please post any corrections in the comments!

---
🖥 Break into IT in ~3 Months with my Hands-On Practical Course! 🖥
---

📹 - Video Links - 📹

🙇‍♂️ - Patreon - 🙇‍♂️

⌨️ - Coding - ⌨️

⭐️ - Social Media - ⭐️

🎥 - Equipment - 🎥

📄 - Sample Resumes - 📄

0:00 Intro
0:24 Tell us about Vulnerabilities; what are they? How are they identified and how are they mitigated?
4:01 You are the only member of the Information Security Risk & Compliance team available and the organization experiences a phishing incident. As the only one available, you are made the Incident Manager. Please walk us through the steps you would take to manage the incident.
9:24 Outro

Cyber Security Interview Questions and Answers | Vulnerabilities and Incident Response
CyberSecurity Interview Questions and Answers | Vulnerabilities and Incident Response

DISCLAIMER: This video description has some affiliate links and I may receive a small commission. I only share stuff that I use and believe in. Thanks so much for your support 🥺
Рекомендации по теме
Комментарии
Автор

🖥 Break into IT in ~3 Months with my Hands-On Practical Course! 🖥

JoshMadakor
Автор

Some of these questions where on my exams recently in Cyber Security Batchleors Degree. And in one of our modules, one group assignment was to take part in teams with the game Backdoors & Breaches working as an incident report team to identify and mitigate vulnerabilites.

tuttmasterc
Автор

I've been asked this a couple times in interviews and didn't know how to answer it. What steps would you take to harden security at your company? I said the end user is the number one weakness in any company, so I would do regular security trainings via knowb4, they even have an excellent video series called the inside man that goes through a number of different threats but makes it entertaining with a Netflix like show story. Also enable multi factor authentication for passwords, physical security like locks and badges or key cards, cameras. Using vpns when working from home. Blocking unused ports. I just came up with those last two. Amazing what I think up when I'm not on the spot nervous in an interview. Anything else I could add?

innocentrage
Автор

Awesome vid, I found that the CIA triad was asked a lot too!

RipTideNetwork
Автор

Your videos help a lot. Just wanted to say thanks :)

elizabeth_yupar
Автор

Awesome job mann. Love your videos. Do you offer or teach it classes on line?

mohamedmansaray
Автор

Hello Josh, Im rying to make the transtion from QA Analyst to a Vulnerability Management Analyst. At the moment reading up on Qualys and it project and eaam. My concern, changing my resume around and to into this field, learning all the verbiage, hoping to start interviewing by February of 23.Please give me your suggestion...

DetroitDon
Автор

@Josh Madakor Can you please give me several questions I can ask a VP of Sales for a Cyber Security & Cloud Computing position? Everyone else post videos on what a manager would ask an interviewee. Cheers

ptzduyt
Автор

Kindly answer this for me.

In a phishing email analysis, what do you do when you realize the embedded link or attachment in the email was opened or clicked on by 50 other hosts on the network?

AmosOsei
Автор

Hi, do you think information security officer working with iso 27001 is a good entry job to get into cyber security? How would one progress form this job? Any courses you recommend?

gurugamer
Автор

Please can u recommend cyber security books for me to start

ebosac
Автор

Hey for a question when I get emails from jobs from LinkedIn or even indeed I can't tell if these email l these jobs are actual potential jobs or high level social engineering phishing for my info because it seem they always asking for last 4 of my social and first nam last name.

Marcothemillionaire