(ISC) 2 Headquarters US 19 North, Suite 205 Palm Harbor, Florida Gallows Road, Suite 210 Vienna,Virginia 22182

Size: px
Start display at page:

Download "(ISC) 2 Headquarters 33920 US 19 North, Suite 205 Palm Harbor, Florida 34684. 1964 Gallows Road, Suite 210 Vienna,Virginia 22182"

Transcription

1 1964 Gallows Road, Suite 210 Vienna,Virginia United States of America Ph: or Fx: Bayshore Boulevard, Suite 201 Dunedin, Florida United States of America Ph: or Fx: (ISC) 2 Headquarters US 19 North, Suite 205 Palm Harbor, Florida United States of America Ph: Fx: (ISC) 2 EMEA Winchester House Old Marylebone Road London, NW1 5RA United Kingdom Ph: +44 (0) Fx: +44 (0) (ISC) 2 Asia-Pacific Level 30, Bank of China Tower 1 Garden Road Central, Hong Kong Ph: Fx: (ISC) 2 Japan Yanagi Bldg., 4 FL Roppongi Minato-ku,Tokyo Japan Ph: Fx: Copyright 2006 (ISC) 2, Inc. All rights reserved.all contents of this brochure constitute the property of (ISC) 2, Inc. All marks are the property of the International Information Systems Security Certification Consortium, Inc. (10/06)

2 (ISC)² Career Guide European Edition Decoding the Information Security Profession Published by SECURITY TRANSCENDS TECHNOLOGY

3 Introduction Welcome to the rapidly growing field of information security! Twenty-five years ago, the information security profession was new and obscure. Many of us fell into information security jobs when our employers realised their business was at risk and they needed to protect their networks and assets. The catch is they weren t sure how in terms of technology or people to make that happen. We gathered in small groups and at conferences and tried to figure out how to tackle this job that no one had done before us.we had sketchy job descriptions and IT-oriented titles that didn t reflect business requirements, our company s environment or the actual jobs we were doing.there were also few standards and guidelines. Today, things are different. Hackers have evolved from a small group of highly specialised guys writing malicious code to widespread professional thieves actively stealing identities and assets, destroying individuals lives and ruining businesses. As a result, society has come to rely on information security professionals. Businesses recognise the value of the information they protect as critical to delivering their products and services. And they protect us all personally, securing much of what we use in our daily lives, from phones to electricity to home computers. Information security has become a real profession driven by common standards and supported by education opportunities and certifications like the CISSP and SSCP that empower professionals throughout their careers. Being an information security professional is a tough job.you need technical skills and the ability to understand how to protect information and information services in a business context. But it can also be an immensely rewarding career with thrilling prospects. I hope this guide helps you understand the opportunities before you and prepares you for this exciting and challenging career! Patricia A. Myers, CISSP-ISSMP, Chairperson, Board of Directors, (ISC) 2

4 About (ISC) 2 The International Information Systems Security Certification Consortium, Inc. [(ISC) 2 ] is the internationally recognised Gold Standard for certifying information security professionals. Founded in 1989, (ISC)² has certified over 45,000 information security professionals in more than 120 countries. Based in Palm Harbor, Florida, USA, with offices in Vienna, Virginia, USA, London, Hong Kong and Tokyo, (ISC) 2 issues the Certified Information Systems Security Professional (CISSP ) and related concentrations, Certification and Accreditation Professional (CAP CM ), and Systems Security Certified Practitioner (SSCP ) credentials to those meeting necessary competency requirements. The CISSP, CISSP-ISSEP and SSCP are among the first information technology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers a portfolio of education products and services based upon (ISC) 2 s CBK, a compendium of industry best practices for information security professionals, and is responsible for the annual (ISC)² Global Information Security Workforce Study. More information is available at 3

5 Table of Contents What is information security?...5 Jobs and industries...9 Entry requirements...13 Certifications...15 Typical salaries...21 Career outlook...22 Schools, education facilities, certification organisations...24 Additional resources and associations

6 What is Information Security? Information systems* is any written, electronic or graphical method of communicating information. The basis of an information system is the sharing and processing of information and ideas. Computers and telecommunication technologies have become essential information system components. The scope of information systems includes people, processes, infrastructures, architecture, and technical implementations. Information security, on the other hand, is assuring the correctness, reliability, availability, safety and security for all aspects of information and information systems. Information security is critical to the economic well-being of commercial enterprises and public services, as well as for the integrity of the global economy. Major businesses and governments using the Internet are deploying more and more complex, networked information systems. It is the job of information security professionals to ensure that these networks and computer systems are properly and adequately secure by protecting information assets, such as customer data, financial information and critical infrastructures. * Definition according to Barron s Dictionary of Business Terms,Third Edition 5

7 Quotes Responsibilities 6 Corporate requirements for due diligence and compliance rely mainly upon security. Regulations in this area are applied more rigorously than a decade ago and cover every aspect of business and business control.unless the three requirements of security - confidentiality, integrity and availability - are applied for every asset, process and employee, companies cannot satisfy these requirements. Security touches every area of business, from physical security to transmission security, but it is mainly the foundation of business trust. In a number of European countries, the level of technological and security sophistication is also seen as a pre-requisite for joining the wider European Union. Stuart Hotchkiss, CISSP Security Principal, HP Services, EMEA I have a PhD in Applied Physics and worked with several European research organisations. Today at Motorola, I am responsible for security aspects in corporate technology research and design, covering about 30 centres worldwide. I am head of Security Services for the EMEA region. Dr.Wojciech Swiatek, CISM Director & Motorola Information Protection Services Officer

8 Recognising a deep responsibility of care to your customers doesn t just make commercial sense, but it s also a legal matter where data protection is concerned. The sensitive data held within BT, for example, includes online financial transactions and other confidential customer and employee data, which requires high levels of protection. Every company has a responsibility of care, and managing information assurance risk requires sound methodology and strong corporate governance to be effective. Mike Todd, CISSP, Head of Security Risk & Compliance, BT Exact Sarb Sembhi Quotes Job Challenges Many of the thorniest issues can be grouped together in the words compliance and governance, be it BS7799, SOX, Data Protection, Freedom of Information, etc. What makes compliance a thorny issue is the differing views one comes across within a single organisation, all basing their views on budgets and priorities which usually determine their willingness to ignore, avoid, or prioritise. I have had to go back and re-emphasise the purpose of the compliance. If a CCTV scheme does not comply with the Data Protection Act, for example, the organisation will not be able to use the data to prosecute, thus defeating the purpose of the initial investment. Sarb Sembhi, CISSP Security Consultant and Researcher 7

9 Shaun Fothergill Information technology is geared to move away from problems, while business is geared to march toward a goal. Despite efforts to liaise, each side naturally retrenches into its own comfort zone. They are akin to the Englishman shouting at the Frenchman in a misguided effort to be understood. One has to understand and translate the meaning of the different professional languages to facilitate real communication. Shaun Fothergill, CISSP EMEA Security and IT Strategist, Computer Associates Our infrastructure is the powerhouse for business intelligence gathering, day-to-day financial trading, management reporting, online transactions and the storage of confidential customer and employee data. Compliance with financial services and data protection regulations demands that this information is kept secure. For both commercial and legal reasons, it is essential that the bank takes a proactive stance on managing its IT risk.we must not only be risk averse, but we must show ourselves to be so. Externally recognised accreditation of key information security personnel sends a clear message that we are taking our IT security seriously. Andrew Brice, CISSP Head of IT Risk for Credit Suisse Group 8

10 What types of jobs are available? In what industries and organisations? Areas of expertise within information security: Access Control Systems and Methodology (how people enter and leave the system) Administration (planning, implementating and evaluating information security programs) Application and Systems Development Security (creating new computer programs to protect an organisation) Auditing and Monitoring (collecting information for identification and response to security breaches) Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) (uninterrupted access to critical data systems) Cryptography (the coding and decoding of data and messages) Law, Investigation and Ethics (computer crime laws and regulations and ethics) Malicious Code (counter measures and prevention techniques for dealing with viruses, worms and other forms of deviant code) Operations Security (setting identity controls; auditing and monitoring the mechanisms and tools) Physical Security (giving physical systems access solely to those who need it) Risk, Response and Recovery (processes to identify, measure and control loss) Security Architecture and Models (building the security infrastructure for a complex organisation) Security Management Practices (identification of information assets and development of policies and procedures) Telecommunications and Network Security (ensuring security through remote access management, network availability, firewall architectures,vpns, data networking, LAN devices, etc.) 9

11 Common job titles: Security auditor Security specialist Security consultant Security administrator Security analyst/engineer Web security manager Director/manager of security Chief privacy officer Chief risk officer Chief security officer (CSO) Chief information security officer (CISO) Typical industries: Professional services (real estate, consulting, legal, engineering) Government (national, regional, and local) Telecommunications Information technology Banking and financial services Manufacturing Defence Public services and utilities Healthcare Education Insurance Kinds of organisations that hire information security professionals: Although the majority of the organisations that hire information security professionals are in professional services, government, telecommunications, and banking, organisations of all kind and sizes, including a growing number of smaller businesses, need and are hiring information security staff. 10

12 James Robson Quotes Opportunities This is a great field to get into, full of opportunities for many people with different interests. Security has to be built into every part of the organisation. Anywhere that you find computers, you will find a need for information security knowledge, especially now with the need to comply with new laws addressing issues such as privacy and personal data. James Robson, CISSP, MBCS CITP, CISA Network Security Auditor, AT&T My career has grown as the need for security has been recognised. When I started, there was a single post created as IT Security Officer for the university. Now I manage a small team. I enjoy the diversity of my team's role.the team is part of the IT Technology Operations section, but I also sit on a College advisory committee, which develops security policy for the whole organisation. We have a broad mandate, from developing and selling security policy to our stakeholders to the detailed implementation of technical security solutions. Chris Roberts, CISSP IT Security Manager, Imperial College, London 11

13 Quotes Most Rewarding I particularly enjoy the opportunity to recognise and bridge cultural differences in discussions between Americans and Europeans. Information security is an international challenge, and we must recognise how we differ to ensure common ground in our approach to the task. John Morgan Salomon Independent Consultant I really enjoy what I do, so my future aspirations revolve around more of the same. The position of information security risk manager at Cancer Research UK is a first, and that I really like.there is nothing to beat being the first information security person in an organisation I know, because this is what has happened to me at the six companies I have been with since Brian Shorten, CISSP Information Systems Risk Manager, Cancer Research UK I love the business aspect of my job and being more than a pure technologist, i.e., helping business people understand how a particular piece of IT relates to their world and can help them in their business. I enjoy the excitement of having business people think security is dull and then smashing their perceptions. When businesses think about security differently and I don t have to drag budget out of them to secure their organisation, it s all worthwhile. Shaun Fothergill, CISSP Security Strategist for Computer Associates 12 The most rewarding aspect of my job is helping other people get it right. I find this on a corporate and personal level. Whether working with friends or at the office, I am helping them set things up so that they are more secure. James Robson, CISSP, MBCS CITP, CISA Network Security Auditor, AT&T

14 What do I need to do to become an information security professional? Increasingly, a specialised, post-secondary, and in many cases, a university degree, is required to pursue a career in information security. The profession has matured to see a steady increase of new university graduates that have made information security their first career choice. Education Options/Requirements HND or certificate degree for systems administrator PGDip, BSc, or BSc Honours in information technology, computer science or information security or related field for analyst, engineer or manager MSc. or higher in information technology, computer science or information security for director or chief information security officer Ph.D. for professor, researcher, advanced developer Vendor-specific and vendor-neutral certifications Technical Skills Knowledge of and the ability to implement and monitor security policy Knowledge of network systems and security protocols Knowledge of security software programs and implementation Knowledge of best practices in developing security procedures and infrastructure Develop and write information security policy General Skills and Aptitudes Strong conceptual and analytical skills Ability to operate as an effective member of a team Ability to manage multiple diverse tasks simultaneously Strong project management skills (ability to manage the project while understanding subcomponents and how they relate to the overall project) Demonstrate interpersonal and conflict management skills* Ability to effectively relate security-related concepts to a broad range of technical and non-technical staff* Excellent oral, written and presentation skills* Solid leadership qualities* * Especially if you want to become an executive information security professional 13

15 Quotes Skills As a risk manager, my chief concern is leading my company s payments and e-services departments in the compliance efforts. Within the retail division, I am responsible for influencing teams in cash management, netbanking (including mobile banking), card systems and payment services for individual and corporate customers. As a risk manager, I must have a solid business needs approach to assessing and developing security policy, as well as business continuity policy with relation to channel, procurement and product development. Kari Oksanen, CISSP Director of Risk Management, Electronic Banking Nordea Pascal Beau "I must assure IT best practices and methodology for outsourced services, as well as departments within the company. It means that I am responsible for risk assessment, policy implementation and quality control for application, infrastructure and business continuity solutions, and outsourced end-user support teams." Pascal Beau, CISSP Security & Quality Manager, IS/IT Department, Philip Morris France SAS 14

16 Certifications Technology alone cannot protect an organisation s critical information assets. People are the key to a secure organisation, and employers demand qualified information security staff to provide the highest standard of security for their customers, employees, shareholders and partners. There are two main categories of information security certifications: vendor-neutral and vendor-specific. A vendor-neutral certification, such as the Certified Information Systems Security Professional (CISSP ), encompasses a broad scope of knowledge and is not tied to any specific technology, vendor or product. Vendor-specific certifications, such as the Cisco Certified Security Professional (CCSP) or Microsoft Certified Systems Engineer: Security (MCSE): Security, are offered by technology vendors covering knowledge and content specific to their products, solutions, and best practices. Both kinds of certifications play an extremely important role in the market, fulfilling specific knowledge and learning requirements and demonstrating predetermined acceptable levels of competency and experience. Benefits of Certification To the Professional: Demonstrates a working knowledge of information security Validates the person s commitment to the profession Offers a career differentiator, enhanced credibility and marketability Provides access to valuable resources, such as continuing education, peer networking and idea exchange To the Organisation: Establishes a standard of best practices and information security governance for the organisation Provides the organisation with staff that have demonstrated a broad knowledge in information security and professional judgment Provides access to a network of global industry and subject matter/domain experts Provides comfort to employer as to the individual s competency/knowledge of information security 15

17 16 Associate of (ISC) 2 Recognition for students or those at the beginning of their careers who have acquired knowledge of key information security concepts but do not yet have the work experience required for full accreditation. Associates gain access to a vast network of professionals and various information security-related resources. (ISC) 2 Certifications (ISC) 2, the only non-profit body charged with maintaining and administering the compendium of industry best practices, the (ISC) 2 CBK, is the premier certification and education resource for information security professionals worldwide. Systems Security Certified Practitioner (SSCP) This certification offers information security tacticians the opportunity to demonstrate their level of competence with the seven domains of the (ISC) 2 SSCP CBK. The SSCP credential is ideal for those working toward or who have already attained positions as senior network security engineers, senior security systems analysts or senior security administrators. Certification and Accreditation Professional (CAP) Credential to validate the formalised process used to assess the risks and security requirements of an information system. To qualify for the CAP credential,a candidate must have two years of direct experience in Certification and Accreditation. Certified Information Systems Security Professional (CISSP) As the first information security credential accredited under ANSI/ISO/IEC Standard 17024, the CISSP provides information security professionals with not only an objective measure of knowledge, skills, abilities and experience but a globally recognised standard of achievement.the CISSP credential demonstrates competence in the 10 domains of the (ISC) 2 CISSP CBK.

18 The CISSP credential is ideal for mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or senior security engineers. The Information Systems Security Management Professional (ISSMP) and Information Systems Security Architecture Professional (ISSAP) Areas of concentration that validate indepth knowledge in management and architecture focused domains of the (ISC) 2 CISSP CBK. The CISSP is a prerequisite for both concentrations. (ISC) 2 certification services and programs include: Ongoing professional education Concentrations for specialised subject matter expertise Online discussion forums Networking receptions and resources (ISC)² Career Centre (job listings/resume postings) Research library Speaking and other volunteer opportunities Discounts on industry events Advocacy for your career and the information security profession IDC surveys information security professionals worldwide annually who are actively involved in making hiring decisions about the importance of security certifications, and in 2004, 93 percent of them said they believe security certifications are either somewhat or very important when making hiring decisions. And, more than 60 percent of respondents indicated they planned to acquire at least one information security certification within 12 months of the most recent survey, released December

19 Quotes Certification I am pro-certification. It helps to solve confusion. Whether or not you have a title to support your role in your organisation, the certification is a proof of what you claim to be able to do. Peter Vestergaard, CISSP Technical Manager at PROTEGO A/S I do see more and more job descriptions specifying that CISSP/CISA/CISM is required, and these days, a degree is also required. I have found that the studying required for the qualifications has taught me a great deal, and the network of peers is second to none in finding the answer to a problem I haven t seen before. Brian Shorten, CISSP Information Systems Risk Manager, Cancer Research UK The CISSP certification gives us a baseline from which we can build the capabilities of our security practitioners.when we decided to adopt this approach to IT security some years ago, the (ISC) 2 accreditation was the only viable formal confirmation of security knowledge and expertise on the market.today, they still do a terrific job. David Martin, CISSP Program Manager, Information Security Officer, Philip Morris International Technology is so fast-moving that you can t possibly keep up with all the security issues that might have an impact on our infrastructure or applications.the CISSP was a chance for me to maintain a level of knowledge that I can t afford to lose. Andrew Brice, CISSP Head of IT Risk for Credit Suisse Group 18

20 To transition to strategist - board interaction, strategic planning, people management, budgeting, project management, marketing, business risks, IT & networks, higher education and vendorspecific credentials. 19

21 Typical job path: University graduate Information security administrator, eligible for Associate of (ISC) 2 program 2+ years work experience Information security administrator/practitioner, eligible for SSCP certification 4+ years work experience Information security analyst/engineer and information security manager, eligible for CISSP certification 9+ years work experience Director of IT or information security, chief security officer (CSO) or chief information security officer (CISO) If you wish to have successful career progression and reach executive status, in addition to IT skills and technical knowledge, you must gain knowledge of and experience in management best practices and business-related skills, such as management and communications skills and an understanding of policy, processes and personnel. According to a study conducted by Auburn University in the US and sponsored by (ISC)², Managerial Dimensions in Information Security: A Theoretical Model of Organisational Effectiveness, implementing effective information security programs requires exceptionally high levels of task interdependence. Respondents reported that 62 percent of their daily tasks require the exchange of information or cooperation with others in their organisation to align security policy with business goals. 20

22 What will my salary be? Analysis conducted by Information Security Solutions ( during June 2006 throughout the European Union shows the following average salary bands according to job title and sector: 21

23 What is the career outlook? According the 2005 (ISC)² Global Information Security Workforce Study, the number of information security professionals worldwide in 2005 was 1.4 million, a nine percent increase over 2004, and nearly twice the expected growth in the number of IT employees globally. This figure is expected to increase to more than 1.9 million by 2009, or a compound annual growth rate (CAGR) of 8.5 percent from The profession continued to mature, and responsibility for information security moved up the management hierarchy. IDC expects this trend to continue. Also, according to the 2004 (ISC)² Global Information Security Workforce Study, more than 97 percent of respondents had moderate to very high expectations for career growth. Security professionals are experiencing growth in job prospects, career advancement, higher base salaries and salary premiums at faster rates than other areas of information technology. Worldwide Information Security Professionals by Region, EMEA = Europe, Middle East,Africa 22

24 Quotes The Future It s vital that we keep our network secure and that we ensure all our customer data is protected from attack. Technology is so fast-moving that it s easy to become focused purely on the area you know best, but security is about much more than the technology.we need to consider any operational, procedural and policy decisions that might damage the bank s security, as well as all the technological aspects.the realisation that protecting the integrity of our network is about more than just technology was perhaps the most important lesson to have come out of the CISSP. Tim Hart, CISSP Director of Network Security, an international investment bank Quotes Words of Wisdom The most rewarding aspect of my work is gaining acceptance from the business in business terms.technology changes quite rapidly and so do the opportunities to provide value to the business. When choosing a career for the long term, information security is one of the best choices that you can make. It is constantly evolving. Challenges can be met; then they change, which means that there will always be a challenge and with that comes growth, and with growth comes opportunity. Andrew Brice, CISSP Head of IT Risk for Credit Suisse Group Too many consider information security to be a technology problem. But there is a lot of technology out there in contrast to an enormous lack of skilled professionals who can actually take advantage of it and do the job not just planning and coordinating, but actually carrying out the day-to-day requirements. Drawing an analogy with the accounting profession, I would say that the IT-security industry needs more accountants,not more financial systems. Peter Vestergaard, CISSP Technical Manager at PROTEGO A/S 23

25 Schools and Education Facilities UK Higher education programs in the United Kingdom are available at the undergraduate and graduate level, as well as post-graduate PGDip or PhD. Many courses include a 'sandwich' or work placement year, or a skills and practical experience component. Further, quite a few universities, including those listed below, are offering modules on information security within broader programs covering law, computer science, Internet technologies, networking technologies, information technologies, mathematics and engineering programs. For this guide, we have listed only those that are focused on information security as a subject of study. * * Source: UCAS and individual universities for 2006/7 academic year University of Abertay, Dundee Tel: +44 (0) BSc (Hons) Ethical Hacking & Countermeasures University of The West of England, Bristol Tel: +44 (0) BSc (Hons) Forensic Computing MSc Systems Administration and Security Canterbury Christ Church University Tel: +44 (0) BSc (Hons) Forensic Computing University of Central Lancashire Tel: +44 (0) BSc (Hons) Computing (Forensics) University of Central England in Birmingham Technology Innovation Centre Tel: +44 (0) BSc (Hons) Computer Networks & Security 24

26 Coventry University School of Science and the Environment Centre for Disaster Management Tel: +44 (0) Business Continuity Certificate/Diploma Cranfield University Cranfield University Tel: +44 (0) MSc/PGDip forensic computing MSc/PGDip Military Electronic Systems Engineering MSc Systems Engineering for Defence De Montfort University Tel: +44 (0) BSc Forensic Computing University of East London Barking Campus Tel: +44 (0) MSc Information Security & Computer Forensics The University of Essex Tel: +44 (0) BEng/CNS Computer and Network Security BSc Mathematics with Network Security University of Glamorgan Tel: +44 (0) MSc Computer Systems Security MSc Information Security and Computer Crime MSc Information Security and Corporate Intelligence BSc (Hons) Network Management and Security BSc (Hons) Post HND degree Network Management and Security Glasgow Caledonian University City Campus Tel: +44 (0) MSc Network Security MSc Wireless Networking 25

27 The University of Huddersfield Tel: +44 (0) BSc (Hons) Secure and Forensic Computing University of Kingston Tel: +44 (0) BSc in Cyber Security and Computer Forensics (joint honours with business, mathematics or statistics) University of Leeds Tel: +44 (0) Cyberlaw: Information Technology, Law & Society LLM (Master of Laws)/ PGCERT Leeds Metropolitan University Tel: +44 (0) BSc (Hons) Cybercrime & Security MSc Digital Security Liverpool John Moores University Tel: +44 (0) BSc/BSc (Hons)/Internet Computing (with specialisation module in Security) Kings College London, University of London Tel: +44 (0) MSc PG DIP Information Technology & Internet Law MSc PG DIP Computing & Internet Systems (has particular emphasis on Internet Security) London Metropolitan University Tel: +44 (0) Certificate Fundamentals of Network Security Queen Mary, University of London Tel: +44 (0) Broad curriculum of undergraduate information technology, telecommuniations, internet and e-commerce technology and engineering courses with a significant emphasis on systems security issues. 26

28 Northumbria University Tel: +44 (0) BSc (Hons) Network and Computer Systems Security The Open University Tel: +44 (0) Information Security Management post-graduate level course. Royal Holloway, University of London Information Security Group Tel: +44 (0) MSc Information Security Post Graduate Certificate & Diploma Information Security Mathematics for Information Security PhD Research programs Southampton Solent University Tel: +44 (0) BSc (Hons) Information Security Management BSc (Hons) Information Security Management, Business Information Technology Staffordshire University Tel: +44 (0) Computer Networks & Security BSc/Bsc (Hons)/MEng /BEng/BEng (Hons) Computer Science: Biometrics BSc/BSc (Hons);MEng Computer Science: Computer Security BSc/BSc (Hons) /MEng/BEng/BEng (Hons) Design Technology for Security BSc (Hons) Forensic Computing BSc/Bsc (Hons)/MEng/BEng/BEng (Hons) The University of Strathclyde Tel: +44 (0) LLM/Pg Dip IT & Telecommunications Law University of Sunderland Tel: +44 (0) Foundation Network Security Technologies BSc (Hons) Forensic Computing 27

29 Swansea Institute of Higher Education Mount Pleasant Campus Tel: +44 (0) Computer Systems Security HND/BSc (Hons) University of Teesside Tel: +44 (0) BSc (Hons) Digital Forensics University of Westminster Harrow School of Computer Science Tel: +44 (0) BSc (Hons) Digital Forensics MSc Information Technology Security Schools and Education Facilities Europe The educational institutions listed below offer a range of programs in the computer science and technology fields. Some offer specific degree programs or certifications in information security disciplines. Denmark Niels Brock Kultorvet Copenhagen K Tel: Fax: brock@brock.dk Copenhagen IT University Rued Langgaards Vej Copenhagen S Tel: Fax: itu@itu.dk PwC Academy Strandvejen Hellerup Tel: Fax: academy@pwc.dk 28

30 University of Copenhagen Nørregade Copenhagen K Tel: Fax: ku@ku.dk University of Southern Denmark Campusvej Odense M Tel: Fax: sdu@sdu.dk France Collaboration Université Paris 12, Université d Evry, Institut d Informatique des Entreprises and Institut National de Télécommunications Paris, France Ecole Nationale Supérieure d Ingénieurs de Bourges ENST Bretagne et SUPELEC Sécurité des Systèmes d Information Université de Bordeaux DESS Codes, Cryptologie, Sécurité Informatique Talence, France Université Joseph Fourier www-fourier.ujf-grenoble.fr/ DESS/ Cryptologie, Sécurité et Codage de l Information Université Nantes Département Informatique Université de Technologies de Troyes Sécurité des Systèmes d Information Université de Tours Falcuté des Sciences et techniques/ Site de Blois 29

31 Germany Fachhochschule für Oekonomie & Management, University of Applied Sciences Ruhr-Universität Bochum Faculty of Electronics and Information Technology Ireland Dublin City University Dublin Ireland Tel: +353 (0) , MSc in Security and Forensic Computing (PAC Code: DC823) Waterford Institute of Technology Waterford, Ireland Tel: +353 (0) BSc (Honours) in Computer Forensics Italy Master Universitario in Sicurezza delle Tecnologie dell Informazione e della Comunicazione Politecnico di Milano e CEFRIEL Corso die alta formazione in Information Security Management Polo di Crema dell Università degli Studi di Milano Sicurezza dei Sistemi e delle Reti Informatiche Università Ca Foscari Venezia 30

32 Università di Roma La Sapienza Russia Moscow Engineering Physics Institute (State University) Sweden Göteborgs Universitet Computer Science and Engineering IT-universitetet i Kista Switzerland Center for Security Studies (CSS), ETH Zurich Additional Resources and Professional Associations (ISC) 2 Resource Guide for Today s Information Security Professional Global Edition (ISC) 2 EMEA European Office Winchester House Old Marylebone Road London NW15RA United Kingdom Ph: +44 (0) Fx: +44 (0) institute@isc2.org * Scholarships are available through (ISC) 2. Visit: or call for more details. 31

33 Professional Associations Europe Associazione Nazionale Specialisti per la Sicurezza in Aziende di Intermediazione Finanziaria (ANSSAIF) Branchefællesskabet for IT,Tele, Elektronik og Kommunikationsvirksomheder (ITEK) British Computer Society Bundesamt für Sicherheit in der Informationstechnik (BSI) Central Sponsor for Information Assurance (CSIA) Computer Security Clubs CLUSIB Belgium CLUSIF France CLUSIS Switzerland CLUSSIL Luxembourg-Kirchberg CLUSIT Italy Competence Center for Applied Security Technology (CAST) Forum www-en.cast-forum.de/home Dataföreningen i Sverige Foundation for Information Policy Research (FIPR) Gesellschaft für Informatik E.V. Information Assurance Advisory Council (IAAC) Information Security Society of Switzerland (ISSS) 32

34 Information Systems Audit and Control Association (ISACA) Chapters in Europe Information Systems Integrity Group (ISIG), London School of Economics & political Science, Department of Information Systems Information Systems Security Association (ISSA) Chapters in Europe InfoSurance Foundation for the Security of Information and Communication in Switzerland Institute for Communications Arbitration and Forensics Institute of Engineering and Technology (IET) Institute for the Management of Information Systems (IMIS) Internet Enforcement Group (IEG) Observatoire de la Sécurité des Systèmes d Information et des Réseaux (OSSIR) SIG Security Swiss Association for Research in Information Technology (SARIT) TeleTrust - Non-profit Organisation for the Promotion of Trustworthiness of Information and Communication Technology 33

35 34 Professional Associations International AFCEA International ASIS International The Computing Technology Association (CompTIA) ECRYPT: European Network of Excellence for Cryptology EEMA The Independent European Association for e-business The European Information Society Group (EURIM) European Network and Information Security Agency (ENISA) Information Security Forum (ISF) Institute for Information Security Professionals International Federation of Information Processing International Information Systems Security Certification Consortium, Inc. [(ISC)²] International Security,Trust, and Privacy Alliance (ISTPA) The Jericho Forum SANS Institute

36 35

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Full-Speed Ahead: The Demand for Security Certification by James R. Wade Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Securing the Organization: Creating a Partnership Between HR and Information Security

Securing the Organization: Creating a Partnership Between HR and Information Security Securing the Organization: Creating a Partnership Between HR and Information Security A White Paper from (ISC) 2 Securing infrastructure is one of the most critical issues facing business and governments

More information

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES 1 2 THIS ONE PROVES YOU'RE HERE. THIS ONE SHOWS YOU'VE ARRIVED. 3 FROM GRADUATION TO RETIREMENT, (ISC) 2 FAST TRACKS CAREERS IN INFORMATION SECURITY. Secure

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Hiring Guide to the Information Security Profession

Hiring Guide to the Information Security Profession Hiring Guide to the Information Security Profession INTRODUCTION Welcome to the (ISC) 2 Hiring Guide to the Information Security Profession. It s no secret that it s not easy to find qualified experts

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

The National Skills Academy for IT. Cyber Security

The National Skills Academy for IT. Cyber Security The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals The U.S. government stands at a critical juncture in its cybersecurity efforts. As a country we face increasingly

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Graduate Gateway Universities and listed degrees. Issued November 2014 (Issue 12) Graduate Gateway Universities and listed degrees 1

Graduate Gateway Universities and listed degrees. Issued November 2014 (Issue 12) Graduate Gateway Universities and listed degrees 1 Graduate Gateway Universities and listed degrees Issued November 2014 (Issue 12) Graduate Gateway Universities and listed degrees 1 Contents This document lists all universities and other learning institutions

More information

MAP (MULTI AWARD PATHWAY) Universities and listed degrees ISSUED SEPTEMBER 2013 (VERSION 8)

MAP (MULTI AWARD PATHWAY) Universities and listed degrees ISSUED SEPTEMBER 2013 (VERSION 8) MAP (MULTI AWARD PATHWAY) Universities and listed degrees ISSUED SEPTEMBER 2013 (VERSION 8) CONTENTS This document lists all universities and other learning institutions that are MAP accredited. It shows

More information

Exploring the Landscape of Philippine Cybersecurity

Exploring the Landscape of Philippine Cybersecurity Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Executive MSc Strategic Project Management

Executive MSc Strategic Project Management Executive MSc 2 About Heriot-Watt Heriot-Watt is one of the UK s leading universities, with an international reputation for outstanding teaching and research in our specialist areas of science, engineering,

More information

MSc Courses offered in exclusive partnership with Robert Kennedy College

MSc Courses offered in exclusive partnership with Robert Kennedy College MSc Courses offered in exclusive partnership with Robert Kennedy College About the University of Salford About the University of Salford Founded in 1896 the University has a successful global presence

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Career Analysis into Cyber Security: New & Evolving Occupations

Career Analysis into Cyber Security: New & Evolving Occupations Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Psychology Online MSc Programmes

Psychology Online MSc Programmes Online MSc Programmes 2 Why study for an online masters in psychology with the University of Liverpool? Gain a masters degree from a pioneering, globally respected university with a School of Psychology

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Academic and professional qualifications currently in place for practitioners nursing and midwifery

Academic and professional qualifications currently in place for practitioners nursing and midwifery Appendix 5 Academic and professional qualifications currently in place for practitioners nursing and midwifery Nursing and Midwifery are regulated professions. The Nursing and Midwifery Council (NMC) registers

More information

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY) Bachelor of Engineering with Honours in Information and Communications Technology (Information Security)

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

Get Qualified. Approved Courses. http://support.maltaenterprise.com/getqualified

Get Qualified. Approved Courses. http://support.maltaenterprise.com/getqualified Get Qualified Approved Courses http://support.maltaenterprise.com/getqualified List of Training Providers BPP Professional Education Malta Limited 3 Computer Domain 3 EIE (European Institute of Education)

More information

ACCOUNTING AND FINANCE

ACCOUNTING AND FINANCE LIVERPOOL HOPE UNIVERSITY FACULTY OF ARTS AND HUMANITIES ACCOUNTING AND FINANCE YOUR FUTURE STARTS WITH HOPE 030815 Accounting and Finance Fact File Faculty: Arts and Humanities Department: Business School

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Course record information Name and level of final award: Name and level of intermediate awards: The BSc (Hons) Computer Science is a B.Sc. BSc (Hons) Computer Science with Industrial

More information

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide

More information

Marketing. BA Hons. Greenwich Campus. gre.ac.uk/business

Marketing. BA Hons. Greenwich Campus. gre.ac.uk/business Marketing BA Hons Greenwich Campus gre.ac.uk/business Why study this programme? The BA Hons Marketing degree programme has been designed in consultation with employers and other important stakeholders,

More information

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? E-Guide CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? SearchCloud Security M ore and more certifications are being created around cloud security. An expert looks at some of the more prominent

More information

MSc in Banking Practice and Management and Chartered Fellowship

MSc in Banking Practice and Management and Chartered Fellowship MSc in Banking Practice and Management and Chartered Fellowship Part-time Executive and Online programmes +44 (0)1227 829499 enquiries@ifslearning.ac.uk www.ifslearning.ac.uk The ifs School of Finance

More information

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup. Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:

More information

MSc in Operations and Supply Chain Management Online Programme

MSc in Operations and Supply Chain Management Online Programme MSc in Operations and Supply Chain Management Online Programme 2 Foreword Professor Murray Dalziel Director, University of Liverpool Management School As a management professional and prospective student

More information

REVISED GRID FOR MICRO LEVEL APPROACH

REVISED GRID FOR MICRO LEVEL APPROACH Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer

More information

2015 INFORMATION SECURITY BREACHES SURVEY

2015 INFORMATION SECURITY BREACHES SURVEY 2015 INFORMATION SECURITY BREACHES SURVEY Executive Summary Survey conducted by In association with 2 INFORMATION SECURITY BREACHES SURVEY 2015 executive summary Commissioned by: The UK Cyber Security

More information

School (Netherlands); Molde University College (Norway); ICN (France) Full-time; part-time (approved but not operational)

School (Netherlands); Molde University College (Norway); ICN (France) Full-time; part-time (approved but not operational) University of Westminster MSc in Supply Chain Logistics and Management Programme Specification Course Record Information Name and level of final & intermediate Awards Awarding Body Location of Delivery

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM

AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM AN ANALYSIS OF THE CURRICULUM COMPONENTS OF COMPUTER FORENSICS UNDERGRADUATE COURSES IN THE UNITED KINGDOM Paula Thomas Faculty of Advanced Technology, University of Glamorgan 2 CF37 1DL, Pontypridd pthomas@glam.ac.uk

More information

People Director Job description

People Director Job description People Director Job description About Teaching Leaders Teaching Leaders is an innovative not-for-profit organisation whose mission is to address educational disadvantage by growing a movement of outstanding

More information

LIVERPOOL HOPE UNIVERSITY ACCOUNTING YOUR FUTURE STARTS WITH HOPE

LIVERPOOL HOPE UNIVERSITY ACCOUNTING YOUR FUTURE STARTS WITH HOPE LIVERPOOL HOPE UNIVERSITY ACCOUNTING FACULTY FACULTY OF ARTS OF AND SCIENCE HUMANITIES YOUR FUTURE STARTS WITH HOPE 051214 Accounting Fact File Faculty: Arts and Humanities Department: Business School

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Advertising and Marketing Communications with Language

Advertising and Marketing Communications with Language Advertising and Marketing Communications with Language BA Hons Greenwich Campus gre.ac.uk/business Why study this programme? This programme will help you to develop an in-depth knowledge of advertising

More information

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org Security Certifications A Short Survey Welcome Stan Reichardt stan2007@sluug.org Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily

More information

Technology. Computing. and. School of

Technology. Computing. and. School of School of Computing and Technology We offer employment-focused education and research in computing, the built environment and engineering, which gives our students industry-relevant skills and knowledge.

More information

Information Security Systems

Information Security Systems Information Security Systems This programme is no longer recruiting. Final award BSc (Hons) Intermediate awards available Cert HE, Dip HE UCAS code - Details of professional body accreditation N/A Relevant

More information

POSTGRADUATE PROGRAMME SPECIFICATION

POSTGRADUATE PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Masters Computing Degrees Scheme Staffordshire University Faculty of Computing, Engineering and Sciences at Staffordshire

More information

GRADUATE BUSINESS SCHOOL POSTGRADUATE GUIDE. www.abdn.ac.uk/business

GRADUATE BUSINESS SCHOOL POSTGRADUATE GUIDE. www.abdn.ac.uk/business GRADUATE BUSINESS SCHOOL POSTGRADUATE GUIDE www.abdn.ac.uk/business A provider of excellence in undergraduate and postgraduate education Based in the heart of Aberdeen, a world leading centre in Business

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

List of approved programmes social workers in England

List of approved programmes social workers in England Education and Training Committee 12 June 2012 List of approved programmes social workers in England Executive summary and recommendations This paper provides Committee with an update on the legislation

More information

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow (ISC) 2 2012 Career Impact Survey Executive Summary The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow Skilled security professionals enjoy job stability and mobility,

More information

Online Learning Programmes

Online Learning Programmes We are a Top 50 University * * Guardian University Guide 2015 Online Learning Programmes 2015 Undergraduate, Postgraduate and Professional Qualifications Flexible online programmes that enable you to balance

More information

A career in speech and language therapy

A career in speech and language therapy A career in speech and language therapy ROYAL COLLEGE OF SPEECH LANGUAGE THERAPISTS An essential guide for anyone thinking of a career in speech and language therapy Choosing a career is one of life s

More information

IT Professional Certifications. By Dana Chaput ACC 626

IT Professional Certifications. By Dana Chaput ACC 626 IT Professional Certifications By Dana Chaput ACC 626 IT Professional Certifications Information Technology (IT) has seen a tremendous increase in acceptance and use by businesses in recent years. Because

More information

Executive Management of Information Security

Executive Management of Information Security WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without

More information

Programme Specification

Programme Specification Programme Specification Title: Construction Project Management Final Award: Master of Science (MSc) With Exit Awards at: Postgraduate Certificate (PG Cert) Postgraduate Diploma (PG Dip) Master of Science

More information

Information Security in the undergraduate curriculum

Information Security in the undergraduate curriculum Information Security in the undergraduate curriculum Chris Mitchell Royal Holloway, University of London www.isg.rhul.ac.uk/~cjm 1 Background I Some years ago, computer hacking was mainly done for fun.

More information

MBA Luxury Brand Management. A unique MBA programme, providing an outstanding platform for career development in the global luxury sector.

MBA Luxury Brand Management. A unique MBA programme, providing an outstanding platform for career development in the global luxury sector. MBA Luxury Brand Management A unique MBA programme, providing an outstanding platform for career development in the global luxury sector. Luxury Brand Management MBA Luxury Brand Management This innovative

More information

School of Management (University Degree Programmes)

School of Management (University Degree Programmes) SITMAP School of IT, Management and Professional Studies SITMAP-Ghana, is empowering African youths to get the best of international certifications in IT, Business Management, Business Information Systems,

More information

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG. A Bloomberg Professional Service Offering FOR EDUCATION

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG. A Bloomberg Professional Service Offering FOR EDUCATION >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG A Bloomberg Professional Service Offering FOR EDUCATION Bloomberg for Education brings the pace and challenge

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES?

I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES? I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES? Todd Fitzgerald Director Global Information Security Information Security Management Author ManpowerGroup, Inc. (NYSE:MAN, Fortune 500 #129)

More information

BA (Hons) Accounting and Finance for International Business Top-Up

BA (Hons) Accounting and Finance for International Business Top-Up BA (Hons) Accounting and Finance for International Business Top-Up www.coventry.ac.uk/londoncampus BA (Hons) International Finance and Accounting prepares students for a range of exciting and rewarding

More information

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute:

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute: Programme Specification BSc (Hons) Computer Networks and Security with Foundation Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):

More information

Helping you meet your global objectives. Helping you grow PRECISE. PROVEN. PERFORMANCE.

Helping you meet your global objectives. Helping you grow PRECISE. PROVEN. PERFORMANCE. Helping you meet your global objectives Helping you grow PRECISE. PROVEN. PERFORMANCE. Moore Stephens member firms across the globe share common values: integrity, personal service, quality, knowledge

More information

Chief Information Officer

Chief Information Officer Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to

More information

COMPUTER NETWORKS AND SECURITY A FUTURE IN

COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers

More information

Computer Security and Forensics

Computer Security and Forensics SCHOOL OF COMPUTING & MATHEMATICAL SCIENCESB Computer Security and Forensics BSc Hons Greenwich Campus www.gre.ac.uk/cms Why study this programme? This degree will equip you to become an ICT professional

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

Doctor of Information Technology Management

Doctor of Information Technology Management Doctor of Information Technology Management The challenge facing IT today is its rapid advance offers both opportunities and challenges for all organisations. To successfully navigate through such an evolving

More information

Computer Support Specialists and Systems Administrators

Computer Support Specialists and Systems Administrators http://www.bls.gov/oco/ocos268.htm Computer Support Specialists and Systems Administrators * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections

More information

The Business School. Deborah Lock: Director of

The Business School. Deborah Lock: Director of The Business School Welcome to The Business School, I would like to personally welcome you to our School and share with you just some of the many benefits of choosing to study with us. We are a leading

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

RUSSELL INVESTMENT MANAGEMENT COMPANY

RUSSELL INVESTMENT MANAGEMENT COMPANY RUSSELL INVESTMENT MANAGEMENT COMPANY Part of Russell Investments 1301 Second Avenue, 18 th Floor Seattle, WA 98101 206-505-7877 WWW.RUSSELL.COM March 19, 2015 The following Brochure Supplements provide

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification 1. 2. 3. 4. 5. Basic Course Information Awarding Institution: School/Campus: Final Award, Course Title and Modes of Study: Normal Duration: UCAS Code: Nottingham

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Information Security and Audit

Information Security and Audit SCHOOL OF COMPUTING & MATHEMATICAL SCIENCES Information Security and Audit MSc Greenwich Campus www.gre.ac.uk/cms Why study this programme? This programme is suitable for both the newcomer to computer

More information

Trustworthy Computing Spring 2006

Trustworthy Computing Spring 2006 Trustworthy Computing Spring 2006 Project Topic: Risk Management of Information Technology Outsourcing under ITIL ITSM framework By: (Mina) Szu-Chia Cheng 1 pages of 19 Table of Content Abstract...3 Why

More information

School of Management (University Degree Programmes)

School of Management (University Degree Programmes) SITMAP-GHANA School of IT, Management and Professional Studies SITMAP-Ghana, is empowering African youths to get the best of international certifications in IT, Business Management, Business Information

More information

Postgraduate Diploma in Actuarial Science MSc in Applied Actuarial Science International Masters in Applied Actuarial Science

Postgraduate Diploma in Actuarial Science MSc in Applied Actuarial Science International Masters in Applied Actuarial Science CENTRE FOR ACTUARIAL SCIENCE, RISK AND INVESTMENT Postgraduate Diploma in Actuarial Science MSc in Applied Actuarial Science International Masters in Applied Actuarial Science Version January 2015 Why

More information

Faculty of Engineering, the Built Environment and Information Technology Technology for tomorrow

Faculty of Engineering, the Built Environment and Information Technology Technology for tomorrow Faculty of Engineering, the Built Environment and Information Technology If you want to be at the forefront of what s happening in engineering, construction or IT, then stick around because NMMU is where

More information

Contents. About NCC Education. Working Together. Centre Support. Digi Qualifications. Our Qualifications. Progression Routes.

Contents. About NCC Education. Working Together. Centre Support. Digi Qualifications. Our Qualifications. Progression Routes. Contents About NCC Education 03 Our Mission 04 Our Global Presence Working Together 07 The NCC Education Journey 08 Benefits Centre Support 10 Centre Support 10 Teacher and Learning Support 11 Account

More information

QUEEN'S UNIVERSITY BELFAST INSTITUTE OF PROFESSIONAL LEGAL STUDIES UNIVERSITY OF ULSTER GRADUATE SCHOOL OF PROFESSIONAL LEGAL EDUCATION

QUEEN'S UNIVERSITY BELFAST INSTITUTE OF PROFESSIONAL LEGAL STUDIES UNIVERSITY OF ULSTER GRADUATE SCHOOL OF PROFESSIONAL LEGAL EDUCATION 1 QUEEN'S UNIVERSITY BELFAST INSTITUTE OF PROFESSIONAL LEGAL STUDIES UNIVERSITY OF ULSTER GRADUATE SCHOOL OF PROFESSIONAL LEGAL EDUCATION Admission to the Institute of Professional Legal of Queen s Belfast

More information

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Dr. Garry L. White Gw06@business.txstate.edu Department of Computer Information Systems Texas State

More information

About the course. www.sheffield.ac.uk/is

About the course. www.sheffield.ac.uk/is 1 About the course www.sheffield.ac.uk/is Skills relevant to your career The course is designed to prepare you for a career as an information professional, or for organisational and consultancy roles which

More information

Knowledge and Understanding

Knowledge and Understanding PROGRAMME SPECIFICATION 1 Awarding Institution Newcastle University 2 Teaching Institution Newcastle University 3 Final Award MSc 4 Programme Title Computer Security and Resilience 5 UCAS/Programme Code

More information

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Master of Science, Master of Science with a Year in Industry, Postgraduate Diploma, and Postgraduate Certificate

More information

BSc (Honours) Computing and Information Systems (Distance Learning)

BSc (Honours) Computing and Information Systems (Distance Learning) BSc (Honours) Computing and Information Systems (Distance Learning) Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information

More information

Programme Specification. Course record information. Admissions requirements. Aims of the course

Programme Specification. Course record information. Admissions requirements. Aims of the course Programme Specification Course record information Name and level of final award: Postgraduate Diploma in Professional Practice in Architecture Awarding body/institution: University of Westminster Status

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information