GIAC Certification. Enterprise Solution

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "GIAC Certification. Enterprise Solution"

Transcription

1 E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network

2 Global Information Assurance Certification (GIAC) provides information security certifications for IT managers and security professionals. The Global Information Assurance Certification (GIAC) was founded in 1999 to validate the real-world skills of IT security professionals. GIAC s purpose is to provide assurance that a certified individual has practical awareness, knowledge and skills in key areas of computer and network and software security. GIAC currently offers certifications for over 20 job-specific responsibilities that reflect the current practice of information security. GIAC is unique in measuring specific knowledge areas instead of general purpose information security knowledge. GIAC certifications cover four IT/IT Security job disciplines: o Security Administration o Management o Audit o Software Security There is no particular order in which GIAC certifications must be earned. However, it is recommended that candidates master lower level concepts before moving on to more advanced topics. It is also suggested that candidates are familiar with specific certification objectives and topic areas outlined for each exam. Each GIAC certification is designed to stand on its own, and represents a certified individual s mastery of a particular set of knowledge and skills. Once an individual earns a GIAC certification, he or she can build upon this knowledge by focusing efforts further through the Gold and Expert Level programs. GIAC Certification Earning a GIAC certification requires passing one proctored certification exam. GIAC certifications assure that an individual possesses the practical real-world skills covered by specific certification objectives. For example, if you want to hire someone who knows how to properly secure a firewall, a GCFW certification holder would be a good candidate for the job. GIAC Certification The GIAC Gold program allows certificants to demonstrate a deeper knowledge of a specific subject area, and requires individuals to research and write a detailed technical report or white paper. Certificants work closely with an advisor while developing their technical report. Once complete, the report is reviewed for acceptance into the GIAC reading Room. Participating in the GIAC Gold program shows that not only has an individual mastered the subject area comprised by a specific certification, but that they are also qualified to research and share their knowledge with others. GIAC Gold Status c E-SPIN SDN BHD ALL RIGHT RESERVED

3 GIAC Expert Level The GIAC Expert Level program yields the most well respected credentials in the industry and is targeted for top performers. Expert Level candidates demonstrate their expertise in one of three security areas: general security (GSE), Malware (GSE-Malware), or Compliance (GSE-Compliance). Prerequisites include achieving multiple specific milestones within our Certification and Gold programs. The multi-day hands-on Expert-level testing is given only once a year. The Expert-Level exams include individual and group hands-on computer security exercises, presentations, research and essay assignments, and scenario-based exam sections. The test assesses specific real-world skills to ensure that the individual is ready to confront various information security threats on multiple levels. GIAC security certifications offer a complete suite of security certifications that follows every step of a security professional s career, from entry level positions, through IT security administration, and even management and senior-level executive responsibilities. GIAC certifications related to software security are now available for software developers and programmers. c c E-SPIN SDN BHD ALL RIGHT RESERVED

4 GIAC Security Administration Certified Exam + Training o Level 3 + GIAC Information Security Fundamentals (GISF) o Level 4 + GIAC Security Essentials Certification (GSEC) o Level 5 + GIAC Web Application Penetration Tester (GWAPT) + GIAC Certified Enterprise Defender (GCED) + GIAC Certified Firewall Analyst (GCFW) + GIAC Certified Intrusion Analyst (GCIA) + GIAC Certified Incident Handler (GCIH) + GIAC Certified Windows Security Administrator (GCWIN) + GIAC Certified UNIX Security Administrator (GCUX) + GIAC Certified Forensics Analyst (GCFA) + GIAC Securing Oracle Certification (GSOC) + GIAC Certified Penetration Tester (GPEN) o Level 6 + GIAC Reverse Engineering Malware (GREM) + GIAC Assessing Wireless Networks (GAWN) GIAC Management Certified Exam + Training o Level 4 + GIAC Information Security Professional (GISP) o Level 5 + GIAC Security Leadership Certification (GSLC) + GIAC Certified Project Manager Certification (GCPM) GIAC Audit Certified Exam + Training o Level 4 + GIAC Certified ISO Specialist (G7799) o Level 5 + GIAC System and Network Auditor (GSNA) GIAC Software Security Certified Exam + Training o Level 5 + GIAC Secure Software Programmer - C (GSSP-C) + GIAC Secure Software Programmer - Java (GSSP-JAVA) + GIAC Secure Software Programmer -.NET (GSSP-NET) GIAC Legal Certified Exam + Training GIAC Legal Certified Exam + Training + GIAC Legal Issues (GLEG) c E-SPIN SDN BHD ALL RIGHT RESERVED

5 GIACCertification Skills Tests and Report (S.T.A.R.) The GIAC Skills Test and Report (STAR) helps determine if an individual has the right knowledge, skills and abilities to accomplish specific IT security tasks. The STAR architecture is based on specific Assessment Objects that correspond to SANS training courses. After completing the Skills test, each student will have access to a printable report card, which clearly documents their performance in each sub-topic. o No-Fail Assessment Test o No Proctoring Required o Report Card at Completion The STAR skills test is an assessment of knowledge in specific information security topics, these are not pass/fail tests, but rather the outcome is a report card. The test is given in a convenient online format without the need for exam scheduling or proctoring. When the student completes the skills test, they will have immediate access to a complete skills summary screen documenting their performance in each subject area. The results are also available in a printable report card format. Since a GIAC STAR report card details skill levels for a specific skill set, they never expire. Employers can use STAR assessments to measure the skill sets employees have in the work place. c c E-SPIN SDN BHD ALL RIGHT RESERVED

6 GIAC Certification and STAR Road Map Security Administration Management Legal Audit Software Introductory GIAC Information Security Fundamentals GISF S.T.A.R - Computer & Network Security Awareness Intermediate GIAC Security Essentials Certification GSEC GIAC Information Security Professional GISP GIAC Certified ISO Specialist G7799 S.T.A.R - IP Packet Analysis S.T.A.R - Security Policy S.T.A.R - Critical Infrastucture Protection S.T.A.R - Leader Management Advanced GIAC Certified Forensics Analyst GCFA GIAC Security Leadership Certification GSLC GIAC Legal Issues GIAC Systems & Networks Editor GSNA GIAC Secure Software Programmer-.NET GSSP-.NET GLIG GIAC Certified Firewall Analyst GCFW GIAC Certified Project Manager Certification GCPM S.T.A.R - Payment Card Industry GIAC Secure Software Programmer - CGSSP-C GIAC Certified Intrusion Analyst GCIA S.T.A.R - Security Policy & Awareness GIAC Secure Software Programmer - Java GSSP - JAVA GIAC Certified Incident Handler GCIH GIAC Certified UNIX Security Administrator GCUX GIAC Certified Windows Security Administrator GCWN GIAC Certified Enterprise Defender GCED GIAC Securing Oracle Certification GSDC GIAC Certified Penetration Tester GPEN GIAC Web Application Penetration Tester GWAPT S.T.A.R - Cutting Edge Hacking Techniques S.T.A.R-Advanced FileSystem Recovery & Memory Forensics S.T.A.R- Windows Command Line Kung Fu S.T.A.R- Advanced Information Recon S.T.A.R- Metaspoilt for Penestration Testers S.T.A.R- Comprehensive Pocket Analysis Higher Advanced GIAC Assesing Wireless Networks GAWN GIAC Reverse Engineering Malware GRIM c E-SPIN SDN BHD ALL RIGHT RESERVED

7 GIAC Certification Exam Fee GSE - Hands-On Lab (RM 2,396) GSE - Multiple Choice (RM 2,396) Secure Coding Skills Assessment:.NET - 50 Questions RM 1,396) Secure Coding Skills Assessment: C Questions (RM 1,396) Secure Coding Skills Assessment: C - 50 Questions (RM 1,396) Secure Coding Skills Assessment: Java Questions (RM 1,396) Secure Coding Skills Assessment: Java - 50 Questions (RM 1,396) GIAC Auditing Wireless Networks (GAWN) (RM 3,596) GIAC Certified Firewall Analyst (GCFW) (RM 3,596) GIAC Certified Incident Handling Analysts (GCIH) (RM 3,596) GIAC Certified Intrusion Analysts (GCIA) (RM 3,596) GIAC Certified UNIX Administrator (GCUX) (RM 3,596) GIAC Certified Windows Security Administrator (GCWN) (RM 3,596) GIAC Information Security Professional (GISP) (RM 3,596) GIAC Penetration Tester Certification (GPEN) (RM 3,596) GIAC Secure Software Programmer-C (GSSP-C) (RM 3,596) GIAC Secure Software Programmer-Java (GSSP-JAVA) (RM 3,596) GIAC Securing Oracle Certification (GSOC) RM 400) GIAC Security Essentials Certification (GSEC) (RM 3,596) GIAC Systems and Network Auditor (GSNA) (RM 3,596) GIAC Web App Penetration Testing and Ethical Hacking (GWAPT) (RM 3,596) GIAC Certified ISO Specialist (G7799) (RM 3,596) GIAC Security Leadership Certification (GSLC) (RM 3,596) GIAC Information Security Fundamentals (GISF) (RM 400) GIAC Certified Forensic Analyst (GCFA) (RM 3,596) Reverse-Engineering Malware: Malware Analysis Tools and Techniques (RM 3,596) STAR Payment Card Industry (RM 500) STAR Web Application Security (RM 400) STAR Computer and Network Security Awareness (RM 500) STAR IP Packet Analysis (RM 500) STAR Cutting Edge Hacking Techniques (RM 400) STAR Power Search with Google (RM 500) STAR Comprehensive Packet Analysis (RM 3,980) c c E-SPIN SDN BHD ALL RIGHT RESERVED

8 GICA Certification GIAC Certification Exam Fee + Training (Man Day) [Bundled] GIAC Certification Exam Fee GSE - Hands-On Lab (RM 2,396) GSE - Multiple Choice (RM 2,396) + 2 MD (RM 2,100) [RM 4,496] Secure Coding Skills Assessment:.NET - 50 Questions RM 1,396) + 2MD (RM 2,100) [RM 3,496] Secure Coding Skills Assessment: C Questions (RM 1,396) + 2MD (RM 2,100) [RM 3,496] Secure Coding Skills Assessment: C - 50 Questions (RM 1,396) + 2MD (RM 2,100) [RM 3,496] Secure Coding Skills Assessment: Java Questions (RM 1,396) + 2MD (RM 2,100) [RM 3,496] Secure Coding Skills Assessment: Java - 50 Questions (RM 1,396) + 2MD (RM 2,100) [RM 3,496] GIAC Auditing Wireless Networks (GAWN) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Certified Firewall Analyst (GCFW) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Certified Incident Handling Analysts (GCIH) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Certified Intrusion Analysts (GCIA) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Certified UNIX Administrator (GCUX) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Certified Windows Security Administrator (GCWN) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Information Security Professional (GISP) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Penetration Tester Certification (GPEN) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Secure Software Programmer-C (GSSP-C) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Secure Software Programmer-Java (GSSP-JAVA) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Securing Oracle Certification (GSOC) RM 400) + 1 MD (RM 1,050) [RM 1,450] GIAC Security Essentials Certification (GSEC) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Systems and Network Auditor (GSNA) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Web App Penetration Testing and Ethical Hacking (GWAPT) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Certified ISO Specialist (G7799) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Security Leadership Certification (GSLC) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] GIAC Information Security Fundamentals (GISF) (RM 400) + 1MD (RM 1,050) [RM 1,450] GIAC Certified Forensic Analyst (GCFA) (RM 3,596) + 5MD (RM 5,250) [RM 8,846] Reverse-Engineering Malware: Malware Analysis Tools and Techniques (RM 3,596) + 5MD (RM 5,250) STAR Payment Card Industry (RM 500) + 1 MD (RM 1,050) [RM 1,550] STAR Web Application Security (RM 400) + 1MD (RM 1,050) [RM 1,450] STAR Computer and Network Security Awareness (RM 500) + 1 MD (RM 1,050) [RM 1,550] STAR IP Packet Analysis (RM 500) + 1 MD (RM 1,050) [RM 1,550] STAR Cutting Edge Hacking Techniques (RM 400) + 1 MD (RM 1,050) [RM 1,550] STAR Power Search with Google (RM 500) + 1 MD (RM 1,050) [RM 1,550] STAR Comprehensive Packet Analysis (RM 3,980) + 5MD (RM 5,250) [RM 9,230] c E-SPIN SDN BHD ALL RIGHT RESERVED

GIAC Program Overview 2015 Q4 Version

GIAC Program Overview 2015 Q4 Version GIAC Program Overview 2015 Q4 Version Program Overview - GIAC Certification 2015 1 What is GIAC? GIAC is the Global Information Assurance Certification program GIAC assesses candidate knowledge in specific

More information

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression

More information

Information Security Engineering

Information Security Engineering Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications SearchSecurity.com's IT security certifications guide 1 of 18 Check out the other guides in this series: Guide to information security certifications SearchSecurity.com's guide to vendor-neutral security

More information

S A N S 2 0 0 8. Results for Calendar Year 2008

S A N S 2 0 0 8. Results for Calendar Year 2008 S A N S 2 0 0 8 Results for Calendar Year 2008 Executive Summary The SANS 2008 Salary and Certification Survey was conducted by Rob Kolstad of Delos Enterprises on behalf of the SANS Institute to examine

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

Career Opportunities and Development for Asia Information Security Professional with the

Career Opportunities and Development for Asia Information Security Professional with the IT & Information Security Professional Career Opportunities and Development www.tisa.or.th December 2009 Career Opportunities and Development for Asia Information Security Professional with the IT Security

More information

CSIS Academy Be Better

CSIS Academy Be Better CSIS Academy Be Better CSIS Security Officer March 2014 Copyright 2014 - CSIS Security Group A/S. All rights reserved Page 2 / 7 Content 1 About CSIS... 3 2 The Course: CSIS Security Officer... 3 2.1.1

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

APEC Guide to Information Security Skills Certification. Booklet

APEC Guide to Information Security Skills Certification. Booklet Certification Booklet www.siftsecurity.net AEC ublication Number: AEC#207-TC-03.1 AEC TEL Security and rosperity Steering Group May 2007 Contents Contents... 2 Introduction... 3 Using this guide... 3 What

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Maryland 2014. The Cybersecurity Industry Window of Opportunity

Maryland 2014. The Cybersecurity Industry Window of Opportunity A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

Renewing CompTIA Certifications With Achieving Other Vendor Certifications Renewing CompTIA Certifications With Achieving Other Vendor Certifications Overview You may earn Continuing Education Units (CEUs) toward your certification renewal by earning other industry certifications.

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

SANS LONDON. Immersive Training World Class Instructors GIAC Certification SANS@Night evening talks and networking Social Functions

SANS LONDON. Immersive Training World Class Instructors GIAC Certification SANS@Night evening talks and networking Social Functions NOVEMBER 16 TH TO 21 ST 2015 GRAND CONNAUGHT ROOMS, LONDON, WC2 SANS LONDON THE WORLD S LARGEST & MOST TRUSTED PROVIDER OF CYBER URITY TRAINING 542 Web App Penetration Testing and Ethical Hacking 401 Security

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

PENETRATION TEST & SECURITY STANDARDS

PENETRATION TEST & SECURITY STANDARDS 1NTT COM SECURITY (FORMELY INTEGRALIS) PENETRATION TEST & SECURITY STANDARDS SCOTT TSE (MPHIL, CISSP, CISM, CEH) WISHLOG@GMAIL.COM INTRODUCTION ABOUT SCOTT TSE Identify 0-day attack on web mail used by

More information

SANS OSLO 3 SANS COURSES. SEC560 Network Penetration Testing and Ethical Hacking

SANS OSLO 3 SANS COURSES. SEC560 Network Penetration Testing and Ethical Hacking THE WORLD S LARGEST & MOST TRUSTED PROVIDER OF CYBER SECURITY TRAINING SANS OSLO MON 3 - SAT 8 OCT, 201 #SANSOSLO SEC42 Web App Testing and Ethical Hacking 3 SANS COURSES SEC0 Testing and Ethical Hacking

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Sorting Through the Noise

Sorting Through the Noise Sponsored by LogLogic Sorting Through the Noise SANS Eighth Annual 2012 Log and Event Management Survey Results May 2012 A SANS Whitepaper Written by: Jerry Shenk Advisors: Dave Shackleford & Barbara Filkins

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions General Questions What is the SANS Technology Institute? What degrees are offered by the SANS Technology Institute? What is the SANS Institute? Is the SANS Technology Institute

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

ISQ Handbook. Security. Information. Qualifications. An in-depth coverage of vendor and vendor-neutral qualifications

ISQ Handbook. Security. Information. Qualifications. An in-depth coverage of vendor and vendor-neutral qualifications 2003 ISQ Handbook An in-depth coverage of vendor and vendor-neutral qualifications Information Security Qualifications Contents Preface 5 Introduction 7 Part I Vendor Neutral Qualifications 13 International

More information

SAMPLE Short-form Job Profile

SAMPLE Short-form Job Profile SAMPLE Short-form Job Profile (This profile type is included free with the survey data for each position ordered) Foote Partners, LLC www.footepartners.com Senior Information Security Analyst Assists in

More information

TRAINING CATALOGUE 2016

TRAINING CATALOGUE 2016 The Most Trusted Source of Cyber Security Training, Certification and Research in the World CATALOGUE 2016 www.sans.org @EMEA See Inside for: Training Events Across Europe and Middle East Training Curriculum

More information

A Guide to Preparing for the GSM Capstone Exam

A Guide to Preparing for the GSM Capstone Exam A Guide to Preparing for the GSM Capstone Exam by: Courtney Imbert, courtneyimbert@gmail.com Last update: November 11, 2015 An Overview of the GSM Capstone Exam The GSM (GIAC Security Manager) is the capstone

More information

SECURITY CERTIFICATIONS

SECURITY CERTIFICATIONS SECURITY CERTIFICATIONS General Security: Basic Intermediate Advanced Forensics/Anti- Hacking: Basic Intermediate Advanced General Security Basic BISA Brainbench Information Security Administrator This

More information

College of Information Technology

College of Information Technology College of Information Technology Undergraduate Transfer Evaluation Guidelines A transcript evaluation is completed once official transcripts from all previously attended institutions have been received

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

Staff Augmentation Services Network Engineering ITN 1302ZCSA

Staff Augmentation Services Network Engineering ITN 1302ZCSA Staff Augmentation Services Network Engineering ITN 1302ZCSA Prepared for: Mr. Greg Robinson 12479 Research Parkway Orlando, FL 32826-3248 (407) 823-2661 Greg.robinson@ucf.edu Submitted by: Farhana Iqbal

More information

Phishing Why an attack created in 1987 still works today

Phishing Why an attack created in 1987 still works today Phishing Why an attack created in 1987 still works today TJ OConnor GIAC (GSE, GSEC, GCFW, GCIA, GCIH, GCFA, GREM, GPEN, GWAPT, GCFE) SANS Technology Institute - Candidate for Master of Science Degree

More information

PNNL- 22653. Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830

PNNL- 22653. Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 PNNL- 22653 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things

2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things 2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things April 24-25, 2015 Copyright 2015 NTX-ISSA 2015 Raytheon Cyber Security Company. Conference All rights (Spring) reserved.

More information

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,

More information

Learn the fundamentals of Software Development and Hacking of the iphone Operating System.

Learn the fundamentals of Software Development and Hacking of the iphone Operating System. Course: Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: Learn the fundamentals of Software Development and Hacking of the iphone Operating System. provides an Instructor-led

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Georgia Department of Education Career Pathway Descriptions

Georgia Department of Education Career Pathway Descriptions Information Technology Cluster Building linkages in Information Technology occupations for entry level, technical, and professional careers related to the design, development, support and management of

More information

Digital Forensic Certification versus Forensic Science Certification

Digital Forensic Certification versus Forensic Science Certification Digital Forensic Certification versus Forensic Science Certification Nena Lim Örebro University Sweden nena.lim@oru.se ABSTRACT Companies often rely on certifications to select appropriate individuals

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms

IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms Rob VandenBrink June 2009 GIAC GSEC gold, GSNA, GAWN, GCIA gold, GCIH, GPEN SANS Technology Institute - Candidate for Master of Science Degree 1

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant

More information

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security

More information

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015 For the Financial Industry in Singapore 31 July 2015 TABLE OF CONTENT 1. EXECUTIVE SUMMARY 3 2. INTRODUCTION 4 2.1 Audience 4 2.2 Purpose and Scope 4 2.3 Definitions 4 3. REQUIREMENTS 6 3.1 Overview 6

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Information Technology Resource Services

Information Technology Resource Services Information Technology Resource Services RTI specializes in resource solutions ranging from Help Desk, Workstation, Network Infrastructure and Telecommunications services to Software and Web Site Developers.

More information

WEB APPLICATION FIREWALL

WEB APPLICATION FIREWALL WEB APPLICATION FIREWALL Sdn. Bhd. (1015448-T) A-5-10 Empire Tower SS16/1, Subang Jaya 47500, Selangor, Malaysia. Tel : +603 5021 8290 Fax : +603 5021 8291 Email : sales@kaapagamtech.com Web: http://www.kaapagamtech.com

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

Configuring Microsoft Windows Vista Client

Configuring Microsoft Windows Vista Client Configuring Microsoft Windows Vista Client Course Number: 70-620 Course Length: 5 Days Course Overview The MCTS (Microsoft Certified Technology Specialist) credential enables professionals to target specific

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

...and How They Make a Difference. Including the. T o p G u n J o b s. To order this brochure, go to www.sans.org/ 20coolestcareers

...and How They Make a Difference. Including the. T o p G u n J o b s. To order this brochure, go to www.sans.org/ 20coolestcareers ...and How They Make a Difference Including the T o p G u n J o b s To order this brochure, go to www.sans.org/ 20coolestcareers The 20 Coolest Careers #1 Information Security Crime Investigator/Forensics

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Professional Services Overview

Professional Services Overview Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

What Makes PMI Certifications Stand Apart?

What Makes PMI Certifications Stand Apart? What Makes PMI Certifications Stand Apart? Many certifications exist for managers that claim to offer practitioners and organizations a number of benefits. So, why are PMI credentials unique? PMI certifications

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

What is EC-Council Certified Security Analyst Licensed Penetration Tester Program

What is EC-Council Certified Security Analyst Licensed Penetration Tester Program ECSA 1 EC-Council Certified Security Analyst Duration : What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about

More information

HUDSON SALARY GUIDES 2015

HUDSON SALARY GUIDES 2015 UK HUDSON SALARY GUIDES 2015 ABOUT THIS PUBLICATION This Salary Guide is a compilation of salary and market information provided by Hudson consultants, clients, candidates and other sources across UK.

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

Critical career expertise in the age of technology

Critical career expertise in the age of technology Critical career expertise in the age of technology Information Systems Management Professional profile for cutting-edge careers As the pace of technological innovation continues to escalate, so does the

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

2011 ucertify IT Certification Test Prep Catalog

2011 ucertify IT Certification Test Prep Catalog 2011 ucertify IT Certification Test Prep Catalog 1-800-796-3062 www.ucertify.com sales@ucertify.com ucertify Dare to face the challenge The Fastest Way to IT Certification 2 Give Your Students a Competitive

More information

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net Ralph Durkee Founder of Durkee Consulting since 1996 Founder of Rochester OWASP since 2004 President of Rochester ISSA chapter

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals The U.S. government stands at a critical juncture in its cybersecurity efforts. As a country we face increasingly

More information

Information Technology 2015 Programmes

Information Technology 2015 Programmes Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

A. Centrality to institutional mission statement and planning priorities:

A. Centrality to institutional mission statement and planning priorities: SANS Technology Institute Program Proposal for a Substantial Modification Master of Science in Information Security Engineering May, 2014 A. Centrality to institutional mission statement and planning priorities:

More information

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services...

Contents. Facts. Contact. Company Biography...4. Qualifications & Accolades...5. Executive Leadership Team...6. Products & Services... Contents Company Biography...4 Qualifications & Accolades...5 Executive Leadership Team...6 Products & Services...8 Company History...10 Facts Founded: 2000 CEO: Brad Caldwell Website: www.securitymetrics.com

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

VetSuccess. Top employers providing America s veterans with careers in cybersecurity VetSuccess Top employers providing America s veterans with careers in cybersecurity According to the U.S. Department of Labor, about 1.5 million members of our armed services will leave the military over

More information

11th AMC Conference on Securely Connecting Communities for Improved Health

11th AMC Conference on Securely Connecting Communities for Improved Health 11th AMC Conference on Securely Connecting Communities for Improved Health Information Security Testing How Do AMCs Ensure Your Networks are Secure June 22, 2015 Ray Hillen, Dennis Schmidt, Adam Bennett

More information

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Security+ P a g e 1 of 5. 5-Day Instructor Led Course P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA

More information