Information Security Principles and Practices

Size: px
Start display at page:

Download "Information Security Principles and Practices"

Transcription

1 Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge

2 Certification & Information Security Industry standards, ethics, and certification of information systems professionals and practitioners is critical to ensuring that a high standard of security is achieved Certification benefits both the employer and the employee Oversight and governance of the professional certification process is needed To help maintain its relevance and currency To aid professionals in networking with other professionals To meet that need, the ISC 2 organization was created Principles and Practices 2

3 Certification & Information Security... International Information Systems Security Certification Consortium (ISC 2 ) Maintaining a CBK for information security Certifying industry professionals and practitioners Administering training and certification examinations Ensuring credentials are maintained Two primary certifications Certified Information Systems Security Professional (CISSP) System Security Certified Practitioner (SSCP) Principles and Practices 3

4 Information Security Common Body of Knowledge (CBK) The CBK is a compilation and distillation of all security information collected that is relevant to information security professionals CISSP certification includes a working knowledge of all 10 domains ( Principles and Practices 4

5 Information Security CBK cont. 10 Domains Security Management Practices (Chap 4) Security Architecture and Models (Chap 5) Business Continuity Planning (Chap 6) Law, Investigations, and Ethics (Chap 7) Physical Security (Chap 8) Operations Security (Chap 9) Access Control Systems and Methodology (Chap 10) Cryptography (Chap 11) Telecommunications, Network, and Internet Security (Chap 12) Applications Development Security (Chap 13) Principles and Practices 5

6 Other Certificate Programs Certified Information Systems Auditor (CISA) Focuses more on business procedures than technology Certified Information Security Manager (CISM) To assure that information security manager has the required knowledge and ability to provide effective security management and consulting Global Information Assurance Certifications (GIAC) Intended primarily for practitioners or hands-on personnel such as system administrators and network engineers CompTIA Security+ Certification Tests the security knowledge mastery of an individual with two years on-the-job networking security experience Principles and Practices 6

7 Other Certificate Programs Vendor-Specific Certification Programs Check Point Certified Security Principles Associate Cisco Qualified Specialist Programs Such as Firewall, VPN, Intrusion Protection, etc Cisco Certified Security Professional Cisco Certified Internetwork Expert - Security TracK (CCIE Security Track) INFOSEC Professional Microsoft Certified Systems Engineer Security RSA Certified Systems Engineer Sun Certified Security Administrator for the Solaris Operating System Symantec Technology Architect Principles and Practices 7

8 Summary The benefits of certification and immersion into the CBK are clear to both employers and professionals who commit to life-long learning and to the betterment of themselves and their careers Principles and Practices 8

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Information Systems Security Engineering Professional (ISSEP)

Information Systems Security Engineering Professional (ISSEP) Information Systems Security Engineering Professional (ISSEP) 1 Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2 Systems Security Engineering

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org Security Certifications A Short Survey Welcome Stan Reichardt stan2007@sluug.org Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam. American Business & Technology University currently provides for transfer credit from Career Academy courses completed within the last three years by challenge exam. A student may not transfer more than

More information

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008 Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,

More information

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup. Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:

More information

THE SANS 2005-2007 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY

THE SANS 2005-2007 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY THE SANS 2005-2007 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY What factors impact compensation? Which security certifications matter? What makes security people mad? What matters for career

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY?

CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? E-Guide CLOUD SECURITY CERTIFICATIONS: HOW IMPORTANT ARE THEY? SearchCloud Security M ore and more certifications are being created around cloud security. An expert looks at some of the more prominent

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23 642-812 642-812 Building Converged Cisco Multilayer Switched Networks BCMSN 642-845 642-845 Optimizing Converged Cisco Networks ONT 642-901 642-901 Building Scalable Cisco Internetworks BSCI Building COM+

More information

ISQ Handbook. Security. Information. Qualifications. An in-depth coverage of vendor and vendor-neutral qualifications

ISQ Handbook. Security. Information. Qualifications. An in-depth coverage of vendor and vendor-neutral qualifications 2003 ISQ Handbook An in-depth coverage of vendor and vendor-neutral qualifications Information Security Qualifications Contents Preface 5 Introduction 7 Part I Vendor Neutral Qualifications 13 International

More information

How To Become A Security Professional

How To Become A Security Professional Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Dr. Garry L. White Gw06@business.txstate.edu Department of Computer Information Systems Texas State

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Program Drill-Downs National

Program Drill-Downs National July 2014 Program Drill-Downs National Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

IT Professional Certifications. By Dana Chaput ACC 626

IT Professional Certifications. By Dana Chaput ACC 626 IT Professional Certifications By Dana Chaput ACC 626 IT Professional Certifications Information Technology (IT) has seen a tremendous increase in acceptance and use by businesses in recent years. Because

More information

Securing the Organization: Creating a Partnership Between HR and Information Security

Securing the Organization: Creating a Partnership Between HR and Information Security Securing the Organization: Creating a Partnership Between HR and Information Security A White Paper from (ISC) 2 Securing infrastructure is one of the most critical issues facing business and governments

More information

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM Terry Smith, Macon State College, Georgia, USA, terry.smith1@maconstate.edu Alex Koohang, Macon State College, Georgia, USA, alex.koohang@maconstate.edu

More information

Greg Gleghorn Capella University. Jean Gordon Capella University

Greg Gleghorn Capella University. Jean Gordon Capella University A quantitative examination of perceived promotability of information security professionals with vendor-specific certifications versus vendor-neutral neutral certifications ABSTRACT Research in Business

More information

Stacey Cumberbatch Commissi oner

Stacey Cumberbatch Commissi oner Stacey Cumberbatch Commissioner Fall 2015 Information Technology Catalog Cityw ide Training Center FALL 2015 COURSE DESCRIPTIONS AND SCHEDULE IT PROFESSIONAL/CERTIFICATION COURSES DATABASE CERTIFICATION

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Bridging the gap between tomorrow s IT job skills and today s workforce

Bridging the gap between tomorrow s IT job skills and today s workforce 866.378.0761 www.leaderquestonline.com Bridging the gap between tomorrow s IT job skills and today s workforce Certifications Aligned to Local Job Markets Career Services & Job Placement Assistance Customized

More information

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant

More information

Kris Madura, MBA, PMP. Security Program Manager securityplus@comptia.org

Kris Madura, MBA, PMP. Security Program Manager securityplus@comptia.org Kris Madura, MBA, PMP Security Program Manager securityplus@comptia.org Security+ Description Foundation-level vendor-neutral benchmark certification validating the knowledge and experience of the foot

More information

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information

More information

Connecting PTE to Careers in Idaho

Connecting PTE to Careers in Idaho 1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University

More information

Tom VAN DEN EYNDE CISSP, CISA, CISM

Tom VAN DEN EYNDE CISSP, CISA, CISM Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: tom@vandeneynde.net Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May

More information

Certification for Information System Security Professional (CISSP)

Certification for Information System Security Professional (CISSP) Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by

More information

Moduli Accreditati (*)

Moduli Accreditati (*) (*) La lista dei moduli accreditati EUCIP è indicativa, parziale e costantemente soggetta ad aggiornamenti (**) La somma dei punteggi di più certificazioni deve essere depurata dai punti connessi a eventuali

More information

Michigan Technological University. Development of System Administration & Network Security Curriculum

Michigan Technological University. Development of System Administration & Network Security Curriculum Michigan Technological University Development of System Administration & Network Security Curriculum Prof. Yu Cai Prof. Guy Hembroff March 24, 2006 Computer Network & System Administration Program The

More information

A CBK for Information Security and Critical Infrastructure Protection

A CBK for Information Security and Critical Infrastructure Protection A CBK for Information Security and Critical Infrastructure Protection Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis Information Security and Critical Infrastructure Protection Research

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

2015-2016 Information & Telecommunication Technology

2015-2016 Information & Telecommunication Technology PROGRAM GUIDE 2015-2016 Information & Telecommunication Technology Information and Telecommunications Technology Associate in Applied Science Degree 60 credits Information and Telecommunication Technology

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Individual Certification of Security Proficiency for Software Professionals: Where Are We? Where Are We Going?

Individual Certification of Security Proficiency for Software Professionals: Where Are We? Where Are We Going? Individual Certification of Security Proficiency for Software Professionals: Where Are We? Where Are We Going? Dan Shoemaker January 2009 ABSTRACT: The software industry needs a universally acknowledged

More information

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business

Choosing Ascentor as your cyber security partner. Secure your information Strengthen your business Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester

More information

Hosted by Lunarline: School of Cyber Security

Hosted by Lunarline: School of Cyber Security Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals

Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals Safeguarding U.S. Cyber Assets with Well-Balanced, Proven Information Security Professionals The U.S. government stands at a critical juncture in its cybersecurity efforts. As a country we face increasingly

More information

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

Renewing CompTIA Certifications With Achieving Other Vendor Certifications Renewing CompTIA Certifications With Achieving Other Vendor Certifications Overview You may earn Continuing Education Units (CEUs) toward your certification renewal by earning other industry certifications.

More information

Career Paths in Information Security v6.0

Career Paths in Information Security v6.0 Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Information Technology Credentials

Information Technology Credentials Information Technology Credentials The following credentials are valued at 1 point each. A maximum of 2 points may be used to satisfy ABII's eligibility requirements. Organization 3Com American Society

More information

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow (ISC) 2 2012 Career Impact Survey Executive Summary The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow Skilled security professionals enjoy job stability and mobility,

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Websense Certified Engineer Web Security Professional Examination Specification

Websense Certified Engineer Web Security Professional Examination Specification Websense Certified Engineer Web Security Professional Examination Specification Introduction This is an exam specification for the Websense Certified Engineer - Web Security Professional examination. The

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

Integrating web application security control in the system development lifecycle

Integrating web application security control in the system development lifecycle Integrating web application security control in the system development lifecycle Chester Soong, CISSP-ISSAP, ISSMP, CISA Managing Director Security Consulting Services Ltd. What are the Challenges Application

More information

Editor Stacy Simpson, SAFECode. Contributors

Editor Stacy Simpson, SAFECode. Contributors Security Engineering Training A Framework for Corporate Training Programs on the Principles of Secure Software Development April 20, 2009 Editor Stacy Simpson, SAFECode Contributors Eric Baize, EMC Corporation

More information

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board Update on the CSSLP And its Impact on the SDLC Profession Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board (ISC)² Built the largest, most comprehensive Software Security Body of

More information

A Draft Model Curriculum for Programs of Study in Information Security and Assurance

A Draft Model Curriculum for Programs of Study in Information Security and Assurance A Draft Model Curriculum for Programs of Study in Information Security and Assurance Michael E. Whitman, Ph.D., CISSP & Herbert J. Mattord, CISSP Abstract As Information Security and Assurance programs

More information

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES 1 2 THIS ONE PROVES YOU'RE HERE. THIS ONE SHOWS YOU'VE ARRIVED. 3 FROM GRADUATION TO RETIREMENT, (ISC) 2 FAST TRACKS CAREERS IN INFORMATION SECURITY. Secure

More information

SECURITY CERTIFICATIONS

SECURITY CERTIFICATIONS SECURITY CERTIFICATIONS General Security: Basic Intermediate Advanced Forensics/Anti- Hacking: Basic Intermediate Advanced General Security Basic BISA Brainbench Information Security Administrator This

More information

SUBJECT: Training Policy-04 (Revised) Defense Finance and Accounting Service Civilian Licenses, Certifications and Related Expenses

SUBJECT: Training Policy-04 (Revised) Defense Finance and Accounting Service Civilian Licenses, Certifications and Related Expenses DFAS-HR/NH February 1, 2008 MEMORANDUM FOR DFAS EMPLOYEES SUBJECT: Training Policy-04 (Revised) Defense Finance and Accounting Service Civilian Licenses, Certifications and Related Expenses References:

More information

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Crafting an Undergraduate Information Security Emphasis Within Information Technology Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu

More information

Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today)

Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today) Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today) Course # SP-1000 SP-3005 SP-1001 SP-3003 SP-3004 SP-2004 SP-3001 SP-3002 PR-1005 MS-20412 MS-50321 MS-7005

More information

Program Drill-Downs Western New York

Program Drill-Downs Western New York July 2014 Program Drill-Downs Western New York Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time

More information

COMPUTER AND INTERNETWORKING TECHNOLOGIES

COMPUTER AND INTERNETWORKING TECHNOLOGIES COMPUTER AND INTERNETWORKING TECHNOLOGIES COMPUTER AND INTERNETWORKING TECHNOLOGIES These days it s almost impossible to find any area of life not impacted by technology. As existing and emerging technologies

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

How To Get A Top Paying Certification

How To Get A Top Paying Certification A Global Knowledge Special Report 15 Top-Paying Certifications for 2015 1-800-COURSES www.globalknowledge.com 15 Top-Paying Certifications for 2015 John Hales, Global Knowledge VMware, SDN, and SoftLayer

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications SearchSecurity.com's IT security certifications guide 1 of 18 Check out the other guides in this series: Guide to information security certifications SearchSecurity.com's guide to vendor-neutral security

More information

S A N S 2 0 0 8. Results for Calendar Year 2008

S A N S 2 0 0 8. Results for Calendar Year 2008 S A N S 2 0 0 8 Results for Calendar Year 2008 Executive Summary The SANS 2008 Salary and Certification Survey was conducted by Rob Kolstad of Delos Enterprises on behalf of the SANS Institute to examine

More information

The current IT market shows great demands for qualified applicants with at least one certification in their given field, Spieth said.

The current IT market shows great demands for qualified applicants with at least one certification in their given field, Spieth said. Up-to-Date: Earning the Certs the Market Demands by Eric Vanderburg Certification is an excellent way to enhance your skills and employability, but although everyone wants to move ahead, many lack direction.

More information

The 10 best IT certifications: 2012

The 10 best IT certifications: 2012 The 10 best IT certifications: 2012 By Erik Eckel March 26, 2012 1: MCITP: Enterprise Administrator on Windows Server 2008 I love Apple technologies. The hardware s awesome, the software s intuitive and

More information

Career Analysis into Cyber Security: New & Evolving Occupations

Career Analysis into Cyber Security: New & Evolving Occupations Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills

More information

EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation. Placeholder for licensee logo

EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation. Placeholder for licensee logo EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation EUCIP What is it for? How is it structured? What are its benefits? More than just a group of related certifications

More information

Careers and Training in Computers

Careers and Training in Computers Careers and Training in Computers Julie Jackson Computer Information Systems Department Edmonds Community College www.cis.edcc.edu jjackson@edcc.edu 425-640-1123 Careers and Training in Computers There

More information

Work Toward Your Bachelor s Degree

Work Toward Your Bachelor s Degree By completing a series of Walden s Professional Development courses, you can earn credits toward a number of bachelor s programs at Walden University. To receive credit, you will need to complete all of

More information

THE SANS 2005 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY

THE SANS 2005 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY THE SANS 2005 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY What factors impact compensation? Which security matter? What makes security people mad? What matters for career advancement? Updated

More information

Understanding the Federal IT Security Professional (FITSP) Certification

Understanding the Federal IT Security Professional (FITSP) Certification Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

LAnet. How Your Enterprise Can Benefit from Our IT Managed Services. www.la-networks.com 1. LA Networks: Managed Services

LAnet. How Your Enterprise Can Benefit from Our IT Managed Services. www.la-networks.com 1. LA Networks: Managed Services LAnet How Your Enterprise Can Benefit from Our IT Managed Services LA Networks: Managed Services www.la-networks.com 1 What we bring to the table with our IT Managed Services At LA Networks, we strive

More information

FedVTE Course Library

FedVTE Course Library FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis

More information

FedVTE Course Library

FedVTE Course Library FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis

More information

APEC Guide to Information Security Skills Certification. Booklet

APEC Guide to Information Security Skills Certification. Booklet Certification Booklet www.siftsecurity.net AEC ublication Number: AEC#207-TC-03.1 AEC TEL Security and rosperity Steering Group May 2007 Contents Contents... 2 Introduction... 3 Using this guide... 3 What

More information

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Jefferson Wells has prepared this report for Corporate Creations.

More information

WHY YOU SHOULD NOT GET A CISSP. Timmay, with a dose of Jericho

WHY YOU SHOULD NOT GET A CISSP. Timmay, with a dose of Jericho WHY YOU SHOULD NOT GET A CISSP Timmay, with a dose of Jericho Overview Introduction About the (ISC)2 and the CISSP (ISC)2 on Benefits of a CISSP What I Look For in a Certification How Required Is It? (ISC)2

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

E M P I R E C O L L E G E

E M P I R E C O L L E G E 34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information