1 Cyber Security Education, Qualifications and Training Prof. Keith M. Martin Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK This paper is a postprint of a paper submitted to and accepted for publication in the IET Engineering & Technology Reference and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library Official version, 1st published in June 2015, doi: /etr , ISSN , Abstract The rise in significance of cyber security has led to an increase in the range of interesting career paths that can be followed in this area. Inevitably there has also been an explosion in the diversity of available cyber security education, qualifications and training, most of which is targeted at those seeking to engage with this promising job market. In this article, some guidelines are provided on how to select appropriate education, qualifications and training in cyber security, alongside a review of some of the many current offerings and how to differentiate between them. While the focus is on the UK cyber security sector, many of the observations have wider relevance. Introduction The cyber security profession is growing and there are an increasing number of fascinating ways of making a career in cyber security. As organisations have embraced the many benefits of moving their infrastructures and businesses online, there has been growing awareness of the need to manage the cyber security risks that arise. Recent years have seen both an increase in the need for general organisations employ their own cyber security specialists, as well as an expansion of the cyber security service provision sector . A 2014 UK Government report  presented the findings of an exercise to determine the needs of business with respect to cyber security skills. It highlighted a demand amongst businesses for more professionals with a range of technical skills, but also a demand for new entrants with stronger business skills and greater work experience. It also identified the importance of increasing cyber skills among those who create, purchase and use technology to reduce business vulnerability to cyber attack, and among company decision makers who are responsible for managing business risks. Although it has been possible to follow a career in cyber security outside of government for several decades, the current rapid expansion of the industry has taken place ahead of any mature notion of professionalization in the industry. The UK Cyber Security Strategy  has helped to consolidate and galvanise attempts to develop a stronger notion of what it means to be a cyber-security professional and to identify different cyber security roles. A career in cyber security naturally requires relevant skills and competence. In the absence of a fully mature framework for identifying these, an abundance of different education and training (generically referred to here as upskilling ) offerings are available, some of which lead to formal
2 qualifications. One of the challenges for anyone seeking to prepare themselves for entering, or developing, a cyber-security career is which of those to pursue. Note that throughout this article no attempt is made to distinguish between the terms cyber security (a relatively recent nomenclature) and the more established terms information security and information assurance. While arguments can be made about subtle differences between these, for the purposes of this article they are regarded as the same. After a short discussion on identifying needs, this article will, in turn, examine cyber security education, qualifications and training from academia, professional bodies and the commercial sector. Identifying Needs The first step towards identifying how to upskill in cyber security is to identify needs. In terms of cybersecurity careers, here are some issues worth considering in advance of researching education or training in this area: Type of qualification. A fundamental decision to make is whether a formal qualification is sought. Upskilling programmes offer a range of qualifications, including academic degrees and professional certifications. On the other hand, it may be that knowledge acquisition suffices. Resource commitment. It is worth identifying the resources required to complete an upskilling programme. The financial cost is of course one resource, but perhaps more significant is the time. Delivery mode. The mode of delivery is likely to be an important factor. Some programmes require a block of time away from work, others require a longer commitment of less time (day release), while others can be conducted remotely (distance or online learning). Prerequisite knowledge. A good upskilling programme should make it clear what prerequisite knowledge is required. Some programmes assume some existing cyber security expertise, while others may be entry level. Breadth of knowledge sought. There are relatively few upskilling programmes that provide an overall foundation. Most provide a level of specialisation or have a particular focus. It is important to identify what is required and how closely an offering matches this. Role-based or subject-based. It is worth considering whether a particular cyber security career role is being sought, such as Chief Information Security Officer, or whether focused subject expertise is wanted, such as for penetration testing. Many upskilling programmes are targeted at specific roles and/or subjects. Knowing or doing. It may be important to identify the extent to which upskilling needs relate to acquiring the knowledge of how to do something, as opposed to acquiring an ability to demonstrate that a particular skill has been applied in practice to a certain competency level. Many upskilling programmes offer a combination of both, but some focus on knowing while others focus on doing (it is quite possible and acceptable to provide one of these during upskilling and not the other). Government or private sector. There are some differences between the requirements for certain government and private sector career options. It is worth considering whether either of these employment sectors is being explicitly considered. Technology specificity. Some upskilling programmes relate directly to specific technologies or are at least biased towards them.
3 Institute of Information Security Professionals (IISP) Skills Framework Although it was noted that there was no mature framework for identifying relevant skills for a career in cyber security, in 2010 the IISP  established the IISP Information Security Skills Framework . This identifies a range of competencies expected of Information Security and Information Assurance Professionals in the effective performance of their roles and was developed through collaboration between established professionals in the public and private sectors, as well as academia. In many senses this is the best cyber security benchmarking framework that exists (certainly in the UK). The IISP Skills Framework is based around the following competency areas, noting that not all roles require expertise in all categories: Information security management, Information risk management, Implementing secure systems, Information Assurance Methodologies and Testing, Operational Security Management, Incident Management, Audit, Assurance and Review, Business Continuity Management, Information Systems Research. The IISP Skills Framework has proved influential, particularly in areas of government. The UK has a National Cyber Security Programme, which is intended to implement the UK Cyber Security Strategy. This includes a mission to develop knowledge, capability and skills in cyber security, much of which is developed through CESG, the UK National Technical Authority for cyber security and the more public-facing part of GCHQ. As part of this initiative the CESG Certified Training (CCT) Scheme  is attempting to assure high quality cyber security upskilling programmes by certifying specific programmes against the IISP Skills Framework. Likewise, a variation of the IISP Skills Framework is being used to benchmark GCHQ Certified Master s degree programmes in cyber security . Education against Training Much has been written about the general differences between education and training and most remarks about this apply as well to cyber security as to other disciplines (e.g. see ). Crudely speaking, education is more focused on the acquisition of knowledge and understanding, through which skills are developed. On the other hand, training tends to be targeted at the acquisition of skills to a demonstrable level of competence. There is a strong case for engaging in both education and training as part of career development in cyber security. Perhaps this is best illustrated by example. Consider the case of someone tasked with taking on a new role overseeing the management of cryptographic keys for an organisation. A decent education programme in the area of key management should equip the employee with a sound understanding of the principles behind cryptography, its functionality and limitations, the significance of key management, an understanding of key lifecycles, an overview of hardware security modules (HSMs) and so on. This education should give the employee a very clear understanding of the role that key management plays within the wider cyber security strategy of any organisation. What an education programme is unlikely to provide is hands-on experience of, for example, managing keys using the specific HSM technology deployed by the organisation. Indeed, it is probably unlikely to have given the employee hand-on experience of using any HSM technology.
4 This is the gap often filled with training programmes. These are more likely to offer hands-on experience and, in many cases, deal with very specific technologies. On a suitable training programme, the employee will hopefully learn how to operate and command a specific type of HSM. They might also learn how to develop policies and procedures for governing keys within the organisation and so on. It should be clear that, depending on existing knowledge, both education and training are relevant. A new employee might require both. A new graduate with an education in cryptography might require training. An experienced key manager from another organisation might require training on the specific systems in use. And an existing employee with some hand-on experience might well require education in order to better understand the role and prepare to take on more responsibilities. Crucially, a significant role of education, through delivery of the fundamentals, is to prepare someone for the future. Once you understand the fundamentals of key management you are well equipped to tackle future. developments. Training is much more about the here and now. In cyber security, as in other fields, education and training complement one another very comfortably. Progression in the cyber security profession can be aided by prudent engagement in both activities. Academic Qualifications A large number of upskilling programmes in cyber security are provided by academic institutions. This has particularly been so since the establishment of the UK National Cyber Security Programme, which has incentivised academic institutions to engage in cyber security activities. Why study an academic cyber security programme? There are probably three main reasons for considering an academic upskilling programme: 1. Qualifications. Academic institutions provide recognised qualifications. The quality of that qualification depends on the reputation of the specific programme and the institution behind it. 2. Educational focus. Academic institutions have a central mission to provide education and tend to be experienced as equipping people with fundamental skills uncluttered by the details of a particular organisational setting. 3. Neutrality. Academic institutions are often regarded as providing a neutral perspective free from commercial vested interests. Certification of Institutions and Programmes Owing to the relative explosion in the number of cyber security degree programmes, the UK Government is currently engaging in a set of certification activities designed to identify academic institutions and programmes that meet a number of quality benchmarks. These are: Academic Centres of Excellence in Cyber Security Research . This status has been awarded to institutions which are engaged in world class research in cyber security. Acquisition of Academic Centre of Excellence in Cyber Security Research (ACE-CSR) status requires not just quality in research, but also established pedigree over a span of time and critical mass of research activity. Maintenance of this status is subject to periodic review. As of 2015 there are 13 ACE-CSR institutions, with further assessments anticipated in the future.
5 Certified Master s degrees in Cyber Security . This status is awarded to Master s degree programmes that meet quality thresholds in terms of coverage and teaching. The first set of certified Master s degrees was for programmes that provide a general education in cyber security. There are currently only four programmes that have full certified status and two withprovisional certified status. There are plans to certify more focused Master s programmes, with the first such initiative being for programmes specialising in the area of digital forensics. Academic Centres of Excellence in Cyber Security Education. An invitation to academic institutions to apply for this status is anticipated in 2015, with the holding of at least one Certified Master s degreeexpected to be a prerequisite. Choosing an academic programme There are many different academic cyber security upskilling programmes on the market. The following criteria may be worth considering when assessing suitability of a specific offering. For another perspective on selecting academic programmes in cyber security see . Type of programme. Fundamentally, the type of programme sought needs to be determined. The main classes of the degree programme are discussed shortly. Cyber security focus. It is worth carefully checking the syllabus of degree programmes with security in their titles, since many academic institutions offer flavours of more general degrees that may qualify for a security label with only a small security component. Reputation of the programme. Probably the most important criteria are the reputation of the programme. Certification (if applicable) is certainly an indicator of this reputation, but is also worth determining by conducting some basic research. What have past graduates said about it in public fora? Are employers familiar with it? How many graduates does it have? What are they doing now? Capability of the teaching team. The quality of teaching is an important factor and care should be taken to establish the capability of the team that will deliver the programme. A healthy diversity of teaching staff with cyber security interests is a good measure of this. External connections. The depth and breadth of external (industrial, government and other) connections are a good measure of programme reputational quality. Cyber security is a practical discipline and a good programme should be embedded in the wider cyber security community. Research activity. Engagement in quality cyber security research suggests a strong environment within which to receive cyber security upskilling. Evidence of quality publications and projects is the best indicator of this, with institutional ACE-CSR certification providing an indication of critical mass. Delivery mode. All academic programmes require substantial time commitments and many require fulltime study. Some, however, are friendlier towards student s already in employment and may offer a range of part-time delivery options, such as block teaching and distance learning.
6 Research degrees Research degrees require the most specialised ability and greatest time commitment. They have high entry requirements and are targeted at anyone considering a career where research skills are required. The standard research degree is the 3-year PhD programme. All ACE-CSR institutions are required to have an established and active PhD programme in place. The UK National Cyber Security Programme has funded two Centres for Doctoral Training (CDTs) in Cyber Security (at University of Oxford  and Royal Holloway, University of London ). These CDTs provide an additional first year of cohort-based structured taught cyber security training in advance of the 3-year research component. Master s degrees By far the most popular type of dedicated degree programme in cyber security is a Master s, which is typically 1-year fulltime or 2-year part-time. Many of these programmes are wellestablished and have a strong track record of preparing students for cyber security careers . Relatively few Master s degree programmes provide a general balanced coverage of cyber security backed up by a strong delivery environment. The Certified Master s degree in Cyber Security initiative  has thus far identified just four fully-certified programmes (at Edinburgh Napier University, Lancaster University, University of Oxford, and Royal Holloway, University of London). A number of Master s programmes focus on specialised aspects of cyber security. These may be appropriate for a student with a clear specialisation in mind, however, no certification process has yet been completed for any of these types of programme. Examples of specialist programmes include Digital Forensics (Cranfield University), Cybercrime (University of Derby) and Security Management (City University), but there are many more. It is worth noting that a small number of Master s programmes can be conducted by distance learning and hence fitted around work commitments. Examples include Edinburgh Napier and Royal Holloway, University of London. Undergraduate degrees There are a number of 3-year undergraduate degree programmes in topics relating to cyber security. It is at least contestable whether degrees at this level dedicated to cyber security make complete sense, since cyber security is perhaps best understood within a wider context. Perhaps the most critical features of such programmes to consider are whether they offer balanced coverage of cyber security and whether they provide the broad range of transferable skills expected from a more traditional undergraduate degree programme. An example of a programme that appears to offer these strengths is the BSc Computer and Information Security at Plymouth University. Perhaps undergraduate programmes are more prevalent in more traditional disciplines that offer a component of cyber security specialisation. While all modern programmes in areas such as computer science should include coverage of some cyber security, some programmes offer more substantive coverage. In the absence of any formal certification of such programmes, broader institutional activity in cyber security is a useful indicator of quality of cyber security coverage. Diplomas and certificates Some academic institutions offer certificates or diplomas in cyber security related topics. These are seen as a much lighter qualifications than degree programmes. These qualifications are also much more ambiguous in terms of what they represent (these terms are sometimes used for exit qualifications for partially completed higher degrees), as well as being easily confused with nonacademic programmes.
7 Open online courses A number of platforms offer free university courses in cyber security. These are typically short taster courses that can be studied free over the Internet. In some cases a certificate of completion can be obtained. Examples include: Coursera . This is arguably the leading open learning platform and offers a small range of free cyber security courses from partner institutions around the world, including Stanford, University of Maryland University of London. FutureLearn . This platform is owned by the Open University and offers programmes from a large range of academic institutions in the UK. In particular, it hosts an Introduction to Cyber Security, which was developed by the Open University as part of the UK national Cyber Security Programme. This course is CCT certified. itunes U. A range of educational audio and video podcasts on cyber security topics, including lectures and interviews, are available from institutional sites hosted by itunes U. Professional Qualifications Another major source of cyber security upskilling programmes relate to qualifications provided by professional bodies. Professional qualifications tend to assess both the knowledge and the ability to put knowledge into practice, with many qualifications targeted at very specific professional roles. There are fewer of these qualifications than academic programmes, so choosing between them is more straightforward. Since these are in many ways complementary to, academic programmes it is common for cyber security professionals to hold several professional qualifications as well as an academic degree. Some of the main professional bodies issuing qualifications in cyber security are as follows. BCS The BCS  has been in existence for over 50 years and is the chartered institute for IT. There are a number of Special Interest Groups for aspiring cyber security professionals. The BCS provides development opportunities at a broad range of career levels through events and qualifications. Full membership confers professional status and can be reinforced through the Chartered IT Professional status. The BCS offers a small number of certifications at both foundation and practitioner levels. The BCS is also one of the three certification bodies for the CESG Certified Professional (CCP) scheme. CESG The CCP scheme  is the UK Government s approved standard for assessing cyber security professionals. The CCP scheme covers seven formally defined roles in cyber security and assesses them to four different skill levels. These roles are security and information risk advisor, information assurance architect, accreditor, information assurance auditor, IT security officer, communications and security officer, and penetration tester. Applicants for CCP certification can be independently assessed by one of three separate approved certification bodies (APM Group, BCS and IISP/CREST/Royal Holloway). CESG also operates the CESG Listed Advisor scheme  which identifies and support consultants who provide information security advice to central government. Membership is highly regarded in the government sector.
8 CREST CREST  is an example of a professional body focused around one type of career within cyber security, namely ethical hacking and allied capabilities in the commercial sector. CREST offers a full suite of very specific qualifications that assess competency in specific roles, such as CREST Registered Penetration Tester, CREST Certified Web Application Tester and CREST Registered Intrusion Analyst. IISP The IISP  was established in 2006 to provide a professional body focused on supporting cyber security professionals. While it does not itself directly provide qualifications, it is highly influential in the cyber security upskilling space as it established the IISP Skills Framework  and supports CCP certification. The IISP provides a variety of membership levels, which are awarded on the basis of knowledge, experience and competence. ISACA ISACA  is a US-based international membership and certification organisation which has been in operation for over 40 years. It is globally successful with over 200 chapters throughout the world. The focus of ISACA is audit and control of Information Systems. ISACA provides a range of services to aspiring professionals, including several relevant certification programmes in the area of cyber security: Certified Information Systems Auditor (CISA). The CISA certification is globally recognised and is probably the most important benchmarking certificate for cyber security professionals involved in auditing and monitoring information systems. Certified Information Security Manager (CISM). The CISM certification is focused on security management and widely recognised as a respected assessment of capability to oversee an enterprise s information security. Certified in Risk and Information Systems Control (CRISC). The CRISC certification assesses capability in risk management, including risk assessment, response and monitoring. International Information Systems Security Certification Consortium (ISC2) The ISC2  is a US-based international certification body which has been operating for over 20 years. Membership is related to certification. By far the most influential of the ISC2 certifications is the Certified Information Systems Security Professional (CISSP). Indeed CISSP has become something of a global benchmark qualification in cyber security. CISSP certification requires passing an examination across ten domains of knowledge. It also requires evidence of at least 5 years of relevant work experience, although 1 year of credit is given for possessing certain academic qualifications (including a Master s degree in Information Security). Evidence of continued professional development is required to remain in good standing, otherwise the examination must be retaken every 3 years. CISSP holders can achieve further specialised certification in security architecture, security engineering and security management. (ISC)2 also issues several other less prominent certifications in more specialist areas: Certified Secure Software Lifecycle Professional. Certified Authorization Professional. Systems Security Certified Practitioner. Certified Cyber Forensics Professional. HealthCare Information Security and Privacy Practitioner.
9 Commercial Qualifications A third source of cyber security upskilling programmes is the private sector. There are far too many private providers for a comprehensive overview to be provided here. Common sense should be applied when considering commercial providers and care should be taken to research the reputation and quality before signing up to private offerings. There are many good suppliers, and some less good. The SANS Institute The SANS Institute  merits special mention as it is one of the most significant suppliers of commercial training in cyber security. The SANS Institute is a private US company founded in 1989 and has gained an impressive reputation for the range and scale of its training activities in cyber security. Many SANS courses are focused on specific security operations activities. There are more generic or foundation courses along with courses which highlight security aspects of other disciplines such as programming/ developing systems. SANS runs both long courses (focused on a specific role) and short courses (focused on specific skills within a role). SANS courses are available in a number of different delivery modes, including distance learning. SANS has sufficient traction in this area that its activities stray into both the professional body and academic space: SANS runs the Global Information Assurance Certification scheme which certifies information security professionals in both technical and practical aspects of cyber security. SANS operates the SANS Technology Institute, which is a private institution issuing Master s degrees (in information security management and information security engineering) and certificate programmes. Vendor courses Upskilling courses, such as those run by SANS are intended to be vendor-neutral. However, cyber security technologies are often complex and it is entirely appropriate that a number of vendors offer cyber security upskilling programmes based on their specific technologies. Several of these vendors are so ubiquitous in the marketplace that their technology-specific certifications can be very useful to obtain. One well-known example of a vendor providing its own security certifications is Cisco. Securityrelated certification provided by Cisco  include (among others): Cisco Certified Network Associate Security, which validates the ability to set up a basic security network infrastructure, including core security technologies and monitoring. Cisco Certified Network Professional Security, which validates the skills to be a network security engineer, including maintenance and deployment of appropriate tools for routing, switching and security defence.
10 CESG Certified Training As previously mentioned, one of the initiatives that forms part of the UK National Cyber Security Programme is the development of the CCT scheme . The CCT scheme is intended to identify high standard cyber security training amidst the plethora of offerings on the market. An upskilling programme needs to have been rigorously assessed in terms of its content, trainers and ability to manage training events in order to qualify for CCT status. The CCT scheme is based on the IISP Skills Framework and over a dozen programmes are now CCT certified, with this number expected to grow. Other Professional Development Activities There are many other initiatives in the areas of cyber security training that do not fall neatly into the previous categories. A few of these are worth mentioning in order to give a flavour of the types of activity available. The Cyber Security Apprenticeship scheme is being run by the Tech Partnership  and provides on-the job training as well as some classroom-based training. This scheme is intended to accelerate new entrants into the cyber security profession by giving them real experience of working in the cyber security sector. The Tech Partnership is also supporting the development of Cyber Academy Learning Pathways, which are intended to align with the IISP Skills Framework and provide assistance for individuals planning career progression in cyber security. The Cyber Security Challenge  is an innovative series of national competitions designed to inspire people to enter the cyber security profession. While not directly a training activity, the Cyber Security Challenge does identify and inspire individuals to progress their cyber security skills, both as participants and as challenge setters. The Challenge also supports a cybersecurity mentoring scheme. There are a number of initiatives designed to support cyber security in specific sectors or targeting particular audiences. One example of the latter is Responsible for Information , which is a free online course that has been developed by the UK Government for small and medium-sized enterprises to provide basic information security training. Conclusion There probably has never been a more interesting time to consider a career in cyber security. However, cyber security is both multi-faceted and constantly evolving, making it challenging to acquire and maintain the skills necessary to act as a responsible cyber security professional. Anyone aspiring to enter the cyber security profession would be wise to engage in some level of education and training, and perhaps seek to acquire suitable qualifications. Indeed, most people already employed as cyber security professionals regularly require upskilling. This article has reviewed a range of available options for cyber security education, qualifications and training. The main differences between available programmes have been identified and some guidelines on how to match personal needs to upskilling options have been discussed. It is hoped that these observations are of some assistance in charting a successful and rewarding career in the cyber security profession. Acknowledgments Thanks are due to Paul Dorey, Ian McKinnon and Fred Piper for useful conversations in preparation of this article.
11 REFERENCES  Competitive analysis of the UK cyber security sector: A study by Pierre Audoin Consultants for the Department for Business, Innovation and Skills, Version 1, 29 July 2013, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/259500/bis competitiveanalysisof-the-uk-cyber-security-sector.pdf, accessed March 2015  Cyber Security Skills: Business Perspectives and Government s Next Steps, HM Government, March 2014, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/289806/bis cyber-securityskillsbusiness-perspectives-and-governments-next-steps.pdf, accessed March 2015  The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world, HM Government, November 2011, https://www.gov.uk/government/publications/cybersecurity-strategy, accessed March 2015  The Institute of Information Security Professionals, https://www.iisp.org  IISP Information Security Skills Framework Version 6.1, IISP (2010), https://www.iisp.org/imis15/iisp/accreditation/our_skills_framework/iispv2/accreditation/ Our_Skills_Framework.aspx?hkey=e77a6f eaa7b ec4, accessed March 2015  CESG Certified Training, accessed March 2015  GCHQ Certification of Master s degrees in Cyber Security accessed March 2015  Masadeh, M.: Training, education, development and learning:what is the difference?, Eur. Sci. J., 2012, 8, (10), pp  Academic Centres of Excellence in Cyber Security Research, accessed March 2015  Furnell, S.: Securing a Good Degree?. IISP Pulse, Spring 2011, pp. 6 8  Oxford Centre for Doctoral Training in Cyber Security, https://www.cybersecurity.ox.ac.uk/education/cdt  Royal Holloway Centre for Doctoral Training in Cyber Security, https://www.cybersecurity.ox.ac.uk/education/cdt  Why cyber security is a safe choice for a postgrad degree, The Guardian, 24 June 2014, accessed March 2015  Cousera, https://www.coursera.org/  Future Learn, https://www.futurelearn.com/  BCS: The Chartered Institute for IT,  Certified Professionals, accessed March 2015  CESG Listed Advisor Scheme, accessed March 2015  CREST: Assurance in Information Security,  ISACA: Trust in, and value from, information systems, https://www.isaca.org/  (ISC)2: Inspiring a Safe and Secure Cyber World, https://www.isc2.org/  SANS,  CISCO Training & Certifications, accessed March 2015  Tech Partnership: Skills for the digital economy,  Cyber Security Challenge UK,  Responsible for Information for SMEs, accessed March 2015
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
Career Paths in Information Security v6.0 Have you ever considered a career in computer security but didn t know how to get started? The Information Security industry is an exciting and diverse place to
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3
Secure your information Strengthen your business Choosing Ascentor as your cyber security partner www.ascentor.co.uk Ascentor Ltd 5 Wheatstone Court, Davy Way Waterwells Business Park Quedgeley, Gloucester
CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,
MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department
Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: email@example.com Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
Certified Master s in Cyber Security Certification of Master s Degrees Providing a General, Broad Foundation in Cyber Security Certification of Master s Degrees in Digital Forensics Questions and Answers
Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Computer and Information Security Programme Codes: 3836 (Sept), 3837 (Jan)
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
February 2015 Issue No: 5.2 CESG Certification for IA Professionals Issue No: 5.2 February 2015 The copyright of this document is reserved and vested in the Crown. This document may not be reproduced or
Thales Service Definition for Cyber Incident Response - Critical Thales Service Definition for Cyber Incident Response - Critical for Cloud Services April 2014 Page 1 of 7 Thales Service Definition for
Contents 1 Fast track and direct entry degrees 2016 2017 undergraduate and postgraduate pathways Take your development to the next level University routes for holders of: CII Advanced Diploma in Insurance
Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
January 2015 Issue No: 2.1 Guidance to Issue No: 2.1 January 2015 The copyright of this document is reserved and vested in the Crown. This document may not be reproduced or copied without specific permission
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
UNIVERSITY OF YORK POSTGRADUATE PROGRAMME SPECIFICATION This document applies to students who commence the programme(s) in: Awarding institution University of York Department(s) Computer Science Award(s)
OFFICIAL Certified Master s Briefing Meeting 14 April 2014 Certification of Master s Degrees Providing a General Broad Foundation in Cyber Security Chris Ensor Michael Kirton Ellie England Graeme Dykes
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September
School of Management MBA in International Management Section 1 2014-2015 1 Contents Page MBA INTERNATIONAL MANAGEMENT AT THE SCHOOL OF MANAGEMENT... 1 DIRECTOR OF MBA INTERNATIONAL MANAGEMENT PROGRAMME...
Child Psychology Final award Intermediate awards available UCAS code Details of professional body accreditation BSc (Hons) Cert. HE, DipHE, BSc C823 British Psychological Society Relevant QAA Benchmark
Programme Specification MSc Human Resource Management Valid from: September 2015 Faculty of Business SECTION 1: GENERAL INFORMATION Awarding body: Teaching institution and location: Final award: Programme
Part-time MSc in Cyber Security from Northumbria University masters.qa.com Thank you for your interest in Northumbria University s part-time MSc in Cyber Security programme, delivered in Central London
The International Institute for Business Analysis IIBA UK Chapter Skills and Career Paths Business Analysis Conference London September 2010 Visit our chapter website at http://uk.theiiba.org Your Starting
BCS-ISEB Business Analysis Training Qualifications and Training Explained 2012 1 BCS-ISEB Business Analysis Training Business Analysis is where business management skills and IT systems skills meet. It
CESG Certified Professional Verify your skills and competence in information assurance Now open to cyber security professionals working in UK industry CONTENTS 1. Introduction 2. IA in Context: Why Professionalism
your IT skills A guide to BCS Qualifications Who are BCS? Formed in 1957, the British Computer Society (BCS) is an international awarding body for qualifications. BCS is also recognised as a leading professional
Programme Specification Title: Accountancy and Finance Final Award: Bachelor of Arts with Honours (BA (Hons)) With Exit Awards at: Certificate of Higher Education (CertHE) Diploma of Higher Education (DipHE)
Cyber Security Skills Business perspectives and Government s next steps March 2014 Contents Foreword... 3 Executive Summary... 4 Chapter 1: Introduction... 8 Chapter 2: Key Findings... 11 Chapter 3: NCSP
Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Nottingham Business School/City 3. Final Award, Course Title
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
Criteria for the Accreditation of DBA Programmes 1 1 INTRODUCTION 1.1 This document sets out the criteria for DBA programme accreditation. While setting the standards that accredited provision is expected
Masters with a purpose Taught postgraduate employability and employer engagement Summary report Postgraduate employers 1 1 Contents INTRODUCTION 2 MAIN FINDINGS 3 1. POSTGRADUATE EMPLOYERS 4 What do employers
Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others
Highlands Opportunities Achievement Success IN Information Technology for Business Degrees Introduction Plymouth University in partnership with Highlands College offers unrivalled expertise and experience
The UK Cyber Security Strategy Report on progress December 2012 Forward Plans We are at the end of the first year of meeting the objectives outlined in the National Cyber Security Strategy. A great deal
PROGRAMME SPECIFICATION DOCUMENT SECTION ONE: GENERAL INFORMATION Programme Title/ Subject Title: Master of Public Health Award title and Interim awards: Postgraduate Certificate in Public Health Postgraduate
Script The September 2013 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST CREST in Australia Also Inside Update from Ian Glover CESG and CPNI launch new schemes CRESTCon 2014 The CCP Report New Members
Programme Specification MRes Developmental Psychology Valid from: September 2012 Faculty of Health & Life Sciences SECTION 1: GENERAL INFORMATION Awarding body: Teaching institution and location: Final
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
P053 Issues Associated with Professional Accreditation of UK Master s Programmes J.L. Horner (firstname.lastname@example.org) Loughborough University, UK Abstract: Traditionally in the UK, the Professional Engineering
Guidelines for Professional Library/Information Educational Programs These guidelines were endorsed by the IFLA Professional Committee at its meeting in August 2012 Executive summary These guidelines replace
Cyber Security Skills: a guide for business Getting involved with skills and research initiatives December 2014 2 Contents Introduction... 3 Executive Summary... 4 Initiatives supporting schools... 8 Secure
Careers in Cryptology, codes, code-breaking and encryption (Developed from AGCAS link enquires, January 2011) A summary of information received from numerous Careers Services regarding codes, code-breaking
Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics
School of Management MSc in International Management Postgraduate Student Handbook Section 1 2015-2016 1 Contents Page MSC INTERNATIONAL MANAGEMENT AT THE SCHOOL OF MANAGEMENT... 1 PROGRAMME DIRECTOR...
1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.
Bachelor of Information Technology [ Network security] Information for International Students www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security] Cybercrime is
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
SCHOOL OF ENGINEERING AND BUILT ENVIRONMENT MSc International Project Management PROGRAMME SPECIFICATION October 2015 GLASGOW CALEDONIAN UNIVERSITY PS1 Programme Specification Pro-forma 1. GENERAL INFORMATION
Document Control Information Document Details Document Name Purpose of Document Document Version Number 3.0 Document Status Document Owner Prepared By ITIL Service Management Practices: V3 Qualifications
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
College of Business BSc (Hons) Logistics Management (Top-Up) Programme Specification Commencing September 2014 JACS code N100 Programme Code UN1AW Valid for delivery at University of Derby Kedleston Road
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Masters in Information Security and Risk Award MSc School Informatics Department or equivalent Centre for Software Reliability Programme
OTHER Standards of university teaching Paul Glaister 1 & Elizabeth M Glaister 2 1 Department of Mathematics and Statistics, University of Reading, Reading, UK 2 Kendrick School and University of Reading,
Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: Law/City 3. Final Award, Course Title and LLM Legal Practice
Introduction Atos is an international information technology services company with annual 2011 revenue of EUR 8.5 billion and 74,000 employees in 48 countries. Serving a global client base, it delivers
Cyber Security Skills: a guide for business Getting involved with skills, knowledge and capability initiatives March 2014 Contents Introduction... 3 Index... 4 Initiatives supporting schools... 5 Initiatives
2004-2005 Catalog Addendum New Program Master of Science in Information Assurance This Walsh College Master of Science in Information Assurance degree combines theory with applied learning enabling security
ABOUT THE IMM GRADUATE Registration Status The IMM Graduate School of Marketing (IMM GSM) is registered with the Department of Higher Education and Training (DHET) as a private higher education institution
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the
Policy Paper Corporate Governance and Risk Management Agenda Introduction This Agenda sets out the corporate governance and risk management principles and aims which inform and guide the work of ACCA s