Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board
|
|
|
- Ronald Daniel
- 10 years ago
- Views:
Transcription
1 Update on the CSSLP And its Impact on the SDLC Profession Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board
2 (ISC)² Built the largest, most comprehensive Software Security Body of Knowledge (Certified Secure Software Lifecycle Professional) CSSLP Incorporated are: Public Standards: NIST,OWASP, ISO 2700x, PCI-DSS, etc. Corporate Best Practices: Symantec, Cisco, Microsoft, Xerox, SRA International, Boeing Industry Associations and Advisory: SAFEcode, RSA, SANS, ISSA, BASDA, DSCI (NASSCOM) Government Standards: Department of Homeland Security / Software Assurance Initiative
3 Certified Secure Software Lifecycle Professional (CSSLP) Domains (ISC)² CSSLP CBK Domains Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation/Coding Secure Software Testing Software Acceptance Software Deployment, Operations, Maintenance, and Disposal
4 Current CSSLP Statistics CSSLP Credential Holders: 935 certified 250 took the education program in sat for the exam in 2010 CSSLP Organizations Demographics: Banking Aerospace Government Mobile Phone Manufacturers Insurance Consulting Firms Software Security Companies Software Manufacturers
5 CSSLP Statistics (Cont.) CSSLP Education Program Reviews: CSSLP course is consistently being touted as graduate level material in written reviews submitted by participants Course Evaluation Statistics: 5 being Excellent and 1 being Poor (of 203 respondents) - Avg. Quality of Course Materials: Rated Avg. Quality of Course Instructor: Rated 4.8
6 CSSLP Statistics (Cont.) Job Titles of CSSLPs : Sr. Software Developer/Analyst/Architect/Engineer Application Security Architect/Engineer/Analyst Lead Software Engineer Project Manager CISO CSO Consultant Information Assurance Manager/Analyst/Architect
7 CSSLP Statistics (Cont.) Job boards listing CSSLP as required or preferred: Chase Boeing JP Morgan Serco Dell Citi EMC HP Lockheed Martin CSC Fortify Shire Pharmaceutical
8 How the SwA Community Can Use the CSSLP
9 Why the CSSLP? Building secure software, along with writing secure code, is critical now! Software Assurance has kaleidoscope of perspectives to be factored into secure software lifecycle. First line of defense is qualified and educated personnel who know how to write secure code that meets security requirements, including design, testing, deployment, and ultimately disposal of software.
10 CSSLP CBK Overlap between Other Certifications/Programs GSSP-C (SANS) Software Coder Certification Program GSSP-J (SANS) Software Coder Certification Program CSSE (ISSECO) Entry-level Education Program Certificate of Completion CSSLP (ISC)² Professional Certification Program Software Assurance Initiative (DHS) Awareness Effort Vendor- Specific Credentials
11 Software Lifecycle Stakeholder Chart Client Side PM Industry Group Delivery Heads Business Analysts Auditors Top Management Software Lifecycle Stakeholders Business Unit Heads IT Manager Security Specialists Testers Quality Assurance Managers Technical Architects Developers/ Coders Project Managers/ Team Leads
12 CSSLP Certification Requirements By Examination: Process Public exams available worldwide through PearsonVUE Candidate must submit: Completed examination registration form Proof of 4 years experience in the Software Development Lifecycle (SDLC) or 3 years experience with a one year waiver for 4-year degree or equivalent in an IT related field Pay a fee of $549 (early-bird) or $599 (standard) Candidate must Pass the official (ISC)² CSSLP certification examination Complete the endorsement process Maintain their CSSLP status with CPE s
13 What s Next for the CSSLP?
14 Progress of the CSSLP ANSI Accreditation Achieved Oct 2010 (ISC)² Application Security Advisory Board Established Nov 2010 Andreas Fuchsberger, CISSP-ISSAP, CSSLP, Royal Halloway, University of London, and security, privacy and identity standards lead, Microsoft Corp. Sharon Hagi, CISSP, CSSLP, IBM Paco (Brian) Hope, CISSP, CSSLP, Cigital Ajoy Kumar, CSSLP, JP Morgan Chase Robert Lai, CISSP-ISSAP, ISSEP, CAP, CSSLP, SAIC Glenn Leifheit, CSSLP, FICO and ASAB co-chair Anthony Lim, CSSLP, Asia-Pacific, Rational Software, Suntec Alessandro Moretti, CISSP, CSSLP, UBS Dr. Yiannis Pavlosoglou, UBS Hart Rossman, CSSLP, SAIC Bola Rotibi, CEng, Creative Intellect Consulting Ltd. Dave Stender, CISSP, CAP, CSSLP, U.S. Internal Revenue Service Dr. Vehbi Tasar, CISSP, CSSLP, (ISC)² and ASAB co-chair Richard Tychansky, CISSP-ISSEP, CAP, CSSLP, Lockheed Martin Corp. Further details on the AppSec Advisory Board can be found at
15 Future for the CSSLP DoD 8570 Mandate Sponsorship Received Associate Designation Anticipated Working to align the CSSLP curriculum with SEI Cert Undergraduate and Masters level Software Assurance Curriculum Model
16 For more information, please contact: David W. Stender, CISSP CSSLP CAP Glenn Johnson, (ISC)² Corporate Accounts Manager Lead CSSLP Consultant Visit
Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008
Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
Information Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Information Systems Security Engineering Professional (ISSEP)
Information Systems Security Engineering Professional (ISSEP) 1 Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2 Systems Security Engineering
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
WCA WEBINAR SERIES: The Case for Cyber Security Training
WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
Investor Presentation
Investor Presentation Symbol: VCT Exchange: CSE Shares Issued (Post Merger): 95,801, 907 Industry: Supplier of technology solutions to major defense contractors Established:1989 Revenue (2013): US $34M
IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES
IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES 1 2 THIS ONE PROVES YOU'RE HERE. THIS ONE SHOWS YOU'VE ARRIVED. 3 FROM GRADUATION TO RETIREMENT, (ISC) 2 FAST TRACKS CAREERS IN INFORMATION SECURITY. Secure
BHEF s National Higher Education and Workforce Initiative
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
Security Certifications. A Short Survey. Welcome. Stan Reichardt [email protected]
Security Certifications A Short Survey Welcome Stan Reichardt [email protected] Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily
The National Skills Academy for IT. Cyber Security
The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING
All about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
Understanding the Federal IT Security Professional (FITSP) Certification
Understanding the Federal IT Security Professional (FITSP) Certification Jim Wiggins Executive Director Federal IT Security Institute ISACA NCAC Conference Certification and Emerging Standards Holiday
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES
(ISC) 2 CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES 2015 (ISC)² CPE Policies & Guidelines (Rev. 10, April 21, 2015) 2015 International Information Systems Security Certification Consortium,
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
Kris Madura, MBA, PMP. Security Program Manager [email protected]
Kris Madura, MBA, PMP Security Program Manager [email protected] Security+ Description Foundation-level vendor-neutral benchmark certification validating the knowledge and experience of the foot
How To Become A Security Professional
Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided
State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO
Policy: Information Security Audit Program Issued by the CTO Policy No: WVOT-PO1008 Issue Date: 08.01.09 Revised: Page 1 of 12 1.0 PURPOSE The West Virginia Office of Technology (WVOT) will maintain an
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Practical Applications of Software Security Model Chris Nagel
Practical Applications of Software Security Model Chris Nagel Software Security Consultant Fortify Software Introductions About Me: Chris Nagel Software Security Consultant With Fortify for 2+ Years Before
Certification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
HEALTH INFORMATION MANAGEMENT (HIM) HUMAN RESOURCE PACKAGE
HEALTH INFORMATION MANAGEMENT (HIM) HUMAN RESOURCE PACKAGE Revised July 2013 TABLE OF CONTENTS Historical Background Education and Registration Mandate of the Canadian College of HIM 1 How Does the Organization
Cover/Signature Page Full Template
Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &
THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT
1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT IAPP KnowledgeNet Presentation Boston, April 24, 2012 About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President and CTO
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
Tableau Dashboard for Maximo 15-AUG-13
Tableau Dashboard for Maximo 15-AUG-13 Today s Agenda Introductions Triad Corporate Overview Tableau Software Overview Maximo Dashboard Demo Building a Maximo Dashboard Demo Packaged Offering Who to Contact
Pharmacist Education & Training
Overview The credentialing model for pharmacists Some history related to credentialing of pharmacy technicians Discussions in Pharmacy Other countries, other professions, other occupations A credentialing
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org
Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
IT Privacy Certification
IT Privacy Certification Program Introduction copyright 2011, IAPP Overview The Certified Information Privacy Professional/Information Technology (CIPP/IT) is the newest credentialing initiative from the
(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients
NEWS FOR IMMEDIATE RELEASE Media Contact: Alex Lyons Merritt Group, Inc. 703-390-1527 [email protected] (ISC)² Foundation Announces 2014 Information Security Scholarship Recipients 33 recipients of
IT and Cybersecurity. Workforce Development with CompTIA Certification
IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting
GIAC Program Overview 2015 Q4 Version
GIAC Program Overview 2015 Q4 Version Program Overview - GIAC Certification 2015 1 What is GIAC? GIAC is the Global Information Assurance Certification program GIAC assesses candidate knowledge in specific
Partnering Excellence
s in Best Practice ing Excellence A New Format for Learning and Embedding Best Practices into your Business www.phoenixcg.com 1 888 848 9514 Page 0 www.phoenixcg.com 1 888 848 9514 Embracing ing Excellence
Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036. Direct: 202.747.3483 agarg@thinkbrg.
Curriculum Vitae Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C. 20036 Direct: 202.747.3483 [email protected] SUMMARY Amit Garg brings over 17 years of information
NOVEMBER DEFENSE & FEDERAL TECHNOLOGY MARKET UPDATE
NOVEMBER DEFENSE & FEDERAL TECHNOLOGY MARKET UPDATE Aronson Capital s, LLC 805 King Farm Boulevard, Suite 300 Rockville, Maryland 20850 Tel: (301) 231-6200 Fax: (301) 231-7630 Philip J. McMann Tel: (301)
BilgeAdam IT Services
IT SERVICES BilgeAdam IT Services BilgeAdam, founded in 1997, is the leading IT services company, headquartered in Istanbul-Turkey with an international span since 2007. IT services are: Consulting Training
Certification Programs
Professional Certification Programs Barcelona October 2012 Steve Philp Marketing Director The Open Group People Certification Programs Method TOGAF and ArchiMate Skills and Experience Open CA and Open
CompTIA Certification Renewal Policy and Continuing Education (CE) Program. Kyle Gingrich Senior Director, Product Management kgingrich@comptia.
CompTIA Certification Renewal Policy and Continuing Education (CE) Program Kyle Gingrich Senior Director, Product Management [email protected] CompTIA s Mission Our Mission Educate The IT Community
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
Forensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
Microsoft SQL Server and Oracle Database:
Microsoft SQL Server and Oracle Database: A Comparative Study on Total Cost of Administration (TCA) A case study on the comparative costs of database administration for two of the premier enterprise relational
The Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
A Blueprint for: Microsoft Dynamics CRM Success
A Blueprint for: Microsoft Dynamics CRM Success An I.B.I.S., Inc. Whitepaper by Clinton Weldon VP, Professional Services Kevin Johnson VP, Professional Services I.B.I.S., Inc. 2015 All Rights Reserved.
Shon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
A Blueprint for Business Software Implementation Success
A Blueprint for Business Software Implementation Success An I.B.I.S., Inc. Whitepaper by Kevin Johnson VP, Professional Services Clinton Weldon VP, Professional Services I.B.I.S., Inc. 2015 All Rights
Cybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
TOPSECRETPROTECTION.COM (TSP)
TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over
An expert s tips for cracking tough CISSP exam
35 / 83 Chapter 6 An expert s tips for cracking tough CISSP exam Rahul Kokcha, an experienced instructor for CISSP explains how to prepare for the CISSP exam, what are important topics, and what you do
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Business Analysis. Business Analysis Certification Preparation, Training & Corporate Workshops. featuring
A Business Analysis Certification Preparation, Training & Corporate Workshops featuring Susan Levine Peter Johnson, CBAP www.linkedin.com/in/peterjohnsoncbap Business Analysis Certification Training from
(ISC) 2 2011 Congress Schedule of Events (All events will take place at the Orange County Convention Center, unless otherwise stated.
(ISC) 2 2011 Congress Schedule of Events (All events will take place at the Orange County Convention Center, unless otherwise stated.) Friday, September 16 8:00 am 5:30 pm CPP, PCI and PSP Certification
Bilge Adam IT Services
Bilge Adam IT Services Bilge Adam, founded in 1997, is the leading IT services company, headquartered in Istanbul-Turkey with an international span since 2007. With its highly skilled professionals, commitment
The IPSJ Model of IT Professional Certification
The IPSJ Model of IT Professional Certification Akira Shibata Chair Committee of the Certification of Individuals, Information Processing Society of Japan q Foundation m Year 1960 q President Introduction
Table of Contents. The Case for SharePoint. SharePoint with an Agile Execution. Typical LASER Project. Build the Right Solutions/ Solutions Right
L A R G E A G I L E S H A R E P O I N T E N T E R P R I S E R O L L O U T Table of Contents 0 1 The Case for SharePoint 06 LASER 02 Challenges 07 How it Works 03 SharePoint with an Agile Execution 08 Typical
Enterprise Class IT Solutions and Services
Enterprise Class IT Solutions and Services Our success is not simply about what we can do for our customers it s about how we do it Consultancy & sales teams providing a response within two hours Expertise
Understanding the Federal Cyber Security Professional (FCSP) Certifications
Understanding the Federal Cyber Security Professional (FCSP) Certifications Introducing a new set of performance-based credentials from the Federal IT Security Institute First Public Draft Copyright 2010-2011
BMS Consulting Cyber Security and IT Technology Team
BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications
SearchSecurity.com's IT security certifications guide 1 of 18 Check out the other guides in this series: Guide to information security certifications SearchSecurity.com's guide to vendor-neutral security
Agile Training and Certification Options. David Hicks
Agile Training and Certification Options David Hicks Agile Business Conference London 2011 David Hicks RADTAC Founder & Director Specialist in Lean and Agile since 1998 Agile Alliance Founder Member in
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
from PKI to Identity Assurance
from PKI to Identity Assurance Richard Trevorah Technical Manager tscheme Ltd Tel: +44 (0)7818 094728 [email protected] What is tscheme? tscheme is a not-for-profit membership organisation chartered
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
IBM Project Management Competency -Overview
IBM Project Management Competency -Overview Jane Peng Executive Project Manager, PM Competency Business Consulting Services, Greater China Group 10/23/2003 Topics included in today's presentation What
