IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules



Similar documents
Information Systems Security Certificate Program

The Next Generation of Security Leaders

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Brandman University. School of CCNA

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

LINUX / INFORMATION SECURITY

Certification for Information System Security Professional (CISSP)

Principles of Information Assurance Syllabus

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

IT and Cyber Security Training Courses

Hackers are here. Where are you?

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

IT Security Management 100 Success Secrets

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Security Transcends Technology

InfoSec Academy Application & Secure Code Track

Table of Contents. Introduction. Audience. At Course Completion

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Field of Study Area of Expertise Certification Vendor Course

EC-Council Certified Security Analyst (ECSA)

CYBER SECURITY TRAINING SAFE AND SECURE

Computer Security and Investigations

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Microsoft Technologies

CAST Center for Advanced Security Training

EC-Council. Certified Ethical Hacker. Program Brochure

Access FedVTE online at: fedvte.usalearning.gov

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

(BDT) BDT/POL/CYB/Circular

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Hackers are here. Where are you?

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

Maryland Leaders Raise Concerns about Computer Forensic Shortages IN THIS ISSUE. School of Graduate and Professional Studies Issue:

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Analyze. Secure. Defend. Do you hold ECSA credential?

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Bellevue University Cybersecurity Programs & Courses

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Reducing Cyber Risk in Your Organization

Information Systems Technology & Cybersecurity Programs

Forensic Certifications

Certified Cyber Security Analyst VS-1160

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Certification Programs

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Welcome to the Tampa Bay Hi-Tech Training Online Overview

ITU-IMPACT Training and Skills Development Course Catalogue

Career Paths in Information Security v6.0

Networking: EC Council Network Security Administrator NSA

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM

State of IT Skills Gap

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Certification Programs

Middle Class Economics: Cybersecurity Updated August 7, 2015

e-discovery Forensics Incident Response

Welcome to the Tampa Bay Hi-Tech Training Online Overview

IT courses For Senior Managers

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

InfoSec Academy Forensics Track

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Better secure IT equipment and systems

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Minnesota State Community and Technical College Detroit Lakes Campus

Information Security Specialist Training on the Basis of ISO/IEC 27002

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

How To Get A Computer Hacking Program

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Transcription:

IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification Helps You Succeed Popular Security Certifications CompTIA Security + CompTIA Advanced Security Practitioner (CASP) EC-Council Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP)

Why IT Security Certification? A Serious Business Fear Drives the Demand October 26th, 2012: South Carolina taxpayer server hacked, 3.6 million Social Security numbers compromised. (CNN) -- The Social Security numbers of millions of South Carolinians, as well as credit and debit card information for hundreds of thousands, have been hacked in what the state's governor described as an international cyberattack. September 10 th, 2012: App publisher takes blame for massive Apple ID hack (CNN) -- A small digital publishing company said Monday it was the victim of a hack attack that resulted in the posting online of more than 1 million Apple user IDs last week. Hackers had originally claimed to have swiped the IDs from an FBI computer. June 8 th, 2012: Hackers breach LinkedIn, eharmony sites, stealing millions of passwords (CNN) -- The constant battle for Internet security saw another brazen attack this week as Russian hackers published millions of passwords they collected after hacking the professional networking site LinkedIn.

Why IT Security Certification? A Serious Business Fear Drives the Demand February 11 th, 2012: Hackers target CIA, Mexican, Alabama websites (CNN) -- Websites affiliated with the CIA, Mexico's mining ministry and the state of Alabama were down Friday, allegedly done in by hackers, government officials and a well-known hacking group reported. Within the past year, the Veterans Administration lost a laptop holding information on 26.5 million individuals, the Internal Revenue Service lost or misplaced 500 laptops, and Boeing reported the theft of a laptop with files that contained Social Security numbers for more than 300,000 of its past and present employees. THERE IS NO WAY TO KNOW WHO WILL BE NEXT!

Why IT Security Certification? High Demand for IT Security Professionals U.S. Agency Releases Cyber-Education (NICE) Plan The U.S. government will work to develop an unrivaled cybersecurity workforce and broaden the nation s pool of skilled cyberworkers under a draft cybersecurity education plan released by a U.S. agency, says PC World. ComputerWorld Security is the only area of certified IT skills that has never had a negative quarter throughout this entire recession. US Bureau of Labor Statistics / Office of Occupational Statistics and Employment Projections Computer Software Engineers and Computer Programmers Employment 2008 1,336,300 Employment 2018 1,619,300 (21% Growth) IT Jobs Thriving Despite Lackluster Economy Even in a tough labor market, IT is where the jobs are. The unemployment rate for technology jobs was 3.3% in June, compared with a 9.2% unemployment rate overall that month, according to the Bureau of Labor Statistics. Forrester Research reveals a mad rush for qualified IT Security talent Highest Paying IT Jobs CertMag Salary Survey Top Salary certifications: moving from top paying certifications being product related to top paying certifications being niche certifications like security certifications

Why IT Security Certification? Freedom to Make and Break Rules White Hat / Ethical Hacker Security Professionals get to use tools and techniques that would get the average person fired or arrested. Forensics As more and more breaches occur the need for skilled Cyber Detectives will increase exponentially. Policy Creation Security Professionals are actively involved in creating usage and access policy and procedures for organizations.

Benefits of Certification Certification Helps you Succeed Certification Assures a Minimum Knowledge Level This helps to facilitate, simplify, and shorten the hiring process. Vendor Neutral Certifications Provide Flexibility This type of certification validates your skill without tying you to a particular vendors products, giving you greater flexibility and an important advantage in the everevolving technology marketplace. Certification Credentials Provide a Competitive Advantage Both the certificate holder and the employer benefit from this.

Benefits of Certification Wide Spread Acceptance of Credentials Better Job Opportunities Since many recruiters and employers employ certification requirements, more opportunities are available to professionals with the right certifications. Career Enhancement Enhanced salary and career advancement opportunities exist for certified IT professionals According to Channel Insider CISSP Professionals can make in excess of $100,000 Internet.com says 53% of the computer security specialists surveyed by non-profit security professional organization (ISC)2 received a salary increase PayScale.com indicates that a Penetration Tester with a CEH certification earns from $40,243 to $118,176 annually PayScale.com indicates that a Forensic Computer Analyst with a CHFI certification earns from $44,219 to $88,089 annually

Popular IT Security Certifications CompTIA Security+: is an international, vendor-neutral certification that demonstrates competency in Network security Compliance and operational security Threats and vulnerabilities Application, data and host security Access control and identity management Cryptography

Popular IT Security Certifications Prerequisites: Basic Windows skills and a fundamental understanding of computer and networking concepts is required. CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP, are strongly recommended. Additional introductory courses or work experience in application development and programming or in network and operating system administration for any software platform or system are helpful but not required.

Popular IT Security Certifications Test Details Number of questions Length of test Passing score Recommended experience Languages Exam codes Maximum of 100 questions 90 minutes 750 (on a scale of 100-900) CompTIA Network+ certification and two years of technical networking experience, with an emphasis on security. English, Korean, German, Japanese SY0-301, JK0-018

Popular IT Security Certifications CompTIA CASP: The CompTIA Advanced Security Practitioner (CASP) certification designates IT professionals with advanced-level security skills and knowledge. Enterprise security Risk management Research and analysis Integration of computing communications

Popular IT Security Certifications Prerequisites: CompTIA Security + certification highly recommended. Technical hands on experience at the enterprise level 10 years experience in IT Administration highly recommended At least 5 years of hands-on technical security experience highly recommended.

Popular IT Security Certifications Test Details Number of questions Length of test Passing score Recommended experience Languages Exam codes Maximum of 80 questions 150 minutes Pass/Fail only. No scaled score 10 years experience in IT administration, including at least 5 years of hands-on technical security experience English CAS-001

Polls

Popular IT Security Certifications Certified Ethical Hacker: is a certification that delivers the latest tools and exploits to individuals in the network security discipline of Ethical Hacking from a vendor-neutral perspective. Gives IT Professionals the knowledge and skills required to identify, stop, defend and counter the actions of hackers trying to penetrate a company s network. Teaches IT Professionals to understand the way a hacker thinks and the tactics they employ in trying to penetrate corporate networks. As a result of this IT Professionals will be able to develop practical countermeasures and stay up-to-date on developments in information security and possible vulnerabilities.

Popular IT Security Certifications Prerequisites: Basic Windows skills and a fundamental understanding of computer and networking concepts is required. CompTIA Security + certification or equivalent work experience is strongly recommended Strong working knowledge of TCP/IP and Microsoft Windows Server products is also recommended

Popular Security Certifications Test Details Number of questions 150 Length of test 4 Hours Passing score 70% Exam code 312-50: Ethical Hacking / Countermeasures (CEH)

Popular IT Security Certifications Certified Information Systems Security Professional: is an independent information security certification governed by the International Information Systems Security Certification Consortium also known as (ISC)². It demonstrates knowledge of a common baseline of information security terms and principles that allows information security professionals worldwide to discuss, debate, and resolve matters pertaining to the profession. Demonstrates a working knowledge of information security. Confirms commitment to profession. Offers a career differentiator, with enhanced credibility and marketability. Affords you exclusive benefits as an (ISC)² member, including valuable resources such as peer networking and idea exchange. Fulfills government and organization requirements for information security certification mandates.

Popular IT Security Certifications Prerequisites: Minimum 5 years experience in direct full-time security work in 2 or more of the 10 domains listed below. Access Control a collection of mechanisms that work together to create security architecture to protect the assets of the information system. Telecommunications and Network Security discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality. Information Security Governance and Risk Management the identification of an organization s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines. Software Development Security refers to the controls that are included within systems and applications software and the steps used in their development. Cryptography the principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity. Security Architecture and Design contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability. Operations Security used to identify the controls over hardware, media and the operators with access privileges to any of these resources. Business Continuity and Disaster Recovery Planning addresses the preservation of the business in the face of major disruptions to normal business operations. Legal, Regulations, Investigations and Compliance addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence. Physical (Environmental) Security addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise s resources and sensitive information.

Popular IT Security Certifications Test Details Number of questions 250 Length of test 6 Hours Passing score 700 out of 1,000 possible points

Upcoming Webinars Free Webinar: Windows 8 for IT Pros! Free Webinar: Introduction to Windows 8 Development HTML5 Free Webinar: Microsoft SQL Server 2012 Managing Database Applications Free Webinar: Windows Server 2012 Server Management Free Webinar: Intro. to System Center Configuration Manager 2012 (SCCM) Free Webinar: Introduction to Windows 8 Development C# Free Webinar: Microsoft Dynamics AX 2012 The Complete ERP Solution Free Webinar: Lync Server 2013 Part 1 Features and Functionality Free Webinar: Windows 8 Virtualization Free Webinar: Lync Server 2013 Part 2 Architecture and Deployment Changes Free Webinar: Lync Server 2013 Part 3 Integration and Extensibility Sign up for free at: /webinars NetCom s Average Instructor Rating: 8.7/9

IT Security Classes CompTIA Security+: December 10 th in Arlington, VA & Live Online (Kindle Fire HD w/ course) December 17 th in New York City & Live Online (Kindle Fire HD w/ course) January 14 th in Las Vegas & Live Online Certified Ethical Hacking: December 10 th in New York City & Live Online (Kindle Fire HD w/ course) February 11 th in Las Vegas & Live Online March 4 th in Arlington, VA & Live Online CISSP: December 17 th in Arlington, VA & Live Online (Kindle Fire HD w/ course) January 14 th in New York City & Live Online Locations: Attend in-class or Live Online Instructor-led New York City, NY Las Vegas, NV (All Inclusive Travel Package) Arlington, VA Philadelphia, PA NetCom s Average Instructor Rating: 8.7/9

Webinar Raffle!

Q & A 1-888-5-NETCOM (563-8266) info@netcomlearning.com www.netcomlearning.com