Information Systems Security Engineering Professional (ISSEP)



Similar documents
Information Security Principles and Practices

The Value of Information Security Certifications

Security Transcends Technology

The Next Generation of Security Leaders

Shon Harris s Newly Updated CISSP Materials

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

Certification and Training

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Information Systems Security Engineering: A Critical Component of the Systems Engineering Lifecycle

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

Certification for Information System Security Professional (CISSP)

Access FedVTE online at: fedvte.usalearning.gov

UNCLASSIFIED NATIONAL POLICY ON CERTIFICATION AND ACCREDITATION OF NATIONAL SECURITY SYSTEMS UNCLASSIFIED. CNSS Policy No.

Understanding the Federal IT Security Professional (FITSP) Certification

Committee on National Security Systems

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Policy on Information Assurance Risk Management for National Security Systems

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

WHY YOU SHOULD NOT GET A CISSP. Timmay, with a dose of Jericho

LINUX / INFORMATION SECURITY

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Systems Security Certificate Program

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Hosted by Lunarline: School of Cyber Security

FITSP-Auditor Candidate Exam Guide

TOPSECRETPROTECTION.COM (TSP)

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

Certified Disaster Recovery Engineer

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL F. Scot Anderson, CISSP April 7, 2009 V 1.

Work Toward Your Bachelor s Degree

The Premier IA & Cyber Security Training Specialist

CERTIFIED DISASTER RECOVERY ENGINEER

FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

Sabbatical Leave Application

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

LUNARLINE: School of Cyber Security. Dedicated to providing excellence in Cyber Security Training Certifications. ISO 9001: 2008 Certified

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

An expert s tips for cracking tough CISSP exam

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

DoD Directive (DoDD) 8570 & GIAC Certification

IT Security Management 100 Success Secrets

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Forensic Certifications

SENIOR SYSTEMS ANALYST

Certification. Is it Right for You? 2013 Micron Technology, Inc. February 12, 2014

1: Paralegal CORE Competency Exam (Credential earned upon successful completion of the exam is CORE Registered Paralegal (CRP) ) CORE stands for:

CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL PDF

ISO 27001:2005 & ISO 9001:2008

Commercial Solutions for Classified (CSfC) Customer Handbook Version 1.1

UNCLASSIFIED. Trademark Information

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

CISSP Common Body of Knowledge Review Information Security Governance & Risk Management Domain Version: 5.10

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

Raytheon Secure Systems and Networks

(ISC)² Foundation Announces 2014 Information Security Scholarship Recipients

CompTIA Continuing Education User Guide

Health Information Management Baccalaureate Degree 2014 AHIMA REQUIRED COMPETENCIES

Comparison of National Level Paralegal Certification Exams

Gibson, Dixon, Abrams Convergent evolution of health informatics and information management Appendix A. Appendix A. Summary of HIM and HI Credentials

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.

InfoSec Academy Application & Secure Code Track

Department of Defense INSTRUCTION

Information Security Specialist Training on the Basis of ISO/IEC 27002

WCA WEBINAR SERIES: The Case for Cyber Security Training

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Career Paths in Information Security v6.0

Transcription:

Information Systems Security Engineering Professional (ISSEP) 1

Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 2

Systems Security Engineering Definition The art and science of discovering users security needs and designing and making, with economy and elegance, (information) systems so that they can safely resist the forces to which they may be subjected. 3

Systems Security Engineering Process DISCOVER NEEDS ASSESS EFFECTIVENESS DEFINE SYSTEM REQUIREMENTS DESIGN SYSTEM ARCHITECTURE PLAN TECHNICAL EFFORT MANAGE TECHNICAL EFFORT USERS/USERS REPRESENTATIVES DEVELOP DETAILED DESIGN IMPLEMENT SYSTEM 4

Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 5

Why was the ISSEP created Enhance the field of information systems security engineering Promote a common process NSA/IAD has committed itself to promoting this certification to its employees and vendors 6

Why was the ISSEP created (continued) Fill a need that NSA has identified to recommend and use approved contractors to support our customers While a specific policy statement has not been issued at this time, it is not known if the NSA/IAD will require, or simply prefer, individuals with the ISSEP in connection with certain information assurance projects 7

Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 8

Development of the ISSEP Joint effort with NSA/IAD and International Information Systems Security Certification Consortium, Inc. (ISC) 2 Initiated in April 2002 Test development started in October 2002 First exam available in June 2003 9

NSA s Role NSA/IAD provides the Subject Matter Experts Motivation and justification for this project is found in NSD 42 and the Federal Technology Transfer Act of 1986 (15 U.S.C. Section 3710A) 10

(ISC) 2 s Role (ISC) 2 will own and manage the certification The development of concentration examinations is a direct response to (ISC)² research indicating that these needs of information security professionals were not being met. 11

Candidates for the ISSEP Candidates for the ISSEP will have to successfully complete the Certified Information Systems Security Professional (CISSP) exam and be in good standing The Common Body of Knowledge (CBK) covered by the 10 domains is considered foundational to the role of the ISSE 12

CISSP Domains Security Management Practices Security Architecture and Models Access Control Systems & Methodology Application Development Security Operations Security Physical Security Cryptography Telecommunications, Network, & Internet Security Business Continuity Planning Law, Investigations, & Ethics 13

Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 14

What the ISSEP Covers The ISSEP exam will include the additional domains of: Systems Security Engineering Certification and Accreditation Technical Management U.S. Government Information Assurance Regulations 15

Systems Security Engineering Process 1. Describe the Information Systems Security Engineering (ISSE) process as documented in the Information Assurance Technical Framework (IATF). (Knowledge) 2. Describe systems engineering processes in general and infer how security engineering integrates with these processes. (Comprehension) 3. Construct network architectures according to the principle of Defense-in-Depth. (Application) 4. Construct proper documentation for each phase of the ISSE process. (Application) 16

Certification and Accreditation Sub-Domains 1. Definitions 2. Applicability to U.S. Government agencies 3. NIACAP, DITSCAP, Risk Management/Assessment 1. Describe the National Information Assurance C&A Process (NIACAP) and the Department of Defense Information Technology Security C&A Process (DITSCAP). (Knowledge) 2. Explain key roles in the C&A process. (Comprehension) 3. Differentiate the applicability of U.S. Government regulations with respect to C&A. (Analysis) 17

Sub-Domains Technical Management 1. Plan technical effort 2. Manage technical effort 1. Identify the responsibilities of a program manager. (Knowledge) 2. Describe processes and tools used to manage technical efforts. (Knowledge) 3. Predict personnel, funding, and other needs based on the level of effort and technical complexity of the project. (Comprehension) 18

U.S. Government IA Regulations Sub-Domains 1. National policies Committee on National Security Systems (CNSS) 2. Civil agency policies 3. Defense agency policies 1. Define common IA terminology used by the U.S. Government. (Knowledge) 2. Interpret all regulations dictating IA requirements for civil and defense agencies. (Application) 19

Presentation Outline What is ISSE Why ISSEP Development of the ISSEP Concentration Content Certification Specifics 20

Training Availability Training is available The course is two days and covers the four new domain areas 21

When and Where the ISSEP Exam is Available As of 1 June 2003, candidates can request to take the ISSEP exam on a space available basis wherever the CISSP exam is being administered 22

Cost of the Exam and Credential The introductory cost of the exam is $295.00 The annual maintenance fee for the credential is $35.00 There are no additional Continuing Professional Education (CPE) requirements, but 20 of your 120 required CPEs must be in the new domain areas 23

For More Information (ISC) 2 website for the study guide and test dates and locations www.isc2.org NSA website for more information on efforts of the Information Assurance Directorate www.nsa.gov 24