Certification and Training



Similar documents
Information Security Principles and Practices

Security Transcends Technology

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

The Value of Information Security Certifications

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Forensic Certifications

Information Security Specialist Training on the Basis of ISO/IEC 27002

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

State of South Carolina InfoSec and Privacy Career Path Model

ISQ Handbook. Security. Information. Qualifications. An in-depth coverage of vendor and vendor-neutral qualifications

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Shon Harris s Newly Updated CISSP Materials

IT S A FUNNY THING ABOUT OFFICIAL CERTIFICATES

Access FedVTE online at: fedvte.usalearning.gov

Certification for Information System Security Professional (CISSP)

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Work Toward Your Bachelor s Degree

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

FedVTE Course Library

ISO 27001:2005 & ISO 9001:2008

Information Systems Security Certificate Program

WCA WEBINAR SERIES: The Case for Cyber Security Training

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.

Information Systems Security Engineering Professional (ISSEP)

FedVTE Course Library

Kris Madura, MBA, PMP. Security Program Manager

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

Field of Study Area of Expertise Certification Vendor Course

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

Application for CISM Certification

SECURITY CERTIFICATIONS

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

How To Become A Security Professional

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

DoD Directive (DoDD) 8570 & GIAC Certification

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

LINUX / INFORMATION SECURITY

Understanding the Federal IT Security Professional (FITSP) Certification

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

EVOLUTION OF THE CISO

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

INF3510 Information Security University of Oslo Spring Lecture 1 Course Information Background and Basic Concepts

InfoSec Academy Application & Secure Code Track

The National Skills Academy for IT. Cyber Security

COURSE SYLLABUS BMIS 342 CYBER SECURITY

Career Paths in Information Security v6.0

Candidate s Guide to the CISM Exam and Certification

Executive Management of Information Security

The Next Generation of Security Leaders

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

System Audit Framework

InfoSec Academy Forensics Track

ISACA. Trust in, and value from, information systems.

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

foresightconsulting.com.au

Information security governance has become an essential

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS

Security Management & Security Planning

Certified Business Analysis Professional (CBAP) Certification

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Tom VAN DEN EYNDE CISSP, CISA, CISM

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Healthcare Privacy and Security: Workforce Competency. #privacysummit. Sean Murphy CISSP, ISSMP, HCISPP March 7, 2014

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

JAMES R. SWAUGER Digital Forensic Examiner

Certified Information Security Manager 2011 Candidate s Guide to the CISM. Exam and Certification

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

MANAGEMENT DEVELOPMENT COURSES

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

APEC Guide to Information Security Skills Certification. Booklet

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

Chapter 7 Securing Information Systems

Transcription:

Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551)

Outline Organizational information security personnel In general At OSU Professional information security certification

Information Security Personnel Org Chart Figure 11.2. Positions in Information Security (redrawn)

Information Security Personnel (2) Chief security officer (CSO): Head of security, reports to CIO and execs Manages org s infosec program and policies Works on strategic, tactical, operational plans Handles security budgeting, personnel Usually needs college degree and CISSP Security manager: handles org s infosec program on a daily basis Develops/implements policies under CSO s guidance Monitors progress of organization s infosec program Handles incident response, disaster recovery, risk assessment Usually needs college degree, CISSP Security technician: deploys/manages firewalls, IDSs, etc. under security manager s guidance

OSU Information Security Personnel Org Chart Varies from the previous, general org chart OSU CIO Office has 9 divisions: customer experience, learning tech, etc. Only the division encompassing infosec at OSU is shown Source: https://orgchart.osu.edu/organization/ocio

Professional Certifications Information System Audit and Control Association (ISACA) Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Int l. Information Systems Security Certification Consortium (ISC)² Certified Information System Security Professional (CISSP) System Security Certified Practitioner (SSCP) Int l. Information System Forensics Association (IISFA) Certified Information Forensics Investigator (CIFI) Many require candidates have professional security experience/ college degree, no criminal record

Other Certifying Organizations System Administration, Networking, and Security Institute (SANS) Global Information Assurance Certification (GIAC) Information System Security Association (ISSA) American National Standards Institute (ANSI) Computer Professional for Social Responsibility (CPSR) Companies: Microsoft, Cisco, etc. (vendor-specific) Int l. Society of Forensic Computer Examiners (ISFCE) CompTIA: A+ certs (vendor-neutral)

CISSP Concentrations Information System Security Architecture Professional (ISSAP): Concentration in Architecture Information System Security Engineering Professional (ISSEP): Concentration in Engineering Information System Security Architecture Professional (ISSMP): Concentration in Management

CISA Exam Content Areas CISA Exam (Six Domains) IS Audit Process (10%) IT Governance (15%) Systems and Infrastructure Life Cycle (16%) IT Service Delivery and Support (14%) Protection of Information Assets (31%) Business Continuity and Disaster Recovery (14%)

CISM Exam Content Area CISM Exam (Five Domains) Information Security Governance (21%) Risk Management (21%) Information Security Program Management (21%) Information Security Management (24%) Response Management (13%)

CISSP Exam Content Area (1) CISSP Exam (10 Domains) Access Control Systems and Methodology Applications and Systems Development Security Business Continuity Planning (BCP), Disaster Recovery Planning (DRP) Cryptography Law, Investigation and Ethics Operations Security Physical Security Security Architecture and Models Security Management Practices Telecommunications and Network Security

SSCP Exam Content Area SSCP Exam (7 Domains) Access Control Administration Audit and Monitoring Cryptography Data Communications Malicious Code/Malware Risk, Response and Recovery

CIFI Exam Content Area CIFI Exam (6 Domains) Auditing Incident Response Law and Investigation Tools and Techniques Traceback Countermeasures

Figure 11-3

Training, Seminars and Conferences http://www.issa.org/ http://www.isaca.org/ https://www.isc2.org http://www.ansi.org/ http://www.sans.org/ http://www.giac.org/ http://www.infoforensics.org

Professional Publications ISACA Information Systems Control Journal (ISC) 2 The (ISC) 2 Journal (Information Systems Security) ISSA The ISSA Journal

Chapters and Membership Chapters: local and worldwide Membership ISACA is a leading information technology organization representing more than 50,000 individual members in more than 140 countries. ISSA has over 13,000 members worldwide

Summary Infosec personnel generally include CSO, security manager, and technicians Real-world org charts may vary Professional organizations offer infosec certs Recommendations: CIS/CSE Majors: CISSP (most prestigious) SSCP MIS (College of Business) CISA CISM