SlideShare a Scribd company logo
CAREER ADVICE
FOR A CAREER IN IT AND CYBER SECUERITY
GETTING STARTED IN A NEW CAREER
•Get the lay of the land
• What are some of the best sources
• Trade publications
•Information saturation
• Get as much information as you can
• Different levels, different aspects
•What types of jobs are there
• What is the job market like
• What is the average pay
TOWARD A STABLE CAREER
•Your career rests on 4 legs
•Experience
•Certifications
•Education
•“Who you know”
YOUR CAREER PROFILE
7
3
0
10
20
30
40
50
60
70
80
90
100
Overall
Career
Score
60%
40% 50%
30%
50%
Educati
on
Certificatio
ns
Vendo
r
Neutra
l
Vendo
r
Specifi
c
Experience
SMB Enterpri
se
60%
CE Degre
e
YOUR CAREER PROFILE
40% 40%
10%
60%
15%
Educati
on
Certificatio
ns
Vendo
r
Neutra
l
Vendo
r
Specifi
c
Experience
SMB Enterpri
se
5
5
0
10
20
30
40
50
60
70
80
90
100
Overall
Career
Score
30%
CE Degre
e
YOUR CAREER PROFILE
10% 10%
60%
Educati
on
Certificatio
ns
Vendo
r
Neutra
l
Vendo
r
Specifi
c
Experience
SMB Enterpri
se
2
5
0
10
20
30
40
50
60
70
80
90
100
Overall
Career
Score
10%
CE Degre
e
CERTIFICATIONS
CYBER SECURITY CERTIFICATIONS
CISSP
CISM
CISSP
ISSMP
CAP CISA
GSNA
SSCP
CASP
Security+
CISSP
ISSEP/
ISSAP
CSSLP
Management /
Risk Audit
Software
Dev
Network /
Communicatio
ns
(ISC)2 CERTIFICATIONS
(ISC)2 International Information Systems Security
Certification Consortium, Inc.
Website: www.isc2.org
Certifications
Associate of (ISC)²
SSCP: Systems Security Certified Practitioner
CAP: Certified Authorization Professional
CSSLP: Certified Secure Software Lifecycle Professional
CISSP: Certified Information Systems Security Professional
CISSP Concentrations: ISSEP, ISSAP, ISSMP
Professional Certification
(ISC)2 certifications require ongoing continuing education to maintain
certification.
ISACA CERTIFICATIONS
Information Systems and Control Association (ISACA)
Certifications
CISA: Certified Information Systems Auditor
CISM: Certified Information Systems Manager
CGEIT: Certified in the Governance of Enterprise IT
CRISC: Certified in Risk and Information Systems Control
Website
www.isaca.org
Professional Certification
ISACA certifications require ongoing continuing education to maintain
certification.
COMPTIA CERTIFICATIONS
CompTIA certifications
Website: www.comptia.org
Certifications
A+ - Computer Support Technician
Network+ - Network Support Technician
Security+ - Entry level security certification
CASP - CompTIA Advanced Security Practitioner
RFID+ - RFID professionals
CTT+ - Certified Technical Trainer
Project+ - IT Project Management
Others: Server+, Linux+, CTP+, CDIA+, PDI+
SANS INSTITUTE CERTIFICATIONS
Website: www.giac.org
Certifications
GIAC (Global Information Assurance Certification)
GSNA (GIAC Systems and Network Auditor)
G7799 (GIAC Certified ISO-17799 Specialist)
GCFE (GIAC Certified Forensics Examiner)
GCFA (GIAC Certified Forensic Analyst)
GREM (GIAC Reverse Engineering Malware)
GLEG (GIAC Legal Issues)
GISP (GIAC Information Security Professional)
GCPM (GIAC Certified Project Manager Certification)
GISF (GIAC Information Security Fundamentals)
SANS INSTITUTE CERTIFICATIONS (CONT.)
Website: www.giac.org
Certifications
GIAC (Global Information Assurance Certification)
GSEC (GIAC Security Essentials Certification)
GWAPT (GIAC Web Application Penetration Tester)
GCED (Certified Enterprise Defender)
GCFW (GIAC Certified Firewall Analyst)
GCIA (GIAC Certified Intrusion Analyst)
GCIH (GIAC Certified Incident Handler)
GCWN (GIAC Certified Windows Security Administrator)
GCUX (GIAC Certified UNIX Security Administrator)
GPEN (GIAC Certified Penetration Tester)
GAWN (GIAC Assessing Wireless Networks)
DODD 8570
All IA (Information Assurance) jobs require
certification.
DODD 8570 (CONT.)
All IA (Information Assurance) jobs require
certification.
Level Qualifying Certifications
CND Analyst GCIA, CEH
CND Infrastructure
Support
SSCP, CEH
CND Incident Responder GCIH, GSIH, CEH
CND Auditor CISA, CEH, GSNA
CN-SP Manager CISM, CISSP-ISSEP
SECONDARY CERTIFICATIONS
• Project Management Professional – PMP (PMI)
• Project+ (CompTIA)
• ITIL V3 Foundation Certificate in IT Service Management
• Microsoft Operations Framework
• Six Sigma
USING LINKEDIN
DASHBOARD
CERTIFICATIONS
• List your current certifications
• Expired ones if applicable
• Helps with search
SKILLS
• Limited to 50
• Need to endorse other people
• Typically the more you endorse
the more likely you are to be
endorsed
• Don’t endorse skills for people
that don’t have them
• Again this comes up in searches
EDUCATION
• Be as complete as possible
• Add grades is applicable
• Don’t forget dates
• Don’t forget degree
• Add activities and societies if
applicable
• Consider listing classes
LIST COURSES
• You can add course from any
schools you have listed
• You may limit to relevant
classes related to your
profession
• Again may lead to you showing
up in a search
HONORS AND AWARDS
• Think of it as extra credit
• It may or may not help in
selection for interview
• Generally it doesn’t hurt
• Depending on the wording it
may help bring you to the top
of searches
VOLUNTEER
• Always considered a plus for
resumes
• Again betters your chances at
turning up in search results
EXTRA INFORMATION
• Add any professional
organizations you belong
to
• These are extra points in
your behalf
• Additional info, give
yourself a personality,
not just another resume,
a person
RECOMMENDATIONS
• Best way to get them is to give
them
• Again only give them to people
you know
• People that have the skills
• Sometimes applicants are not
allowed to turn in letters of
recommendation
• But you can give them a link to
your LinkedIn profile…
GROUPS
• Join ones related to
your career path
• You can only join 50
• So pick them wisely
• Look for groups with
more activity
GROUP DISCUSSIONS
• Being active in groups
is a good way to be
noticed
• Keep it professional
INTERACT – KEEP IN TOUCH
• Stay in touch with keep
people
• You can say congrats for
work anniversaries
• Keep it professional
UPDATES
• Add value to the community
• Post useful updates
• Again keep it professional
• Track your impact
OTHER STUFF
• LinkedIn often has
suggestions
• Try some of them out
• LION in someone's profile
means they are open to
connecting
IT ALL ADDS UP
UPCOMING EVENTS
HTTP://MCTUNDERGROUND.EVENTBRITE.CO
M

More Related Content

What's hot

Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
RambilashTudu
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Cyber crime
Cyber crimeCyber crime
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Digital security presentation
Digital security presentationDigital security presentation
Digital security presentation
MFRILE01
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
Chelsea Jarvie
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 

What's hot (20)

Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Digital security presentation
Digital security presentationDigital security presentation
Digital security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 

Viewers also liked

2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
Phil Agcaoili
 
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonNavigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Christopher Clark
 
Best cyber security certifications 2017
Best cyber security certifications 2017Best cyber security certifications 2017
Best cyber security certifications 2017
Koenig Solutions Ltd.
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
Using Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsUsing Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary Negotiations
PayScale, Inc.
 
Speak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in TechSpeak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in Tech
aubrey bach
 
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
CODECNetworks
 
Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...
Christopher Clark
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Stephen Cobb
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
Stephen Cobb
 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing code
Stephen Cobb
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Stephen Cobb
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscape
Jynette Reed
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
Stephen Cobb
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
Stephen Cobb
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
Stephen Cobb
 

Viewers also liked (20)

2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonNavigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
 
Best cyber security certifications 2017
Best cyber security certifications 2017Best cyber security certifications 2017
Best cyber security certifications 2017
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Using Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary NegotiationsUsing Data to Help First Job Salary Negotiations
Using Data to Help First Job Salary Negotiations
 
Speak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in TechSpeak Up! Salary Negotiation for Women in Tech
Speak Up! Salary Negotiation for Women in Tech
 
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...
 
Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...Security Operations, Engineering, and Intelligence Integration through the po...
Security Operations, Engineering, and Intelligence Integration through the po...
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
 
Cyber security
Cyber securityCyber security
Cyber security
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing code
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscape
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 

Similar to Cyber Security Career Advice

Making Your Net Work
Making Your Net WorkMaking Your Net Work
Making Your Net Work
VanessaTay12
 
Class 9 seo, linked in, other social networks
Class 9 seo, linked in, other social networksClass 9 seo, linked in, other social networks
Class 9 seo, linked in, other social networks
prds129
 
Wit talk sept 2013
Wit talk   sept 2013Wit talk   sept 2013
Wit talk sept 2013
Paul McClatchie
 
111219 outsourcing
111219 outsourcing111219 outsourcing
111219 outsourcing
Rodrigo Sepúlveda Schulz
 
The Value of LinkedIn Usage and How It Can Help You.pptx
The Value of LinkedIn Usage and How It Can Help You.pptxThe Value of LinkedIn Usage and How It Can Help You.pptx
The Value of LinkedIn Usage and How It Can Help You.pptx
udhayananc315
 
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...
Ted Prodromou
 
10 Essential Principles to Growing Your Language
10 Essential Principles to Growing Your Language 10 Essential Principles to Growing Your Language
10 Essential Principles to Growing Your Language
Latitudes Training, Coaching & Consulting
 
You're Hired! How to ace your next job interview
You're Hired!  How to ace your next job interviewYou're Hired!  How to ace your next job interview
You're Hired! How to ace your next job interview
Richard Harrington
 
GENERAL ASSEMBLY: Job Standup PT1
GENERAL ASSEMBLY: Job Standup PT1GENERAL ASSEMBLY: Job Standup PT1
GENERAL ASSEMBLY: Job Standup PT1
Jonas Altman
 
Getting Behind the Perfect Investor Pitch
Getting Behind the Perfect Investor PitchGetting Behind the Perfect Investor Pitch
Getting Behind the Perfect Investor Pitch
Startup Secrets
 
Recruitment in Perl - The State of the Perl Market 2
Recruitment in Perl - The State of the Perl Market 2Recruitment in Perl - The State of the Perl Market 2
Recruitment in Perl - The State of the Perl Market 2
Rick Deller
 
2 - Recruitment in Perl The State of the Perl Market - YAPC Final 2
2 - Recruitment in Perl  The State of the Perl Market - YAPC Final 22 - Recruitment in Perl  The State of the Perl Market - YAPC Final 2
2 - Recruitment in Perl The State of the Perl Market - YAPC Final 2Rick Deller
 
Head Hunting
Head HuntingHead Hunting
LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...
LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...
LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...
Kristina Caltagirone
 
#READY TO WORK
#READY TO WORK#READY TO WORK
#READY TO WORK
David Jaramillo
 
Startup Secrets - Roadmap to Success
Startup Secrets - Roadmap to SuccessStartup Secrets - Roadmap to Success
Startup Secrets - Roadmap to Success
Michael Skok
 
How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)
BuyAndSellABusiness.com
 
How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)
BuyAndSellABusiness.com
 
How to build a strong brand on linkedin
How to build a strong brand on linkedinHow to build a strong brand on linkedin
How to build a strong brand on linkedin
Pearl Omotoyinbo
 

Similar to Cyber Security Career Advice (20)

Making Your Net Work
Making Your Net WorkMaking Your Net Work
Making Your Net Work
 
Class 9 seo, linked in, other social networks
Class 9 seo, linked in, other social networksClass 9 seo, linked in, other social networks
Class 9 seo, linked in, other social networks
 
Wit talk sept 2013
Wit talk   sept 2013Wit talk   sept 2013
Wit talk sept 2013
 
111219 outsourcing
111219 outsourcing111219 outsourcing
111219 outsourcing
 
The Value of LinkedIn Usage and How It Can Help You.pptx
The Value of LinkedIn Usage and How It Can Help You.pptxThe Value of LinkedIn Usage and How It Can Help You.pptx
The Value of LinkedIn Usage and How It Can Help You.pptx
 
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...
 
10 Essential Principles to Growing Your Language
10 Essential Principles to Growing Your Language 10 Essential Principles to Growing Your Language
10 Essential Principles to Growing Your Language
 
You're Hired! How to ace your next job interview
You're Hired!  How to ace your next job interviewYou're Hired!  How to ace your next job interview
You're Hired! How to ace your next job interview
 
GENERAL ASSEMBLY: Job Standup PT1
GENERAL ASSEMBLY: Job Standup PT1GENERAL ASSEMBLY: Job Standup PT1
GENERAL ASSEMBLY: Job Standup PT1
 
Getting Behind the Perfect Investor Pitch
Getting Behind the Perfect Investor PitchGetting Behind the Perfect Investor Pitch
Getting Behind the Perfect Investor Pitch
 
Recruitment in Perl - The State of the Perl Market 2
Recruitment in Perl - The State of the Perl Market 2Recruitment in Perl - The State of the Perl Market 2
Recruitment in Perl - The State of the Perl Market 2
 
2 - Recruitment in Perl The State of the Perl Market - YAPC Final 2
2 - Recruitment in Perl  The State of the Perl Market - YAPC Final 22 - Recruitment in Perl  The State of the Perl Market - YAPC Final 2
2 - Recruitment in Perl The State of the Perl Market - YAPC Final 2
 
Anything but Flat: Developing a 3D Brand
Anything but Flat: Developing a 3D BrandAnything but Flat: Developing a 3D Brand
Anything but Flat: Developing a 3D Brand
 
Head Hunting
Head HuntingHead Hunting
Head Hunting
 
LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...
LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...
LinkedIn: Enhancing Your Profile, Job Seeking, Sales Prospecting & Promoting ...
 
#READY TO WORK
#READY TO WORK#READY TO WORK
#READY TO WORK
 
Startup Secrets - Roadmap to Success
Startup Secrets - Roadmap to SuccessStartup Secrets - Roadmap to Success
Startup Secrets - Roadmap to Success
 
How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)
 
How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)How to build the best exit team (& what it will cost)
How to build the best exit team (& what it will cost)
 
How to build a strong brand on linkedin
How to build a strong brand on linkedinHow to build a strong brand on linkedin
How to build a strong brand on linkedin
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
Donald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
Donald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
Donald E. Hester
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
Donald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
Donald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
Donald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
Donald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
Donald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
Donald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
Donald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Donald E. Hester
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Cyber Security Career Advice

  • 1. CAREER ADVICE FOR A CAREER IN IT AND CYBER SECUERITY
  • 2. GETTING STARTED IN A NEW CAREER •Get the lay of the land • What are some of the best sources • Trade publications •Information saturation • Get as much information as you can • Different levels, different aspects •What types of jobs are there • What is the job market like • What is the average pay
  • 3. TOWARD A STABLE CAREER •Your career rests on 4 legs •Experience •Certifications •Education •“Who you know”
  • 4. YOUR CAREER PROFILE 7 3 0 10 20 30 40 50 60 70 80 90 100 Overall Career Score 60% 40% 50% 30% 50% Educati on Certificatio ns Vendo r Neutra l Vendo r Specifi c Experience SMB Enterpri se 60% CE Degre e
  • 5. YOUR CAREER PROFILE 40% 40% 10% 60% 15% Educati on Certificatio ns Vendo r Neutra l Vendo r Specifi c Experience SMB Enterpri se 5 5 0 10 20 30 40 50 60 70 80 90 100 Overall Career Score 30% CE Degre e
  • 6. YOUR CAREER PROFILE 10% 10% 60% Educati on Certificatio ns Vendo r Neutra l Vendo r Specifi c Experience SMB Enterpri se 2 5 0 10 20 30 40 50 60 70 80 90 100 Overall Career Score 10% CE Degre e
  • 8. CYBER SECURITY CERTIFICATIONS CISSP CISM CISSP ISSMP CAP CISA GSNA SSCP CASP Security+ CISSP ISSEP/ ISSAP CSSLP Management / Risk Audit Software Dev Network / Communicatio ns
  • 9. (ISC)2 CERTIFICATIONS (ISC)2 International Information Systems Security Certification Consortium, Inc. Website: www.isc2.org Certifications Associate of (ISC)² SSCP: Systems Security Certified Practitioner CAP: Certified Authorization Professional CSSLP: Certified Secure Software Lifecycle Professional CISSP: Certified Information Systems Security Professional CISSP Concentrations: ISSEP, ISSAP, ISSMP Professional Certification (ISC)2 certifications require ongoing continuing education to maintain certification.
  • 10. ISACA CERTIFICATIONS Information Systems and Control Association (ISACA) Certifications CISA: Certified Information Systems Auditor CISM: Certified Information Systems Manager CGEIT: Certified in the Governance of Enterprise IT CRISC: Certified in Risk and Information Systems Control Website www.isaca.org Professional Certification ISACA certifications require ongoing continuing education to maintain certification.
  • 11. COMPTIA CERTIFICATIONS CompTIA certifications Website: www.comptia.org Certifications A+ - Computer Support Technician Network+ - Network Support Technician Security+ - Entry level security certification CASP - CompTIA Advanced Security Practitioner RFID+ - RFID professionals CTT+ - Certified Technical Trainer Project+ - IT Project Management Others: Server+, Linux+, CTP+, CDIA+, PDI+
  • 12. SANS INSTITUTE CERTIFICATIONS Website: www.giac.org Certifications GIAC (Global Information Assurance Certification) GSNA (GIAC Systems and Network Auditor) G7799 (GIAC Certified ISO-17799 Specialist) GCFE (GIAC Certified Forensics Examiner) GCFA (GIAC Certified Forensic Analyst) GREM (GIAC Reverse Engineering Malware) GLEG (GIAC Legal Issues) GISP (GIAC Information Security Professional) GCPM (GIAC Certified Project Manager Certification) GISF (GIAC Information Security Fundamentals)
  • 13. SANS INSTITUTE CERTIFICATIONS (CONT.) Website: www.giac.org Certifications GIAC (Global Information Assurance Certification) GSEC (GIAC Security Essentials Certification) GWAPT (GIAC Web Application Penetration Tester) GCED (Certified Enterprise Defender) GCFW (GIAC Certified Firewall Analyst) GCIA (GIAC Certified Intrusion Analyst) GCIH (GIAC Certified Incident Handler) GCWN (GIAC Certified Windows Security Administrator) GCUX (GIAC Certified UNIX Security Administrator) GPEN (GIAC Certified Penetration Tester) GAWN (GIAC Assessing Wireless Networks)
  • 14. DODD 8570 All IA (Information Assurance) jobs require certification.
  • 15. DODD 8570 (CONT.) All IA (Information Assurance) jobs require certification. Level Qualifying Certifications CND Analyst GCIA, CEH CND Infrastructure Support SSCP, CEH CND Incident Responder GCIH, GSIH, CEH CND Auditor CISA, CEH, GSNA CN-SP Manager CISM, CISSP-ISSEP
  • 16. SECONDARY CERTIFICATIONS • Project Management Professional – PMP (PMI) • Project+ (CompTIA) • ITIL V3 Foundation Certificate in IT Service Management • Microsoft Operations Framework • Six Sigma
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. CERTIFICATIONS • List your current certifications • Expired ones if applicable • Helps with search
  • 24. SKILLS • Limited to 50 • Need to endorse other people • Typically the more you endorse the more likely you are to be endorsed • Don’t endorse skills for people that don’t have them • Again this comes up in searches
  • 25. EDUCATION • Be as complete as possible • Add grades is applicable • Don’t forget dates • Don’t forget degree • Add activities and societies if applicable • Consider listing classes
  • 26. LIST COURSES • You can add course from any schools you have listed • You may limit to relevant classes related to your profession • Again may lead to you showing up in a search
  • 27. HONORS AND AWARDS • Think of it as extra credit • It may or may not help in selection for interview • Generally it doesn’t hurt • Depending on the wording it may help bring you to the top of searches
  • 28. VOLUNTEER • Always considered a plus for resumes • Again betters your chances at turning up in search results
  • 29. EXTRA INFORMATION • Add any professional organizations you belong to • These are extra points in your behalf • Additional info, give yourself a personality, not just another resume, a person
  • 30. RECOMMENDATIONS • Best way to get them is to give them • Again only give them to people you know • People that have the skills • Sometimes applicants are not allowed to turn in letters of recommendation • But you can give them a link to your LinkedIn profile…
  • 31. GROUPS • Join ones related to your career path • You can only join 50 • So pick them wisely • Look for groups with more activity
  • 32. GROUP DISCUSSIONS • Being active in groups is a good way to be noticed • Keep it professional
  • 33. INTERACT – KEEP IN TOUCH • Stay in touch with keep people • You can say congrats for work anniversaries • Keep it professional
  • 34. UPDATES • Add value to the community • Post useful updates • Again keep it professional • Track your impact
  • 35. OTHER STUFF • LinkedIn often has suggestions • Try some of them out • LION in someone's profile means they are open to connecting

Editor's Notes

  1. Certifications See Also Top 5 IT Security Certifications for 2011 Employers, Recruiters Identify the Most Valued Infosec Certifications December 30, 2010 - Upasana Gupta, Contributing Editor http://www.govinfosecurity.com/articles.php?art_id=3222
  2. (ISC)2 Certifications (ISC)2 International Information Systems Security Certification Consortium, Inc. Website: www.isc2.org Certifications Associate of (ISC)² SSCP: Systems Security Certified Practitioner CAP: Certified Authorization Professional CSSLP: Certified Secure Software Lifecycle Professional CISSP: Certified Information Systems Security Professional CISSP Concentrations: ISSEP, ISSAP, ISSMP Professional Certification (ISC)2 certifications require ongoing continuing education to maintain certification. Associate of (ISC)²: Pass the SSCP or CISSP exam but do not have the required work experience. SSCP: Covers seven areas of practice or domains: Access Controls, Cryptography, Malicious Code and Activity, Monitoring and Analysis, Networks and Communications, Risk, Response and Recovery, Security Operations and Administration CAP: Covers seven domains of knowledge aligned with NIST Risk Management Framework CSSLP: Covers seven domains of knowledge concerning secure software development CISSP: Cover 10 broad domains of information systems security. The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003. CISSP Concentrations ISSAP: Information Systems Security Architecture Professional ISSEP: Information Systems Security Engineering Professional ISSMP: Information Systems Security Management Professional (ISC)², CISSP, CAP, ISSAP, ISSEP, ISSMP, SSCP and CBK are registered certification marks of (ISC)², Inc.
  3. ISACA Certifications Information Systems and Control Association (ISACA) Certifications CISA: Certified Information Systems Auditor CISM: Certified Information Systems Manager CGEIT: Certified in the Governance of Enterprise IT CRISC: Certified in Risk and Information Systems Control Website www.isaca.org Professional Certification ISACA certifications require ongoing continuing education to maintain certification. CISA is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems. The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CRISC recognizes a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor and maintain IS controls to mitigate such risk. The CGEIT certification program was designed specifically for professionals charged with satisfying the IT governance needs of an enterprise. The American National Standards Institute (ANSI) has accredited the CISA & CISM certification under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons. ANSI, a private, nonprofit organization, accredits other organizations to serve as third-party product, system and personnel certifiers CISA, CISM, CGEIT, CRISC and ISACA are registered certification marks of ISACA
  4. CompTIA Certifications CompTIA certifications Website: www.comptia.org Certifications A+ - Computer Support Technician Network+ - Network Support Technician Security+ - Entry level security certification CASP - CompTIA Advanced Security Practitioner RFID+ - RFID professionals CTT+ - Certified Technical Trainer Project+ - IT Project Management Others: Server+, Linux+, CTP+, CDIA+, PDI+ The CompTIA A+ certification is the industry standard for computer support technicians. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting. The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technician’s competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure. CompTIA Security+ is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security. CompTIA RFID+ is an international, vendor-neutral certification for IT professionals with six to 24 months of experience in RFID technologies. CompTIA CTT+ is an international, vendor-neutral certification that covers core instructor skills, including preparation, presentation, communication, facilitation and evaluation in both a classroom and virtual classroom environment The CompTIA Project+ certification is an international, vendor-neutral certification that covers the entire project life cycle from initiation and planning through execution, acceptance, support and closure
  5. SANS Institute Certifications Website: www.giac.org Certifications GIAC (Global Information Assurance Certification) GSNA (GIAC Systems and Network Auditor) G7799 (GIAC Certified ISO-17799 Specialist) GCFE (GIAC Certified Forensics Examiner) GCFA (GIAC Certified Forensic Analyst) GREM (GIAC Reverse Engineering Malware) GLEG (GIAC Legal Issues) GISP (GIAC Information Security Professional) GCPM (GIAC Certified Project Manager Certification) GISF (GIAC Information Security Fundamentals)
  6. SANS Institute Certifications (cont.) Website: www.giac.org Certifications GIAC (Global Information Assurance Certification) GSEC (GIAC Security Essentials Certification) GWAPT (GIAC Web Application Penetration Tester) GCED (Certified Enterprise Defender) GCFW (GIAC Certified Firewall Analyst) GCIA (GIAC Certified Intrusion Analyst) GCIH (GIAC Certified Incident Handler) GCWN (GIAC Certified Windows Security Administrator) GCUX (GIAC Certified UNIX Security Administrator) GPEN (GIAC Certified Penetration Tester) GAWN (GIAC Assessing Wireless Networks)
  7. DoDD 8570 All IA (Information Assurance) jobs require certification. IAT Information Assurance Technical IAM Information Assurance Management IASAE Information Assurance System Architecture and Engineering
  8. DoDD 8570 (cont.) All IA (Information Assurance) jobs will require certification. CND Computer Network Defense