This the first edition of the Trainers Underground will cover topics of career advice, cyber security certifications, and other topics like marketing yourself. Using LinkedIn and cyber security certifications.
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **
Cybersecurity careers are complex and many roles can be found in banks, retailers and government organizations. This PPT will guide you through multiple career paths in cybersecurity. Below are the topics covered in this tutorial:
1. Where to Start?
2. Career Paths in Cybersecurity
3. Cybersecurity Job Salaries
4. Skills for Cybersecurity Careers
5. Tools & Technologies
6. Cybersecurity Careers & Estimated Annual
7. Related Occupations you should know about
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Hacking Vs Cracking in Computer NetworksSrikanth VNV
Hacking and Cracking are two entirely different concepts whose differences are discussed in this presentation. While both are meant for same kind of work, but the purpose defines the differences
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **
Cybersecurity careers are complex and many roles can be found in banks, retailers and government organizations. This PPT will guide you through multiple career paths in cybersecurity. Below are the topics covered in this tutorial:
1. Where to Start?
2. Career Paths in Cybersecurity
3. Cybersecurity Job Salaries
4. Skills for Cybersecurity Careers
5. Tools & Technologies
6. Cybersecurity Careers & Estimated Annual
7. Related Occupations you should know about
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Hacking Vs Cracking in Computer NetworksSrikanth VNV
Hacking and Cracking are two entirely different concepts whose differences are discussed in this presentation. While both are meant for same kind of work, but the purpose defines the differences
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ... Cyber crime may threaten a person or a nation's security and financial health.
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
What Is Hacking???
Why do people hack??
History of hacking
What are the various qualities a hacker should posses
H4cking prone areas
TYPE OF HACKERS
Definition of hackers?
What is Ethical hacking?
Who are Ethical hacker?
Ethical Hackers but not Criminal Hackers
Advantages and disadvantages:
Hackers language
Hackers language translation
Here is your guide on how to progress through the cyber security career ladder. This resource shows you all the different cyber security roles and the qualifications needed for each!
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonChristopher Clark
Veteran cybersecurity executive Steve Santini, Founding Partner and Managing Director at Cyber Intersections Group and host Drew Fearson, Chief Operating Officer at NinjaJobs discuss how to steer your career, get noticed as a problem solver, and develop your skills and network in this 60-minute webinar, "Navigating Career Change"
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ... Cyber crime may threaten a person or a nation's security and financial health.
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
What Is Hacking???
Why do people hack??
History of hacking
What are the various qualities a hacker should posses
H4cking prone areas
TYPE OF HACKERS
Definition of hackers?
What is Ethical hacking?
Who are Ethical hacker?
Ethical Hackers but not Criminal Hackers
Advantages and disadvantages:
Hackers language
Hackers language translation
Here is your guide on how to progress through the cyber security career ladder. This resource shows you all the different cyber security roles and the qualifications needed for each!
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
Navigating Your Career in Cyber Security - Steve Santini & Drew FearsonChristopher Clark
Veteran cybersecurity executive Steve Santini, Founding Partner and Managing Director at Cyber Intersections Group and host Drew Fearson, Chief Operating Officer at NinjaJobs discuss how to steer your career, get noticed as a problem solver, and develop your skills and network in this 60-minute webinar, "Navigating Career Change"
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
Invited speaker: "Growing Trend of Finding Regulatory and Tort Liability for Cyber Security Breaches ”
with Mark W. Ishman, J.D., Masters in Law in Information Technology and Privacy Law
Using Data to Help First Job Salary NegotiationsPayScale, Inc.
Early salary negotiations have a huge impact on lifetime earning potential, but young workers often don't feel empowered to negotiate. PayScale has free resources that college career centers can use to help students understand their worth in the marketplace, research salaries online and overcome apprehension with real, accurate salary data.
Speak Up! Salary Negotiation for Women in Techaubrey bach
Mastering the art of salary negotiation is important for everybody, but women in tech face specific challenges. This presentation is full of helpful tips to help female engineers, product and program managers, and other tech roles negotiate the salary their skills and experience merit.
Career Counselling Program on Cyber Security @ K.R.Mangalam University Conduc...CODECNetworks
A career counselling seminar on Information Security/Cyber Security was organized in K.R.Mangalam University Gurgaon with the purpose to guide the fresh technocrat about the cyber security domain.
Visit our website:
http://www.codecnetworks.com/
Security Operations, Engineering, and Intelligence Integration through the po...Christopher Clark
Security Operations, Engineering, and Intelligence Integration Through the Power of Graph(DB)!
The ability to properly categorize and visualize attacks, security tool efficacy, and targeting trends has previously been cumbersome at best and impossible at worst.
Through proper schema design a graph database can be used to represent all assets and entities involved in business operations and security both internal and external to your organization. This data can then be used to accurately track and attribute attacks, measure tool and team efficacy/ROI and isolate high risk targets and gaps present in your security posture down to a granular level impossible by other means.
The graph database model also allows for incredibly complex queries to be returned in milliseconds to include unknown distance questions, such as "Which Exploits have actors from China used against our Development team in the last twelve months?" or "Which IDS rules are in place to defend from malware used by XXXX group?" or "Display all C2 domains beaconed to over port 80 by malware delivered by Watering Hole attack"
By treating things as entities which they are in real life, and forming contextful relationships between them we can begin to make sense of the piles of data and gain insight into our weaknesses.
https://github.com/Xen0ph0n/security_graph_demo
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeStephen Cobb
Slideshare friendly version of presentation delivered at 6th Annual Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia (there are no builds in the slides, use the other version if you want to download .pptx).
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Malware and the risks of weaponizing codeStephen Cobb
Slides based on a paper by Andrew Lee and Stephen Cobb of ESET, delivered at the 6th Annual Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia. June 2014.
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
HIPAA's implications for privacy and security practices in American businesses, addressed in March of 2001 at the Employers' Summit on Health Care, by Stephen Cobb, CISSP. Uploaded in 2014 for the historical record.
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
The potential benefits of mobile medical technology and telemedicine are enormous, from better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance. In these slides I show why HIPAA compliant is not the same as being secure, and why protecting health data on mobile devices is a such a big security challenge.
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
A presentation delivered at the 2014 meeting of the Municipal Information Systems Association of California. Includes suggestions for security awareness programs.
Unlock the Mysteries of LinkedIn: How to Get New Clients in Just 15 Minutes a...Ted Prodromou
LinkedIn is a mystery to most business professionals. Many still think LinkedIn is just a website where you upload your resume to find a new job.
Today, LinkedIn is so much more than a job-seeking website.
In this presention you’ll learn:
• Getting the Attention of Your Ideal Customer on LinkedIn
• Creating Your Killer LinkedIn Profile
• Building Your Professional Network
• Increasing Desire for Your Services Using LinkedIn Messages
• Moving Your LinkedIn Connections into Your Sales Funnel
• Advanced LinkedIn and Social Selling Strategies
Presentation given by Marcela Reyes at #ata54.
As you think about your approach to increasing your client base, growing your language business, making your name known, and having an effective strategy in the current economy, you need to apply 10 essential principles to creating a sustainable, profitable, and ultimately successful business. Some of the things you will learn during this session include how to develop a solid and distinctive brand, advance your business through social media, and how to build the reputation of your business to separate it from the competition.
To land your dream job in a creative role, there’s nothing more important than the interview. Job interviews showcase your talent and expertise—and your ability to think on your feet. So how do you make sure you’re prepared?
Networking for job interviews
Crafting an effective resume and creative portfolio
Researching the company and position
Dressing for a job interview
Bringing the right materials
Knowing your long-term goals
Asking about the next steps
Following up with the interviewer
Staying positive and confident
The Job Search Standup is a programme at General Assembly designed to help our full-time students as they prepare for a new career in web development.
The Job Standup is a tailored to GA web development and UX courses, during which the students participate in job readiness trainings, share their experiences in the job market, and offer support and strategies to each other.
This session covers pitching, CVs, Github, Networks, Portfolio, Blogging, Cover Letter
Startup Secrets presents a lecture on how to get behind the perfect investor pitch! Learn about what investors are looking for, and how to successfully represent your business.
Recruitment in Perl - The State of the Perl Market 2Rick Deller
I gave this talk at YAPC::EU 2015 on how the recruitment market in Perl has chnaged over the 12 months since YAPC:EU 2014, I also spoke about how developers/candidates can stand out in the recruitment process, What Salary they should be looking for ? How to conduct themselves at interview , What they should have on their CV's, How companies can stand out ? How they can change their brands
How to put your best self online and land the interview
- Ideas to upgrade your resume and make it stand out
- How to enhance your social profiles and get noticed
- Best practices for a phone or video interview
BizON had the honour of sponsoring the Business Transition Forum! We would like to share some valuable information with our audience from the forum in case you did not have the opportunity to attend!
BizON had the honour of sponsoring the Business Transition Forum! We would like to share some valuable information with our audience from the forum in case you did not have the opportunity to attend!
In this presentation, you will learn:
- How to provoke confidence and credibility while showcasing yourself as a professional
- How to position you as a thought-leader in your industry for massive career growth
- How to position you and your brand above your competition
- How to align your business goals and target audience so you can reach your true potential
Cybersecurity is important for local government. Understand the reasons why cybersecurity is so important for local governments. Includes statistics on cyber crime.
Ransomware is a threat that is growing exponentially is your organization ready? Learn what we know about the perpetrators, what they typical attack vectors are, who the typical victims are. What step you can take to protect and mitigate the risk along with the cost considerations. We will also cover some alarming statistics and predictions for the future.
This infographic depicts the relationship of Student Learning Outcomes/Objectives SLOs with the measurable objectives and course content for Las Positas College CNT 54 Administering Windows Client. This course aligns with Microsoft exam 70-698 Installing and Configuring Windows 10.
This session will provide information on some common fraud schemes relevant to most entities and provide examples of controls you can implement in your organization to decrease the risk of fraud. We will also provide an overview of the Internal Control Guidelines issued by the State Controller's Office.
Presenters David Alvey, CPA Audit Partner and Katherine Yuen, CPA, Audit Partner
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...Donald E. Hester
Are you ready for the new Single Audit rules and requirements? In this session, we will go over the new Uniform Guidance to Federal Awards with a high level background and overview on the latest updates on the new single audit requirements. We will discuss how the Uniform Guidance will affect the planning considerations for year-end single audits. We will also discuss how you can successfully prepare for the single audit and comply with the new Uniform Guidance for Federal Awards.
Presenters Nikki Apura, Audit Supervisor and Mark Wong, CPA, Audit Partner
2016 Maze Live Cyber-security for Local GovernmentsDonald E. Hester
Is your organization doing enough to reduce the risk of cyber threats? Cyber-security is more than compliance with credit card processing. What risks does your organization have? Cyber-security is a prime concern today and in this session we will cover what local governments can do to reduce risk. Presenter Donald E. Hester, CISA, CISSP, Director
How did your implementation go last year? In this session, we will cover issues that we or our clients encountered during the implementation of GASB 68 and 71. We will also cover anticipated challenges, new information from actuaries, as well as sample journal entries in this first year after implementation. Presenter Amy Myer, CPA, Audit Partner
Implementing GASB 72: Fair Value Measurement and ApplicationDonald E. Hester
In this session, we identify the impacts of GASB 72 for financial statement presentation purposes and be exposed to updated footnote tables and other pertinent footnote disclosures. Other topics include: valuation techniques, reporting requirements and definitions related to the Statement. Presenters Cody Smith, CPA, Audit Supervisor and Amy Myer, CPA, Audit Partner
Are you wondering what is down the pike for GASB implementation? In this session we will cover the new GASB pronouncements for the upcoming years, including those addressing tax abatement disclosures and retiree healthcare benefits. Presenter David Alvey, CPA Audit Partner
Annual Maze Live Event 2016 – GASB Updates & Best Practices Donald E. Hester
Hosted by the City of San Leandro
Topics covered:
GASB Update
Implementing GASB 72: Fair Value Measurement and Application
GASB 68 and 71 Planning for the Second Year
Cyber-security for Local Governments
Changes in Grant Management and How to Prepare for the Single Audit
Fraud Environment
Payment Card Cashiering for Local Governments 2016Donald E. Hester
Slides cover PCI compliance training for cashiers covering topics from Payment Card Industry Data Security Standard (PCI DSS), supplemental guidance provided by Payment Card Industry Security Standards Council (PCI SSC), Visa's Card Acceptance Guidelines for Visa Merchants, and MasterCard’s Security Rules and Procedures Merchant Edition 2011.
2. GETTING STARTED IN A NEW CAREER
•Get the lay of the land
• What are some of the best sources
• Trade publications
•Information saturation
• Get as much information as you can
• Different levels, different aspects
•What types of jobs are there
• What is the job market like
• What is the average pay
3. TOWARD A STABLE CAREER
•Your career rests on 4 legs
•Experience
•Certifications
•Education
•“Who you know”
5. YOUR CAREER PROFILE
40% 40%
10%
60%
15%
Educati
on
Certificatio
ns
Vendo
r
Neutra
l
Vendo
r
Specifi
c
Experience
SMB Enterpri
se
5
5
0
10
20
30
40
50
60
70
80
90
100
Overall
Career
Score
30%
CE Degre
e
6. YOUR CAREER PROFILE
10% 10%
60%
Educati
on
Certificatio
ns
Vendo
r
Neutra
l
Vendo
r
Specifi
c
Experience
SMB Enterpri
se
2
5
0
10
20
30
40
50
60
70
80
90
100
Overall
Career
Score
10%
CE Degre
e
9. (ISC)2 CERTIFICATIONS
(ISC)2 International Information Systems Security
Certification Consortium, Inc.
Website: www.isc2.org
Certifications
Associate of (ISC)²
SSCP: Systems Security Certified Practitioner
CAP: Certified Authorization Professional
CSSLP: Certified Secure Software Lifecycle Professional
CISSP: Certified Information Systems Security Professional
CISSP Concentrations: ISSEP, ISSAP, ISSMP
Professional Certification
(ISC)2 certifications require ongoing continuing education to maintain
certification.
10. ISACA CERTIFICATIONS
Information Systems and Control Association (ISACA)
Certifications
CISA: Certified Information Systems Auditor
CISM: Certified Information Systems Manager
CGEIT: Certified in the Governance of Enterprise IT
CRISC: Certified in Risk and Information Systems Control
Website
www.isaca.org
Professional Certification
ISACA certifications require ongoing continuing education to maintain
certification.
14. DODD 8570
All IA (Information Assurance) jobs require
certification.
15. DODD 8570 (CONT.)
All IA (Information Assurance) jobs require
certification.
Level Qualifying Certifications
CND Analyst GCIA, CEH
CND Infrastructure
Support
SSCP, CEH
CND Incident Responder GCIH, GSIH, CEH
CND Auditor CISA, CEH, GSNA
CN-SP Manager CISM, CISSP-ISSEP
16. SECONDARY CERTIFICATIONS
• Project Management Professional – PMP (PMI)
• Project+ (CompTIA)
• ITIL V3 Foundation Certificate in IT Service Management
• Microsoft Operations Framework
• Six Sigma
24. SKILLS
• Limited to 50
• Need to endorse other people
• Typically the more you endorse
the more likely you are to be
endorsed
• Don’t endorse skills for people
that don’t have them
• Again this comes up in searches
25. EDUCATION
• Be as complete as possible
• Add grades is applicable
• Don’t forget dates
• Don’t forget degree
• Add activities and societies if
applicable
• Consider listing classes
26. LIST COURSES
• You can add course from any
schools you have listed
• You may limit to relevant
classes related to your
profession
• Again may lead to you showing
up in a search
27. HONORS AND AWARDS
• Think of it as extra credit
• It may or may not help in
selection for interview
• Generally it doesn’t hurt
• Depending on the wording it
may help bring you to the top
of searches
29. EXTRA INFORMATION
• Add any professional
organizations you belong
to
• These are extra points in
your behalf
• Additional info, give
yourself a personality,
not just another resume,
a person
30. RECOMMENDATIONS
• Best way to get them is to give
them
• Again only give them to people
you know
• People that have the skills
• Sometimes applicants are not
allowed to turn in letters of
recommendation
• But you can give them a link to
your LinkedIn profile…
31. GROUPS
• Join ones related to
your career path
• You can only join 50
• So pick them wisely
• Look for groups with
more activity
Certifications
See Also
Top 5 IT Security Certifications for 2011
Employers, Recruiters Identify the Most Valued Infosec Certifications
December 30, 2010 - Upasana Gupta, Contributing Editor
http://www.govinfosecurity.com/articles.php?art_id=3222
(ISC)2 Certifications
(ISC)2 International Information Systems Security Certification Consortium, Inc.
Website: www.isc2.org
Certifications
Associate of (ISC)²
SSCP: Systems Security Certified Practitioner
CAP: Certified Authorization Professional
CSSLP: Certified Secure Software Lifecycle Professional
CISSP: Certified Information Systems Security Professional
CISSP Concentrations: ISSEP, ISSAP, ISSMP
Professional Certification
(ISC)2 certifications require ongoing continuing education to maintain certification.
Associate of (ISC)²: Pass the SSCP or CISSP exam but do not have the required work experience.
SSCP: Covers seven areas of practice or domains: Access Controls, Cryptography, Malicious Code and Activity, Monitoring and Analysis, Networks and Communications, Risk, Response and Recovery, Security Operations and Administration
CAP: Covers seven domains of knowledge aligned with NIST Risk Management Framework
CSSLP: Covers seven domains of knowledge concerning secure software development
CISSP: Cover 10 broad domains of information systems security. The CISSP was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003.
CISSP Concentrations
ISSAP: Information Systems Security Architecture Professional
ISSEP: Information Systems Security Engineering Professional
ISSMP: Information Systems Security Management Professional
(ISC)², CISSP, CAP, ISSAP, ISSEP, ISSMP, SSCP and CBK are registered certification marks of (ISC)², Inc.
ISACA Certifications
Information Systems and Control Association (ISACA)
Certifications
CISA: Certified Information Systems Auditor
CISM: Certified Information Systems Manager
CGEIT: Certified in the Governance of Enterprise IT
CRISC: Certified in Risk and Information Systems Control
Website
www.isaca.org
Professional Certification
ISACA certifications require ongoing continuing education to maintain certification.
CISA is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems.
The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities.
CRISC recognizes a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor and maintain IS controls to mitigate such risk.
The CGEIT certification program was designed specifically for professionals charged with satisfying the IT governance needs of an enterprise.
The American National Standards Institute (ANSI) has accredited the CISA & CISM certification under ISO/IEC 17024:2003, General Requirements for Bodies Operating Certification Systems of Persons. ANSI, a private, nonprofit organization, accredits other organizations to serve as third-party product, system and personnel certifiers
CISA, CISM, CGEIT, CRISC and ISACA are registered certification marks of ISACA
CompTIA Certifications
CompTIA certifications
Website: www.comptia.org
Certifications
A+ - Computer Support Technician
Network+ - Network Support Technician
Security+ - Entry level security certification
CASP - CompTIA Advanced Security Practitioner
RFID+ - RFID professionals
CTT+ - Certified Technical Trainer
Project+ - IT Project Management
Others: Server+, Linux+, CTP+, CDIA+, PDI+
The CompTIA A+ certification is the industry standard for computer support technicians. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting.
The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technician’s competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure.
CompTIA Security+ is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security.
CompTIA RFID+ is an international, vendor-neutral certification for IT professionals with six to 24 months of experience in RFID technologies.
CompTIA CTT+ is an international, vendor-neutral certification that covers core instructor skills, including preparation, presentation, communication, facilitation and evaluation in both a classroom and virtual classroom environment
The CompTIA Project+ certification is an international, vendor-neutral certification that covers the entire project life cycle from initiation and planning through execution, acceptance, support and closure
SANS Institute Certifications
Website: www.giac.org
Certifications
GIAC (Global Information Assurance Certification)
GSNA (GIAC Systems and Network Auditor)
G7799 (GIAC Certified ISO-17799 Specialist)
GCFE (GIAC Certified Forensics Examiner)
GCFA (GIAC Certified Forensic Analyst)
GREM (GIAC Reverse Engineering Malware)
GLEG (GIAC Legal Issues)
GISP (GIAC Information Security Professional)
GCPM (GIAC Certified Project Manager Certification)
GISF (GIAC Information Security Fundamentals)
DoDD 8570
All IA (Information Assurance) jobs require certification.
IAT Information Assurance Technical
IAM Information Assurance Management
IASAE Information Assurance System Architecture and Engineering
DoDD 8570 (cont.)
All IA (Information Assurance) jobs will require certification.
CND Computer Network Defense