SlideShare a Scribd company logo
๏‚ท GIAC -- Global Information Assurance Certification Program This program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. Available entry-level certifications include the following: 
o GIAC Certified ISO-17799 Specialist (G7799) 
o GIAC Information Security Fundamentals (GISF) 
o GIAC Information Security Professional (GISP) 
o GIAC IT Security Audit Essentials (GSAE) 
o GIAC Operations Essentials Certification (GOEC) 
o GIAC Security Essentials Certification (GSEC) 
Source: Global Information Assurance Certification 
๏‚ท Security Certified Network Specialist (SCNS) This entry-level security certification focuses on tactical perimeter defense -- firewalls, intrusion detection and router security. The SCNS is the starting point for individuals who want to attain the Security Certified Network Professional and Security Certified Network Architect certifications. (Please note that the SCNS and a revised version of the SCNP will be available some time during the second quarter of 2007.) Source: Security Certified Program 
๏‚ท Security+ This security certification focuses on important security fundamentals related to security concepts and theory, as well as best operational practices. In addition to functioning as a standalone exam for CompTIA, Microsoft accepts the Security+ as an alternative to one of the specialization exams for the MCSA and MCSE Security specializations, and Symantec accepts Security+ as part of the requirements for the Symantec Certified Technology Architect credential. Source: CompTIA Security+ Certification Overview 
๏‚ท SSCP -- Systems Security Certified Practitioner The entry-level precursor to the ISCยฒ's CISSP, the SSCP exam covers seven of the 10 domains in the CISSP Common Body of Knowledge. The exam focuses more on operational and administrative issues relevant to information security and less on information policy design, risk assessment details and other business analysis skills that more germane to a senior IT security professional (and less so to a day-to-day security administrator, which is where the SSCP is really focused). Source: (ISC)ยฒ 
๏‚ท Wireless# This entry-level certification recognizes individuals who have an essential understanding of leading wireless technologies such as Wi-Fi, Bluetooth, WiMAX, ZigBee, Infrared, RFID and VoWLAN. It also covers basic WLAN
security issues and best related practices. To obtain this credential, candidates must pass one exam. Source: Planet3 Wireless 
General security -- Intermediate 
Return to Table of Contents 
๏‚ท BISA -- Brainbench Information Security Administrator This Brainbench certification tests knowledge of networking and Internet security, including authorization, authentication, firewalls, encryption, disaster recovery and more. Source: Brainbench 
๏‚ท CAP โ€“ Certification and Accreditation Professional The CAP aims to identify individuals who can assess and manage the risks that security threats can pose within an organization, particularly in the government and enterprise sectors. This is a credential that deals with processes and practices, and works in tandem with emerging compliance requirements (Sarbanes-Oxley, HIPAA, and so forth) as well as emerging best industry governance standards (ITIL). Source: ISCยฒ 
๏‚ท CWSP -- Certified Wireless Security Professional This certification recognizes individuals who can design, implement and manage wireless LAN security. To obtain this credential, candidates must pass two exams. Source: Planet3 Wireless 
๏‚ท GIAC -- Global Information Assurance Certification Program This cert program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. Available intermediate certifications include the following: 
o GIAC Assessing Wireless Networks (GAWN) 
o GIAC Certified Firewall Analyst (GCFW) 
o GIAC Certified Intrusion Analyst (GCIA) 
o GIAC Certified Incident Manager (GCIM) 
o GIAC Certified Security Consultant (GCSC) 
o GIAC Certified Incident Handler (GCIH) 
o GIAC Certified Windows Security Administrator (GCWN) 
o GIAC Certified UNIX Security Administrator (GCUX) 
o GIAC Legal Issues (GLEG) 
o GIAC Securing Oracle Certification (GSOC) 
o GIAC Security Leadership (GSLC) 
o GIAC Systems and Network Auditor (GSNA)
Source: Global Information Assurance Certification 
๏‚ท SCNP -- Security Certified Network Professional This mid-level security certification focuses on strategic infrastructure security, including packet structure analysis, security policies, risk analysis, ethical hacking techniques, Internet security, cryptography, and hardening Linux and Windows systems. Individuals who attain this certification will be able to work as full-time IT security professionals with an operations focus. As of Q2 2007, the SCNS (described in the section on entry level certifications in this guide) is required as a pre-requisite for those pursuing this credential. Source: Security Certified Program 
๏‚ท SCNA -- Security Certified Network Architect This is a mid- to senior-level security certification that focuses on concepts, planning and implementation of enterprise security topics, such as Private Key Infrastructure, biometric authentication and identification systems, digital certificates, cryptography and more. Individuals who attain this certification will be able to implement these technologies within organizations or as consultants to such organizations. Source: Security Certified Program 
General security -- Advanced 
Return to Table of Contents 
๏‚ท CERI-ACSS -- Advanced Computer System Security The CERI-ACSS seeks to identify law enforcement officials with advanced computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, three years of Microsoft platform analysis, one year of non-Microsoft platform analysis, 40 hours of approved training, a written exam and successful completion of hands-on exercises. (Note: because of its "double coverage" this item also appears in the Forensics/antihacking โ€“ Advanced section as well.) Source: Cyber Enforcement Resources Inc. 
๏‚ท CISM -- Certified Information Security Manager The CISM demonstrates knowledge of information security for IT professionals responsible for handling security matters, issues and technologies. This cert is of primary interest to IT professionals responsible for managing IT systems, networks, policies, practices and procedures to make sure organizational security policies meet governmental and regulatory requirements, conform to best security practices and principles, and meet or exceed requirements stated in an organization's security policy. Source: Information Systems Audit and Control Association 
๏‚ท CISSP -- Certified Information Systems Security Professional The CISSP demonstrates knowledge of network and system security principles, safeguards and practices. It is of primary interest to full-time IT security professionals who work in internal security positions or who consult with third parties on security matters. CISSPs are capable of analyzing security requirements, auditing security practices and procedures, designing and implementing security policies, and managing and maintaining an ongoing and
effective security infrastructure. CISSP candidates must have four years of experience (or a college degree plus three years of experience; a Master's Degree in Information Security counts toward one year of experience). Source: (ISC)ยฒ 
๏‚ท CPTS -- Certified Pen Testing Specialist An offering from Iowa-based training company, Mile2, this credential stresses currency on the latest exploits, vulnerabilities and system penetration techniques. It also focuses on business skills, identification of protection opportunities, testing justifications and optimization of security controls to meet business needs and control risks and exposures. The credential is structured around a five-day course that's backed up by the CPTS or Certified Ethical Hacker exam, both delivered by Prometric. Source: Mile2 
๏‚ท CPP -- Certified Protection Professional The CPP demonstrates a thorough understanding of physical, human and information security principles and practices. The most senior and prestigious IT security professional certification covered in this article, the CPP requires extensive on-the-job experience (nine years or seven years with a college degree), as well as a profound knowledge of technical and procedural security topics and technologies. Only those who have worked with and around security for some time are able to qualify for this credential. Source: American Society for Industrial Security (ASIS) 
๏‚ท GIAC -- Global Information Assurance Certification Program This cert program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused, and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. The GIAC Security Engineer (GSE) track is the most senior-level certification in that program. Candidates must complete three intermediate-level GIAC certifications (GSEC, GCIA and GCIH), earning GIAC Gold in at least two of them, and pass two proctored exams to qualify for this certification. There's also the GIAC .NET Certification (GNET), which we've decided to upgrade to an advanced level because of the extensive programming knowledge and experience required to earn this credential. GNET Source: Global Information Assurance Certification GSE Source: Global Information Assurance Certification 
๏‚ท ISSAP -- Information Systems Security Architecture Professional The ISSAP permits CISSPs to concentrate further in information security architecture and stresses the following elements of the CBK: 
o Access control systems and methodologies 
o Telecommunications and network security 
o Cryptography 
o Requirements analysis and security standards, guidelines and criteria
o Technology-related business continuity and disaster recovery planning (BCP and DRP) 
o Physical security integration 
Source: (ISC)ยฒ 
๏‚ท ISSEP -- Information Systems Security Engineering Professional The ISSEP permits CISSPs who work in areas related to national security to concentrate further in security engineering, in cooperation with the NSA. The ISSEP stresses the following elements of the CBK: 
o Systems security engineering 
o Certification and accreditation 
o Technical management 
o U.S. government information assurance regulations 
Source: (ISC)ยฒ 
๏‚ท ISSMP -- Information Systems Security Management Professional The ISSMP permits CISSPs to concentrate further in security management areas and stresses the following elements of the CBK: 
o Enterprise security management practices 
o Enterprise-wide system development security 
o Overseeing compliance of operations security 
o Understanding BCP, DRP and continuity of operations planning (COOP) 
o Law, investigations, forensics and ethics 
Source: (ISC)ยฒ 
๏‚ท PSP -- Physical Security Professional Another high-level security certification from ASIS, this program focuses on matters relevant to maintaining security and integrity of the premises, and access controls over the devices and components of an IT infrastructure. Key topics covered include physical security assessment, and selection and implementation of appropriate integrated physical security measures. Requirements include five years of experience in physical security, a high school diploma (or GED) and a clean criminal record. Source: ASIS International: Physical Security Professional 
๏‚ท QIAP -- Qualified Information Assurance Professional Security University's QIAP certification combines coverage of key information security topics, tools and technologies with a hands-on, lab-oriented learning and testing program. To obtain QIAP certification, security professionals must complete three courses on topics such as: 
o Access, authentication and Public Key Infrastructure 
o Network security policy and security-oriented architect 
o Certification and accreditation 
Students must also take and pass three exams, one per course. Source: Security University
๏‚ท QISP -- Qualified Information Security Professional Security University's QISP certification combines coverage of key information security topics, tools and technologies with a hands-on, lab-oriented learning and testing program. SU offers QISP certification with four concentrations: analyst/penetration tester, Security hacker/defender, edge protection and forensics. To obtain QISP certification security professionals must complete five courses, depending on their concentration. Students must also take and pass a demanding exam. Source: Security University 
๏‚ท QSSE -- Qualified Software Security Expert Security University's QSSE certification combines coverage of key software security topics, tools and technologies with a hands-on, lab-oriented learning and testing program. To obtain QSSE certification, security professionals must complete a software security bootcamp and six courses on topics such as: 
o Penetration testing 
o Breaking and fixing Web applications 
o Breaking and fixing software 
o Secure software programming 
o Software security ethical hacking Reverse engineering 
Source: Security University 
Forensics/antihacking -- Basic 
Return to Table of Contents 
๏‚ท BCF -- Computer Forensics (U.S.) The Computer Forensics (U.S.) certification is designed for experienced individuals who can analyze and collect evidence, recognize data types, follow proper examination procedures and initial analysis, use forensic tools, prepare for an investigation, and report findings. Source: Brainbench 
๏‚ท CCCI -- Certified Computer Crime Investigator (Basic) The CCCI is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Basic requirements include two years of experience (or a college degree, plus one year of experience), 18 months of investigative experience, 40 hours of computer crimes training and documented experience from at least 10 investigated cases. Source: High Tech Crime Network certifications 
๏‚ท CCFT -- Certified Computer Forensic Technician (Basic) The CCFT is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Basic requirements include three years of experience (or a college degree, plus one year of experience), 18 months of forensics experience, 40 hours of computer forensics training and documented experience from at least 10 investigated cases. Source: High Tech Crime Network certifications
๏‚ท CEECS -- Certified Electronic Evidence Collection Specialist Certification The CEECS identifies individuals who successfully complete the CEECS certification course. No prerequisites are required to attend the course, which covers the basics of evidence collection in addition to highly technical terminology, theories and techniques. Source: International Association of Computer Investigative Specialists 
๏‚ท CERI-CFE -- Computer Forensic Examination The CERI-CFE seeks to identify law enforcement officials with basic computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, one year of Microsoft platform analysis, six months of non-Microsoft platform analysis, 40 hours of approved training, a written exam and successful completion of hands-on exercises. Source: Cyber Enforcement Resources Inc. 
๏‚ท NSA -- EC-Council Network Security Administrator The NSA identifies individuals who can evaluate internal and external security threats against a network, and develop and implement security policies. One exam is required. Source: EC-Council 
Forensics/antihacking -- Intermediate 
Return to Table of Contents 
๏‚ท CCE -- Certified Computer Examiner The CCE, by the International Society of Forensic Computer Examiners, seeks to identify individuals with no criminal record who have appropriate computer forensics training or experience, including evidence gathering, handling and storage. In addition, candidates must pass an online examination and successfully perform a hands-on examination on three test media. Source: International Society of Forensic Computer Examiners 
๏‚ท CEH -- Certified Ethical Hacker The CEH identifies security professionals capable of finding and detecting weaknesses and vulnerabilities in computer systems and networks by using the same tools and applying the same knowledge as a malicious hacker. Candidates must pass a single exam and prove knowledge of tools used both by hackers and security professionals. Source: EC-Council 
๏‚ท CFCE -- Computer Forensic Computer Examiner The International Association of Computer Investigative Specialists (IACIS) offers this credential to law enforcement and private industry personnel alike. Candidates must have broad knowledge, training or experience in computer forensics, including forensic procedures and standards, as well as ethical, legal and privacy issues. Certification includes both hands-on performance-based testing as well as a written exam. Source: International Association of Computer Investigative Specialists 
๏‚ท CHFI -- Computer Hacking Forensic Investigator The CHFI is geared toward personnel in law enforcement, defense, military,
information technology, law, banking and insurance, among others. To obtain CHFI certification, a candidate needs to successfully complete one exam. Source: EC-Council 
๏‚ท CNDA -- Certified Network Defense Architect The CNDA is geared toward IT personnel who act as penetration testers or legitimate hackers to test the strength and integrity of a network's defense. To obtain CNDA certification, a candidate needs to successfully complete one exam. Source: EC-Council 
๏‚ท CSFA -- CyberSecurity Forensic Analyst The CSFA aims to identify individuals who are interested in information technology security issues, especially at the hardware level. Prerequisites include attendance of the CyberSecurity Institute's Computer Forensics Core Competencies course or at least one of the following certifications: 
o AccessData Certified Examiner (ACE) 
o Certified Forensic Computer Examiner (CFCE) 
o Certified Computer Examiner (CCE) 
o Computer Hacking Forensic Investigator (CHFI) 
o EnCase Certified Examiner (EnCE) 
o GIAC Certified Forensics Analyst (GCFA) 
In addition, candidates should have at least 18 months of experience performing forensic analysis of Windows FAT and NTFS file systems and writing forensic analysis reports. Candidates must have no criminal record. Source: CyberSecurity Institute 
๏‚ท ECSA -- EC-Council Certified Security Analyst The ECSA identifies security professionals capable of using advanced methodologies, tools and techniques to analyze and interpret security tests. Candidates must pass a single exam to achieve certification. The EC-Council recommends that candidates take a five-day training course to prepare for the exam. Source: EC-Council 
๏‚ท GIAC -- Global Information Assurance Certification Program This cert program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused, and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. The program includes one mid-level forensics certification -- GIAC Certified Forensics Analyst (GCFA). Source: Global Information Assurance Certification 
Forensics/antihacking -- Advanced 
Return to Table of Contents
๏‚ท CCCI -- Certified Computer Crime Investigator (Advanced) The CCCI is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Advanced requirements entail three years of experience (or a college degree, plus two years of experience), four years of investigations, 80 hours of training and involvement as a lead investigator in 20 cases, with involvement in over 60 cases overall. Source: High Tech Crime Network certifications 
๏‚ท CCFT -- Certified Computer Forensic Technician (Advanced) The CCFT is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Basic requirements include three years of experience (or a college degree, plus one year of experience), 18 months of forensics experience, 40 hours of computer forensics training and documented experience from at least 10 investigated cases. Advanced requirements entail three years of experience (or a college degree, plus two years of experience), four years of investigations, 80 hours of training and involvement as a lead investigator in 20 cases with involvement in over 60 cases overall. Source: High Tech Crime Network certifications 
๏‚ท CERI-ACFE -- Advanced Computer Forensic Examination The CERI-ACFE seeks to identify law enforcement officials with advanced computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, four years of Microsoft platform analysis, two years of non-Microsoft platform analysis, 80 hours of approved training, a written exam and successful completion of hands-on exercises. Source: Cyber Enforcement Resources Inc. 
๏‚ท CERI-ACSS -- Advanced Computer System Security The CERI-ACSS seeks to identify law enforcement officials with advanced computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, three years of Microsoft platform analysis, one year of non-Microsoft platform analysis, 40 hours of approved training, a written exam and successful completion of hands-on exercises. (Note: because of double coverage, this item is also listed under the General Security โ€“ Advanced section as well.) Source: Cyber Enforcement Resources Inc. 
๏‚ท CPTE -- Certified Pen Testing Expert This credential stresses currency on the latest exploits, vulnerabilities and system penetration techniques. It also focuses on business skills, identification of protection opportunities, testing justifications and optimization of security controls to meet business needs and control risks and exposures. The CPTE covers many of the same topics as the lower level CPTS certification but in much more depth and breadth. The CPTE credential is structured around a five- day course that's backed up by the CPTE exam. Source: Mile2 
๏‚ท LPT -- Licensed Penetration Tester The LPT identifies security professionals who can thoroughly analyze the
security of a network and recommend appropriate corrective measures. An LPT must adhere to a strict code of ethics, best practices and appropriate compliance requirements while performing penetration tests. Prerequisites include EC- Council's CEH and ECSA certifications, and candidates must submit an LPT application, endorsement by a sponsoring agency, proof of a clean background check, detailed resume and an agreement to abide by a code of ethics. In addition, candidates must attend a three-day LPT training program through an EC-Council accredited training center. Source: EC-Council 
๏‚ท PCI -- Professional Certified Investigator This is a high-level certification from the American Society for Industrial Security (ASIS is also home to the CPP and PSP certifications) for those who specialize in investigating potential cybercrimes. Thus, in addition to technical skills, this certification concentrates on testing individuals' knowledge of legal and evidentiary matters required to present investigations in a court of law, including case management, evidence collection and case presentation. This cert requires five years of investigation experience, with at least two years in case management (a bachelor's degree or higher counts for up to two years of such experience) and a clean legal record for candidates. Source: ASIS International 
Specialized 
Return to Table of Contents 
๏‚ท CCSA -- Certification in Control Self-Assessment The CCSA demonstrates knowledge of internal control self-assessment procedures, primarily aimed at financial and records controls. This cert is of primary interest to those professionals who must evaluate IT infrastructures for possible threats to financial integrity, legal requirements for confidentiality and regulatory requirements for privacy. Source: Institute of Internal Auditors 
๏‚ท CFE -- Certified Fraud Examiner The CFE demonstrates ability to detect financial fraud and other white-collar crimes. This cert is of primary interest to full-time security professionals in law, law enforcement or those who work in organization with legal mandates to audit for possible fraudulent or illegal transactions and activities (such as banking, securities trading or classified operations). Source: Association of Certified Fraud Examiners 
๏‚ท CFSA -- Certified Financial Services Auditor The CFSA identifies professional auditors with thorough knowledge of auditing principles and practices in the banking, insurance and securities financial services industries. Candidates must have a four-year degree or a two-year degree with three years of experience in a financial services environment, submit a character reference and show proof of at least two years of appropriate auditing experience. To obtain this certification, candidates must pass one exam. Source: The Institute of Internal Auditors
๏‚ท CGAP -- Certified Government Auditing Professional The CGAP identifies public-sector internal auditors who focus on fund accounting, grants, legislative oversight and confidentiality rights, among other facets of internal auditing. Candidates must have an appropriate four-year degree or a two-year degree with five years of experience in a public-sector environment, submit a character reference and show proof of at least two years of direct government auditing experience. To obtain this certification, candidates must pass one exam. Source: The Institute of Internal Auditors 
๏‚ท CIA -- Certified Internal Auditor The CIA cert demonstrates knowledge of professional financial auditing practices. The cert is of primary interest to financial professionals responsible for auditing IT practices and procedures, as well as standard accounting practices and procedures to insure the integrity and correctness of financial records, transaction logs and other records relevant to commercial activities. Source: Institute of Internal Auditors 
๏‚ท CISA -- Certified Information Systems Auditor The CISA demonstrates knowledge of IS auditing for control and security purposes. This cert is of primary interest to IT security professionals responsible for auditing IT systems, practices and procedures to make sure organizational security policies meet governmental and regulatory requirements, conform to best security practices and principles, and meet or exceed requirements stated in an organization's security policy. Source: Information Systems Audit and Control Association 
๏‚ท ECSP -- EC-Council Certified Secure Programmer The ECSP identifies programmers who can design and build relatively bug-free, stable Windows- and Web-based applications with the .NET/Java Framework, greatly reducing exploitation by hackers and the incorporation of malicious code. Candidates must attend a Writing Secure Code training course and pass a single exam. Source: EC-Council 
๏‚ท Security5 Security5 certification identifies non-IT office workers and home users who understand Internet security terminology, know how to use defense programs such as antivirus and antispyware applications, can implement basic operating system security and follow safe Web and e-mail practices. Candidates must attend a two-day course and pass one exam. Source: EC-Council 
Additional resources 
Return to Table of Contents 
๏‚ท Analysis of the security certification landscape Ed Tittel and Kim Lindros offer their insight on the state of the security
certification landscape, including a certification plan that individuals can start at any point, depending on current knowledge, skills and experience. 
๏‚ท Security School: Training for CISSP certification SearchSecurity.com partners with Shon Harris, CISSP and author of CISSP All- in-One Exam Guide, to bring you a series of webcasts and additional study materials on each of the ten domains of the Common Body of Knowledge. 
๏‚ท Credentials: To be or not to be certified It's a good idea to revisit your career and education goals at least once a year. 
๏‚ท Does job security for security technology jobs exist? One key to job security in the infosec field is maintaining your education. 
๏‚ท Guide to vendor-specific security certs Ed Tittel and Kim Lindros provide an overview of vendor-specific security certifications.

More Related Content

What's hot

Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?
Jim Meyer
ย 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
Tuan Phan
ย 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
Tuan Phan
ย 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
Infosec
ย 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
David Ochel
ย 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
ย 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
ShivamSharma909
ย 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
ย 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
Donald E. Hester
ย 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind mapDavid Kennedy
ย 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
ย 
COBIT
COBITCOBIT
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
Cohesive Networks
ย 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
ย 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
Infosec
ย 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
Securestorm
ย 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
ย 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
Health IT Conference โ€“ iHT2
ย 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417James W. De Rienzo
ย 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
Vilius Benetis
ย 

What's hot (20)

Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?
ย 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
ย 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
ย 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
ย 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
ย 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
ย 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
ย 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
ย 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
ย 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind map
ย 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
ย 
COBIT
COBITCOBIT
COBIT
ย 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
ย 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
ย 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
ย 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
ย 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
ย 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
ย 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
ย 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
ย 

Similar to File1

Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
Nithin Sai
ย 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
lfh663
ย 
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
ACS Networks and Technologies Pvt. Ltd.
ย 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
Infosectrain3
ย 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
Shahzeb Pirzada
ย 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
infosec train
ย 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
Mercury Solutions Limited
ย 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
InfosecTrain
ย 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
Helen Njuguna
ย 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
Infosectrain3
ย 
Whatโ€™s New in CYSA+ Exam (CSO-002).pdf
Whatโ€™s New in CYSA+ Exam (CSO-002).pdfWhatโ€™s New in CYSA+ Exam (CSO-002).pdf
Whatโ€™s New in CYSA+ Exam (CSO-002).pdf
infosec train
ย 
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
John Kingsley
ย 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
Sprintzeal
ย 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
jkllee
ย 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
jkllee
ย 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
Sprintzeal
ย 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
Infosectrain3
ย 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
Calvin Sam
ย 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
ITpreneurs
ย 

Similar to File1 (20)

Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
ย 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
ย 
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
ย 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
ย 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
ย 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
ย 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
ย 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
ย 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
ย 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
ย 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
ย 
Whatโ€™s New in CYSA+ Exam (CSO-002).pdf
Whatโ€™s New in CYSA+ Exam (CSO-002).pdfWhatโ€™s New in CYSA+ Exam (CSO-002).pdf
Whatโ€™s New in CYSA+ Exam (CSO-002).pdf
ย 
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
ย 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
ย 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
ย 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
ย 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
ย 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
ย 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
ย 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
ย 

Recently uploaded

5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
ย 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
ย 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
ย 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
ย 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
ย 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
ย 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
ย 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
ย 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
ย 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
ย 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
ย 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
ย 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
ย 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
ย 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
ย 

Recently uploaded (20)

5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ย 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
ย 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
ย 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
ย 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
ย 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
ย 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
ย 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
ย 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ย 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
ย 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
ย 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
ย 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
ย 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
ย 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
ย 

File1

  • 1. ๏‚ท GIAC -- Global Information Assurance Certification Program This program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. Available entry-level certifications include the following: o GIAC Certified ISO-17799 Specialist (G7799) o GIAC Information Security Fundamentals (GISF) o GIAC Information Security Professional (GISP) o GIAC IT Security Audit Essentials (GSAE) o GIAC Operations Essentials Certification (GOEC) o GIAC Security Essentials Certification (GSEC) Source: Global Information Assurance Certification ๏‚ท Security Certified Network Specialist (SCNS) This entry-level security certification focuses on tactical perimeter defense -- firewalls, intrusion detection and router security. The SCNS is the starting point for individuals who want to attain the Security Certified Network Professional and Security Certified Network Architect certifications. (Please note that the SCNS and a revised version of the SCNP will be available some time during the second quarter of 2007.) Source: Security Certified Program ๏‚ท Security+ This security certification focuses on important security fundamentals related to security concepts and theory, as well as best operational practices. In addition to functioning as a standalone exam for CompTIA, Microsoft accepts the Security+ as an alternative to one of the specialization exams for the MCSA and MCSE Security specializations, and Symantec accepts Security+ as part of the requirements for the Symantec Certified Technology Architect credential. Source: CompTIA Security+ Certification Overview ๏‚ท SSCP -- Systems Security Certified Practitioner The entry-level precursor to the ISCยฒ's CISSP, the SSCP exam covers seven of the 10 domains in the CISSP Common Body of Knowledge. The exam focuses more on operational and administrative issues relevant to information security and less on information policy design, risk assessment details and other business analysis skills that more germane to a senior IT security professional (and less so to a day-to-day security administrator, which is where the SSCP is really focused). Source: (ISC)ยฒ ๏‚ท Wireless# This entry-level certification recognizes individuals who have an essential understanding of leading wireless technologies such as Wi-Fi, Bluetooth, WiMAX, ZigBee, Infrared, RFID and VoWLAN. It also covers basic WLAN
  • 2. security issues and best related practices. To obtain this credential, candidates must pass one exam. Source: Planet3 Wireless General security -- Intermediate Return to Table of Contents ๏‚ท BISA -- Brainbench Information Security Administrator This Brainbench certification tests knowledge of networking and Internet security, including authorization, authentication, firewalls, encryption, disaster recovery and more. Source: Brainbench ๏‚ท CAP โ€“ Certification and Accreditation Professional The CAP aims to identify individuals who can assess and manage the risks that security threats can pose within an organization, particularly in the government and enterprise sectors. This is a credential that deals with processes and practices, and works in tandem with emerging compliance requirements (Sarbanes-Oxley, HIPAA, and so forth) as well as emerging best industry governance standards (ITIL). Source: ISCยฒ ๏‚ท CWSP -- Certified Wireless Security Professional This certification recognizes individuals who can design, implement and manage wireless LAN security. To obtain this credential, candidates must pass two exams. Source: Planet3 Wireless ๏‚ท GIAC -- Global Information Assurance Certification Program This cert program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. Available intermediate certifications include the following: o GIAC Assessing Wireless Networks (GAWN) o GIAC Certified Firewall Analyst (GCFW) o GIAC Certified Intrusion Analyst (GCIA) o GIAC Certified Incident Manager (GCIM) o GIAC Certified Security Consultant (GCSC) o GIAC Certified Incident Handler (GCIH) o GIAC Certified Windows Security Administrator (GCWN) o GIAC Certified UNIX Security Administrator (GCUX) o GIAC Legal Issues (GLEG) o GIAC Securing Oracle Certification (GSOC) o GIAC Security Leadership (GSLC) o GIAC Systems and Network Auditor (GSNA)
  • 3. Source: Global Information Assurance Certification ๏‚ท SCNP -- Security Certified Network Professional This mid-level security certification focuses on strategic infrastructure security, including packet structure analysis, security policies, risk analysis, ethical hacking techniques, Internet security, cryptography, and hardening Linux and Windows systems. Individuals who attain this certification will be able to work as full-time IT security professionals with an operations focus. As of Q2 2007, the SCNS (described in the section on entry level certifications in this guide) is required as a pre-requisite for those pursuing this credential. Source: Security Certified Program ๏‚ท SCNA -- Security Certified Network Architect This is a mid- to senior-level security certification that focuses on concepts, planning and implementation of enterprise security topics, such as Private Key Infrastructure, biometric authentication and identification systems, digital certificates, cryptography and more. Individuals who attain this certification will be able to implement these technologies within organizations or as consultants to such organizations. Source: Security Certified Program General security -- Advanced Return to Table of Contents ๏‚ท CERI-ACSS -- Advanced Computer System Security The CERI-ACSS seeks to identify law enforcement officials with advanced computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, three years of Microsoft platform analysis, one year of non-Microsoft platform analysis, 40 hours of approved training, a written exam and successful completion of hands-on exercises. (Note: because of its "double coverage" this item also appears in the Forensics/antihacking โ€“ Advanced section as well.) Source: Cyber Enforcement Resources Inc. ๏‚ท CISM -- Certified Information Security Manager The CISM demonstrates knowledge of information security for IT professionals responsible for handling security matters, issues and technologies. This cert is of primary interest to IT professionals responsible for managing IT systems, networks, policies, practices and procedures to make sure organizational security policies meet governmental and regulatory requirements, conform to best security practices and principles, and meet or exceed requirements stated in an organization's security policy. Source: Information Systems Audit and Control Association ๏‚ท CISSP -- Certified Information Systems Security Professional The CISSP demonstrates knowledge of network and system security principles, safeguards and practices. It is of primary interest to full-time IT security professionals who work in internal security positions or who consult with third parties on security matters. CISSPs are capable of analyzing security requirements, auditing security practices and procedures, designing and implementing security policies, and managing and maintaining an ongoing and
  • 4. effective security infrastructure. CISSP candidates must have four years of experience (or a college degree plus three years of experience; a Master's Degree in Information Security counts toward one year of experience). Source: (ISC)ยฒ ๏‚ท CPTS -- Certified Pen Testing Specialist An offering from Iowa-based training company, Mile2, this credential stresses currency on the latest exploits, vulnerabilities and system penetration techniques. It also focuses on business skills, identification of protection opportunities, testing justifications and optimization of security controls to meet business needs and control risks and exposures. The credential is structured around a five-day course that's backed up by the CPTS or Certified Ethical Hacker exam, both delivered by Prometric. Source: Mile2 ๏‚ท CPP -- Certified Protection Professional The CPP demonstrates a thorough understanding of physical, human and information security principles and practices. The most senior and prestigious IT security professional certification covered in this article, the CPP requires extensive on-the-job experience (nine years or seven years with a college degree), as well as a profound knowledge of technical and procedural security topics and technologies. Only those who have worked with and around security for some time are able to qualify for this credential. Source: American Society for Industrial Security (ASIS) ๏‚ท GIAC -- Global Information Assurance Certification Program This cert program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused, and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. The GIAC Security Engineer (GSE) track is the most senior-level certification in that program. Candidates must complete three intermediate-level GIAC certifications (GSEC, GCIA and GCIH), earning GIAC Gold in at least two of them, and pass two proctored exams to qualify for this certification. There's also the GIAC .NET Certification (GNET), which we've decided to upgrade to an advanced level because of the extensive programming knowledge and experience required to earn this credential. GNET Source: Global Information Assurance Certification GSE Source: Global Information Assurance Certification ๏‚ท ISSAP -- Information Systems Security Architecture Professional The ISSAP permits CISSPs to concentrate further in information security architecture and stresses the following elements of the CBK: o Access control systems and methodologies o Telecommunications and network security o Cryptography o Requirements analysis and security standards, guidelines and criteria
  • 5. o Technology-related business continuity and disaster recovery planning (BCP and DRP) o Physical security integration Source: (ISC)ยฒ ๏‚ท ISSEP -- Information Systems Security Engineering Professional The ISSEP permits CISSPs who work in areas related to national security to concentrate further in security engineering, in cooperation with the NSA. The ISSEP stresses the following elements of the CBK: o Systems security engineering o Certification and accreditation o Technical management o U.S. government information assurance regulations Source: (ISC)ยฒ ๏‚ท ISSMP -- Information Systems Security Management Professional The ISSMP permits CISSPs to concentrate further in security management areas and stresses the following elements of the CBK: o Enterprise security management practices o Enterprise-wide system development security o Overseeing compliance of operations security o Understanding BCP, DRP and continuity of operations planning (COOP) o Law, investigations, forensics and ethics Source: (ISC)ยฒ ๏‚ท PSP -- Physical Security Professional Another high-level security certification from ASIS, this program focuses on matters relevant to maintaining security and integrity of the premises, and access controls over the devices and components of an IT infrastructure. Key topics covered include physical security assessment, and selection and implementation of appropriate integrated physical security measures. Requirements include five years of experience in physical security, a high school diploma (or GED) and a clean criminal record. Source: ASIS International: Physical Security Professional ๏‚ท QIAP -- Qualified Information Assurance Professional Security University's QIAP certification combines coverage of key information security topics, tools and technologies with a hands-on, lab-oriented learning and testing program. To obtain QIAP certification, security professionals must complete three courses on topics such as: o Access, authentication and Public Key Infrastructure o Network security policy and security-oriented architect o Certification and accreditation Students must also take and pass three exams, one per course. Source: Security University
  • 6. ๏‚ท QISP -- Qualified Information Security Professional Security University's QISP certification combines coverage of key information security topics, tools and technologies with a hands-on, lab-oriented learning and testing program. SU offers QISP certification with four concentrations: analyst/penetration tester, Security hacker/defender, edge protection and forensics. To obtain QISP certification security professionals must complete five courses, depending on their concentration. Students must also take and pass a demanding exam. Source: Security University ๏‚ท QSSE -- Qualified Software Security Expert Security University's QSSE certification combines coverage of key software security topics, tools and technologies with a hands-on, lab-oriented learning and testing program. To obtain QSSE certification, security professionals must complete a software security bootcamp and six courses on topics such as: o Penetration testing o Breaking and fixing Web applications o Breaking and fixing software o Secure software programming o Software security ethical hacking Reverse engineering Source: Security University Forensics/antihacking -- Basic Return to Table of Contents ๏‚ท BCF -- Computer Forensics (U.S.) The Computer Forensics (U.S.) certification is designed for experienced individuals who can analyze and collect evidence, recognize data types, follow proper examination procedures and initial analysis, use forensic tools, prepare for an investigation, and report findings. Source: Brainbench ๏‚ท CCCI -- Certified Computer Crime Investigator (Basic) The CCCI is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Basic requirements include two years of experience (or a college degree, plus one year of experience), 18 months of investigative experience, 40 hours of computer crimes training and documented experience from at least 10 investigated cases. Source: High Tech Crime Network certifications ๏‚ท CCFT -- Certified Computer Forensic Technician (Basic) The CCFT is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Basic requirements include three years of experience (or a college degree, plus one year of experience), 18 months of forensics experience, 40 hours of computer forensics training and documented experience from at least 10 investigated cases. Source: High Tech Crime Network certifications
  • 7. ๏‚ท CEECS -- Certified Electronic Evidence Collection Specialist Certification The CEECS identifies individuals who successfully complete the CEECS certification course. No prerequisites are required to attend the course, which covers the basics of evidence collection in addition to highly technical terminology, theories and techniques. Source: International Association of Computer Investigative Specialists ๏‚ท CERI-CFE -- Computer Forensic Examination The CERI-CFE seeks to identify law enforcement officials with basic computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, one year of Microsoft platform analysis, six months of non-Microsoft platform analysis, 40 hours of approved training, a written exam and successful completion of hands-on exercises. Source: Cyber Enforcement Resources Inc. ๏‚ท NSA -- EC-Council Network Security Administrator The NSA identifies individuals who can evaluate internal and external security threats against a network, and develop and implement security policies. One exam is required. Source: EC-Council Forensics/antihacking -- Intermediate Return to Table of Contents ๏‚ท CCE -- Certified Computer Examiner The CCE, by the International Society of Forensic Computer Examiners, seeks to identify individuals with no criminal record who have appropriate computer forensics training or experience, including evidence gathering, handling and storage. In addition, candidates must pass an online examination and successfully perform a hands-on examination on three test media. Source: International Society of Forensic Computer Examiners ๏‚ท CEH -- Certified Ethical Hacker The CEH identifies security professionals capable of finding and detecting weaknesses and vulnerabilities in computer systems and networks by using the same tools and applying the same knowledge as a malicious hacker. Candidates must pass a single exam and prove knowledge of tools used both by hackers and security professionals. Source: EC-Council ๏‚ท CFCE -- Computer Forensic Computer Examiner The International Association of Computer Investigative Specialists (IACIS) offers this credential to law enforcement and private industry personnel alike. Candidates must have broad knowledge, training or experience in computer forensics, including forensic procedures and standards, as well as ethical, legal and privacy issues. Certification includes both hands-on performance-based testing as well as a written exam. Source: International Association of Computer Investigative Specialists ๏‚ท CHFI -- Computer Hacking Forensic Investigator The CHFI is geared toward personnel in law enforcement, defense, military,
  • 8. information technology, law, banking and insurance, among others. To obtain CHFI certification, a candidate needs to successfully complete one exam. Source: EC-Council ๏‚ท CNDA -- Certified Network Defense Architect The CNDA is geared toward IT personnel who act as penetration testers or legitimate hackers to test the strength and integrity of a network's defense. To obtain CNDA certification, a candidate needs to successfully complete one exam. Source: EC-Council ๏‚ท CSFA -- CyberSecurity Forensic Analyst The CSFA aims to identify individuals who are interested in information technology security issues, especially at the hardware level. Prerequisites include attendance of the CyberSecurity Institute's Computer Forensics Core Competencies course or at least one of the following certifications: o AccessData Certified Examiner (ACE) o Certified Forensic Computer Examiner (CFCE) o Certified Computer Examiner (CCE) o Computer Hacking Forensic Investigator (CHFI) o EnCase Certified Examiner (EnCE) o GIAC Certified Forensics Analyst (GCFA) In addition, candidates should have at least 18 months of experience performing forensic analysis of Windows FAT and NTFS file systems and writing forensic analysis reports. Candidates must have no criminal record. Source: CyberSecurity Institute ๏‚ท ECSA -- EC-Council Certified Security Analyst The ECSA identifies security professionals capable of using advanced methodologies, tools and techniques to analyze and interpret security tests. Candidates must pass a single exam to achieve certification. The EC-Council recommends that candidates take a five-day training course to prepare for the exam. Source: EC-Council ๏‚ท GIAC -- Global Information Assurance Certification Program This cert program seeks to identify individuals who can demonstrate knowledge of and the ability to manage and protect important information systems and networks. The SANS organization is well known for its timely, focused, and useful security information and certification program. A shining star on this landscape, the GIAC program aims at serious, full-time security professionals responsible for designing, implementing and maintaining a state-of-the-art security infrastructure that may include incident handling and emergency response team management. The program includes one mid-level forensics certification -- GIAC Certified Forensics Analyst (GCFA). Source: Global Information Assurance Certification Forensics/antihacking -- Advanced Return to Table of Contents
  • 9. ๏‚ท CCCI -- Certified Computer Crime Investigator (Advanced) The CCCI is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Advanced requirements entail three years of experience (or a college degree, plus two years of experience), four years of investigations, 80 hours of training and involvement as a lead investigator in 20 cases, with involvement in over 60 cases overall. Source: High Tech Crime Network certifications ๏‚ท CCFT -- Certified Computer Forensic Technician (Advanced) The CCFT is one of four computer forensic certifications aimed at law enforcement and private IT professionals seeking to specialize in the investigative side of the field. Basic requirements include three years of experience (or a college degree, plus one year of experience), 18 months of forensics experience, 40 hours of computer forensics training and documented experience from at least 10 investigated cases. Advanced requirements entail three years of experience (or a college degree, plus two years of experience), four years of investigations, 80 hours of training and involvement as a lead investigator in 20 cases with involvement in over 60 cases overall. Source: High Tech Crime Network certifications ๏‚ท CERI-ACFE -- Advanced Computer Forensic Examination The CERI-ACFE seeks to identify law enforcement officials with advanced computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, four years of Microsoft platform analysis, two years of non-Microsoft platform analysis, 80 hours of approved training, a written exam and successful completion of hands-on exercises. Source: Cyber Enforcement Resources Inc. ๏‚ท CERI-ACSS -- Advanced Computer System Security The CERI-ACSS seeks to identify law enforcement officials with advanced computer crime investigation experience and training. Requirements include two years of computer investigation/debugging, three years of Microsoft platform analysis, one year of non-Microsoft platform analysis, 40 hours of approved training, a written exam and successful completion of hands-on exercises. (Note: because of double coverage, this item is also listed under the General Security โ€“ Advanced section as well.) Source: Cyber Enforcement Resources Inc. ๏‚ท CPTE -- Certified Pen Testing Expert This credential stresses currency on the latest exploits, vulnerabilities and system penetration techniques. It also focuses on business skills, identification of protection opportunities, testing justifications and optimization of security controls to meet business needs and control risks and exposures. The CPTE covers many of the same topics as the lower level CPTS certification but in much more depth and breadth. The CPTE credential is structured around a five- day course that's backed up by the CPTE exam. Source: Mile2 ๏‚ท LPT -- Licensed Penetration Tester The LPT identifies security professionals who can thoroughly analyze the
  • 10. security of a network and recommend appropriate corrective measures. An LPT must adhere to a strict code of ethics, best practices and appropriate compliance requirements while performing penetration tests. Prerequisites include EC- Council's CEH and ECSA certifications, and candidates must submit an LPT application, endorsement by a sponsoring agency, proof of a clean background check, detailed resume and an agreement to abide by a code of ethics. In addition, candidates must attend a three-day LPT training program through an EC-Council accredited training center. Source: EC-Council ๏‚ท PCI -- Professional Certified Investigator This is a high-level certification from the American Society for Industrial Security (ASIS is also home to the CPP and PSP certifications) for those who specialize in investigating potential cybercrimes. Thus, in addition to technical skills, this certification concentrates on testing individuals' knowledge of legal and evidentiary matters required to present investigations in a court of law, including case management, evidence collection and case presentation. This cert requires five years of investigation experience, with at least two years in case management (a bachelor's degree or higher counts for up to two years of such experience) and a clean legal record for candidates. Source: ASIS International Specialized Return to Table of Contents ๏‚ท CCSA -- Certification in Control Self-Assessment The CCSA demonstrates knowledge of internal control self-assessment procedures, primarily aimed at financial and records controls. This cert is of primary interest to those professionals who must evaluate IT infrastructures for possible threats to financial integrity, legal requirements for confidentiality and regulatory requirements for privacy. Source: Institute of Internal Auditors ๏‚ท CFE -- Certified Fraud Examiner The CFE demonstrates ability to detect financial fraud and other white-collar crimes. This cert is of primary interest to full-time security professionals in law, law enforcement or those who work in organization with legal mandates to audit for possible fraudulent or illegal transactions and activities (such as banking, securities trading or classified operations). Source: Association of Certified Fraud Examiners ๏‚ท CFSA -- Certified Financial Services Auditor The CFSA identifies professional auditors with thorough knowledge of auditing principles and practices in the banking, insurance and securities financial services industries. Candidates must have a four-year degree or a two-year degree with three years of experience in a financial services environment, submit a character reference and show proof of at least two years of appropriate auditing experience. To obtain this certification, candidates must pass one exam. Source: The Institute of Internal Auditors
  • 11. ๏‚ท CGAP -- Certified Government Auditing Professional The CGAP identifies public-sector internal auditors who focus on fund accounting, grants, legislative oversight and confidentiality rights, among other facets of internal auditing. Candidates must have an appropriate four-year degree or a two-year degree with five years of experience in a public-sector environment, submit a character reference and show proof of at least two years of direct government auditing experience. To obtain this certification, candidates must pass one exam. Source: The Institute of Internal Auditors ๏‚ท CIA -- Certified Internal Auditor The CIA cert demonstrates knowledge of professional financial auditing practices. The cert is of primary interest to financial professionals responsible for auditing IT practices and procedures, as well as standard accounting practices and procedures to insure the integrity and correctness of financial records, transaction logs and other records relevant to commercial activities. Source: Institute of Internal Auditors ๏‚ท CISA -- Certified Information Systems Auditor The CISA demonstrates knowledge of IS auditing for control and security purposes. This cert is of primary interest to IT security professionals responsible for auditing IT systems, practices and procedures to make sure organizational security policies meet governmental and regulatory requirements, conform to best security practices and principles, and meet or exceed requirements stated in an organization's security policy. Source: Information Systems Audit and Control Association ๏‚ท ECSP -- EC-Council Certified Secure Programmer The ECSP identifies programmers who can design and build relatively bug-free, stable Windows- and Web-based applications with the .NET/Java Framework, greatly reducing exploitation by hackers and the incorporation of malicious code. Candidates must attend a Writing Secure Code training course and pass a single exam. Source: EC-Council ๏‚ท Security5 Security5 certification identifies non-IT office workers and home users who understand Internet security terminology, know how to use defense programs such as antivirus and antispyware applications, can implement basic operating system security and follow safe Web and e-mail practices. Candidates must attend a two-day course and pass one exam. Source: EC-Council Additional resources Return to Table of Contents ๏‚ท Analysis of the security certification landscape Ed Tittel and Kim Lindros offer their insight on the state of the security
  • 12. certification landscape, including a certification plan that individuals can start at any point, depending on current knowledge, skills and experience. ๏‚ท Security School: Training for CISSP certification SearchSecurity.com partners with Shon Harris, CISSP and author of CISSP All- in-One Exam Guide, to bring you a series of webcasts and additional study materials on each of the ten domains of the Common Body of Knowledge. ๏‚ท Credentials: To be or not to be certified It's a good idea to revisit your career and education goals at least once a year. ๏‚ท Does job security for security technology jobs exist? One key to job security in the infosec field is maintaining your education. ๏‚ท Guide to vendor-specific security certs Ed Tittel and Kim Lindros provide an overview of vendor-specific security certifications.