Submit Search
Upload
Fundamentals of Information Systems Security Chapter 14
•
Download as PPTX, PDF
•
1 like
•
319 views
Dr. Ahmed Al Zaidy
Follow
Chapter 14: Information Security Professional Certifications
Read less
Read more
Education
Report
Share
Report
Share
1 of 35
Download now
Recommended
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
Recommended
Fundamentals of Information Systems Security Chapter 12
Fundamentals of Information Systems Security Chapter 12
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 7
Fundamentals of Information Systems Security Chapter 7
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Dr. Ahmed Al Zaidy
Funsec3e ppt ch06
Funsec3e ppt ch06
Skillspire LLC
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
Dr. Ahmed Al Zaidy
Forensic3e ppt ch13
Forensic3e ppt ch13
Skillspire LLC
Forensic3e ppt ch03
Forensic3e ppt ch03
Skillspire LLC
Funsec3e ppt ch07
Funsec3e ppt ch07
Skillspire LLC
Funsec3e ppt ch11
Funsec3e ppt ch11
Skillspire LLC
Funsec3e ppt ch13
Funsec3e ppt ch13
Skillspire LLC
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Dr. Ahmed Al Zaidy
Funsec3e ppt ch14
Funsec3e ppt ch14
Skillspire LLC
Hacking3e ppt ch10
Hacking3e ppt ch10
Skillspire LLC
Forensic3e ppt ch08
Forensic3e ppt ch08
Skillspire LLC
Funsec3e ppt ch10
Funsec3e ppt ch10
Skillspire LLC
Funsec3e ppt ch03
Funsec3e ppt ch03
Skillspire LLC
Hacking3e ppt ch02
Hacking3e ppt ch02
Skillspire LLC
Forensic3e ppt ch06
Forensic3e ppt ch06
Skillspire LLC
Funsec3e ppt ch05
Funsec3e ppt ch05
Skillspire LLC
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Global Knowledge Training
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
More Related Content
What's hot
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Dr. Ahmed Al Zaidy
Funsec3e ppt ch06
Funsec3e ppt ch06
Skillspire LLC
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
Dr. Ahmed Al Zaidy
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
Dr. Ahmed Al Zaidy
Forensic3e ppt ch13
Forensic3e ppt ch13
Skillspire LLC
Forensic3e ppt ch03
Forensic3e ppt ch03
Skillspire LLC
Funsec3e ppt ch07
Funsec3e ppt ch07
Skillspire LLC
Funsec3e ppt ch11
Funsec3e ppt ch11
Skillspire LLC
Funsec3e ppt ch13
Funsec3e ppt ch13
Skillspire LLC
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Dr. Ahmed Al Zaidy
Funsec3e ppt ch14
Funsec3e ppt ch14
Skillspire LLC
Hacking3e ppt ch10
Hacking3e ppt ch10
Skillspire LLC
Forensic3e ppt ch08
Forensic3e ppt ch08
Skillspire LLC
Funsec3e ppt ch10
Funsec3e ppt ch10
Skillspire LLC
Funsec3e ppt ch03
Funsec3e ppt ch03
Skillspire LLC
Hacking3e ppt ch02
Hacking3e ppt ch02
Skillspire LLC
Forensic3e ppt ch06
Forensic3e ppt ch06
Skillspire LLC
Funsec3e ppt ch05
Funsec3e ppt ch05
Skillspire LLC
What's hot
(20)
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
Funsec3e ppt ch06
Funsec3e ppt ch06
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
Forensic3e ppt ch13
Forensic3e ppt ch13
Forensic3e ppt ch03
Forensic3e ppt ch03
Funsec3e ppt ch07
Funsec3e ppt ch07
Funsec3e ppt ch11
Funsec3e ppt ch11
Funsec3e ppt ch13
Funsec3e ppt ch13
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
Funsec3e ppt ch14
Funsec3e ppt ch14
Hacking3e ppt ch10
Hacking3e ppt ch10
Forensic3e ppt ch08
Forensic3e ppt ch08
Funsec3e ppt ch10
Funsec3e ppt ch10
Funsec3e ppt ch03
Funsec3e ppt ch03
Hacking3e ppt ch02
Hacking3e ppt ch02
Forensic3e ppt ch06
Forensic3e ppt ch06
Funsec3e ppt ch05
Funsec3e ppt ch05
Similar to Fundamentals of Information Systems Security Chapter 14
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Global Knowledge Training
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
cryptography.pptx
cryptography.pptx
MhndHTaani
Professional designations in it governance
Professional designations in it governance
jkllee
Professional Designations in IT Governance
Professional Designations in IT Governance
jkllee
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
Security_360_Marketing_Package
Security_360_Marketing_Package
Randy B.
Topic11
Topic11
Anne Starr
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
Jesse Wilkins
CompTIA PenTest+BETA EXAM CODE PT1-001
CompTIA PenTest+BETA EXAM CODE PT1-001
Joseph Holbrook, Chief Learning Officer (CLO)
File1
File1
ivanmagalhaes__
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Adam Levithan
Assocham conf grc sept 13
Assocham conf grc sept 13
subramanian K
Dr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptx
MhndHTaani
CompTIA PenTest+ Exam (PT0-001) Exam Review
CompTIA PenTest+ Exam (PT0-001) Exam Review
Joseph Holbrook, Chief Learning Officer (CLO)
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
NetCom Learning
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
Infosec
102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel
CV of Mohan M
CV of Mohan M
Mohan M
Similar to Fundamentals of Information Systems Security Chapter 14
(20)
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
cryptography.pptx
cryptography.pptx
Professional designations in it governance
Professional designations in it governance
Professional Designations in IT Governance
Professional Designations in IT Governance
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
Security_360_Marketing_Package
Security_360_Marketing_Package
Topic11
Topic11
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
CompTIA PenTest+BETA EXAM CODE PT1-001
CompTIA PenTest+BETA EXAM CODE PT1-001
File1
File1
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Assocham conf grc sept 13
Assocham conf grc sept 13
Dr_Kamal_ch01.pptx
Dr_Kamal_ch01.pptx
CompTIA PenTest+ Exam (PT0-001) Exam Review
CompTIA PenTest+ Exam (PT0-001) Exam Review
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
102 Information security standards and specifications
102 Information security standards and specifications
CV of Mohan M
CV of Mohan M
More from Dr. Ahmed Al Zaidy
Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
Dr. Ahmed Al Zaidy
Chapter 13 Programming for web forms
Chapter 13 Programming for web forms
Dr. Ahmed Al Zaidy
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
Dr. Ahmed Al Zaidy
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
Dr. Ahmed Al Zaidy
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
Dr. Ahmed Al Zaidy
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
Dr. Ahmed Al Zaidy
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
Dr. Ahmed Al Zaidy
Chapter 7 Designing a web form
Chapter 7 Designing a web form
Dr. Ahmed Al Zaidy
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
Dr. Ahmed Al Zaidy
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
Dr. Ahmed Al Zaidy
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
Dr. Ahmed Al Zaidy
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
Dr. Ahmed Al Zaidy
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
Dr. Ahmed Al Zaidy
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
Dr. Ahmed Al Zaidy
Integer overflows
Integer overflows
Dr. Ahmed Al Zaidy
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
Dr. Ahmed Al Zaidy
Fundamental of testing
Fundamental of testing
Dr. Ahmed Al Zaidy
Chapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
Dr. Ahmed Al Zaidy
Chapter 14 Business Continuity
Chapter 14 Business Continuity
Dr. Ahmed Al Zaidy
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
Dr. Ahmed Al Zaidy
More from Dr. Ahmed Al Zaidy
(20)
Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
Chapter 13 Programming for web forms
Chapter 13 Programming for web forms
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
Chapter 7 Designing a web form
Chapter 7 Designing a web form
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
Integer overflows
Integer overflows
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
Fundamental of testing
Fundamental of testing
Chapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
Chapter 14 Business Continuity
Chapter 14 Business Continuity
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
Recently uploaded
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
mini mental status format.docx
mini mental status format.docx
PoojaSen20
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Chameera Dedduwage
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
anshu789521
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
pboyjonauth
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Marc Dusseiller Dusjagr
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
JhengPantaleon
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
sanyamsingh5019
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
NirmalaLoungPoorunde1
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
TechSoup
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
UmakantAnnand
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
FatimaKhan178732
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
PoojaSen20
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
dawncurless
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
KarinaGenton
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Association for Project Management
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
chloefrazer622
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
GeoBlogs
Recently uploaded
(20)
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
mini mental status format.docx
mini mental status format.docx
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Fundamentals of Information Systems Security Chapter 14
1.
© 2018 Jones
and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Fundamentals of Information Systems Security Lesson 14 Information Security Professional Certifications
2.
Page 2Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 2Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Learning Objective(s) Describe information systems security educational opportunities and professional certifications.
3.
Page 3Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 3Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Key Concepts U.S. DoD/Military Directive 8570.01 and DoDD 8140.01 Popular vendor-neutral professional certifications Popular vendor-specific professional certifications
4.
Page 4Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 4Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DoD Directive 8570.01 “Information Assurance Training, Certification and Workforce Management” Affects any DoD facility or contractor organization Ensures that all personnel who are directly involved with information security possess security certifications
5.
Page 5Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 5Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DoD Directive 8140 A new, operationally focused cybersecurity training framework Will replace the 8570.01 directive Developed by the Defense Information Systems Agency (DISA)
6.
Page 6Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 6Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DoD Directive 8140 (cont.) Roles identified by the 8140 directive include: • Security provision • Operate and maintain • Protect and defend • Analyze • Operate and collect • Oversight and development • Investigate
7.
Page 7Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 7Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Joint Cyberspace Training and Certification Standards
8.
Page 8Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 8Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. U.S. DoD/NSA Training Standards Are actually training requirements for specific job responsibilities Developed by the CNSS and NSTISS committees Provide guidance for course and professional certification vendors to develop curriculum and materials that meet DoD/NSA requirements
9.
Page 9Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 9Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. U.S. DoD/NSA Training Standards Training Standard Description NSTISS- 4011 National Training Standard for Information Systems Security (InfoSec) Professionals CNSS-4012 National Information Assurance Training Standard for Senior System Managers CNSS-4013 National Information Assurance Training Standard for System Administrators (SA) CNSS-4014 Information Assurance Officer (IAO) Training NSTISSC-4015 National Training Standard for System Certifiers CNSS-4016 National Information Assurance Training Standard for Risk Analysts
10.
Page 10Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 10Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Vendor-Neutral Professional Certifications A certification is an official statement that validates the fact that a person has satisfied specific job requirements, including: • Possessing a certain level of experience • Completing a course of study • Passing an examination Certifications target specific areas of knowledge and expertise Vendor-neutral certifications cover concepts and topics that are general in nature
11.
Page 11Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 11Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Seven Main (ISC)2 Certifications SSCP CISSP CAP CSSLPCCFP HCISPP CCSP
12.
Page 12Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 12Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Seven Main (ISC)2 Certifications (cont.) SSCP • Covers the seven domains of best practices for information security CISSP • Demonstrates competence in the eight domains of the (ISC)2 CISSP Common Body of Knowledge (CBK) CAP • Provides a method to measure the knowledge and skills of professionals involved in authorizing and maintaining information systems
13.
Page 13Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 13Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Seven Main (ISC)2 Certifications (cont.) CSSLP • Evaluates professionals for the knowledge and skills necessary to develop and deploy secure applications CCFP • Tests and evaluates professionals for the knowledge and skills necessary to perform and conduct a digital forensics investigation
14.
Page 14Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 14Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Seven Main (ISC)2 Certifications (cont.) HCISPP • Tests and evaluates professionals for the knowledge and skills necessary to perform and conduct security and privacy work for health care organizations CCSP • Tests and evaluates professionals for the knowledge and skills necessary to secure and manage cloud computing environments
15.
Page 15Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 15Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Additional (ISC)2 Professional Certifications Architecture (CISSP-ISSAP) • Two years of professional experience in the area of architecture; appropriate for chief security architects and analysts Engineering (CISSP-ISSEP) • Road map for incorporating security into projects, applications, business processes, and all information systems Management (CISSP-ISSMP) • Two years enterprise-wide security operations and management; contains deeper managerial elements
16.
Page 16Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 16Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Global Information Assurance Certification (GIAC)/SANS Institute Offers approximately 30 individual credentials Spans several information security job disciplines: • Audit • Forensics • Legal • Management • Security administration • Software security
17.
Page 17Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 17Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. GIAC Credentials
18.
Page 18Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 18Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Certified Internet Webmaster (CIW) Credentials focus on both general and web- related security Credentials that satisfy CIW requirements include: • (ISC)2 SCCP or CISSP • Various GIAC credentials • CompTIA Security+ • Several vendor-specific credentials
19.
Page 19Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 19Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. CIW Credentials
20.
Page 20Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 20Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. CompTIA Security+ • Globally recognized • Entry-level information security certification of choice for IT professionals • Meets the ISO 17024 standard and is approved by the DoD 8570.01-M requirements • Is industry supported CompTIA Advanced Security Practitioner (CASP)
21.
Page 21Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 21Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. ISACA Is a nonprofit global organization that promotes “the development, adoption, and use of globally accepted, industry leading knowledge and practices for information systems” Provides security training at conferences and training events Offers four certifications for IT security professionals: CISM, CISA, CGEIT, and CRISC
22.
Page 22Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 22Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. ISACA Certifications
23.
Page 23Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 23Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Other Information Systems Security Certifications • CEH, CHFI, EC-Council Certified Security Analyst, and more EC-Council • CERT—Certified Computer Security Incident Handler, SEI—Authorized CERT Instructor Software Engineering Institute (Carnegie Mellon University • Multiple security certificationsMile2 • Multiple wireless security certifications Certified Wireless Security Professional
24.
Page 24Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 24Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Other Information Systems Security Certifications (cont.) • Certified Computer Crime Investigator, Certified Computer Forensic Technician High Tech Crime Network • Certified Computer Examiner (CCE) International Society of Forensic Computer Examiners • CyberSecurity Forensic Analyst (CSFA) CyberSecurity Institute • Multiple certifications Offensive Security
25.
Page 25Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 25Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Vendor-Specific Professional Certifications Certifications offered by vendors of hardware and software products Holding a certification for a specific vendor implies competence If an applicant meets requirements for a certification, applicant has a certain level of knowledge and skills
26.
Page 26Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 26Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Cisco Systems One of the largest manufacturers of network security devices and software Offers a range of certifications for its networking products Offers several different certification levels along different tracks that enable security professionals to focus efforts on specific knowledge and skills they need to get the most out of Cisco equipment
27.
Page 27Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 27Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Cisco Systems (cont.) Levels Entry Associate Professional Expert Architect Paths Design Security Voice Wireless Routing and Switching Service Provider
28.
Page 28Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 28Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Cisco Certifications
29.
Page 29Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 29Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Juniper Networks Manufactures a variety of network security hardware and software Offers a varied range of certifications for its networking product line Four levels from 11 different tracks Does not offer certifications at all levels for every track
30.
Page 30Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 30Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Juniper Networks Certification Levels and Tracks
31.
Page 31Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 31Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. RSA Global provider of security, risk, and compliance solutions for enterprise environments Provides specific training and certifications to help security professionals use RSA products effectively Offers certifications for RSA Archer and RSA SecurID
32.
Page 32Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 32Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Symantec Provides a wide range of security software products Offers certifications for its product lines, including: • Administration of Symantec NetBackup for UNIX • Administration of Symantec Enterprise Vault for Exchange • Administration of Symantec Endpoint Protection • Administration of Symantec NetBackup for Windows
33.
Page 33Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 33Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Check Point Global manufacturer of network and security devices and software Provides training and certification paths for security professionals to encourage highest level of knowledge and skills in the use of Check Point products Requires that applicants pass an exam that involves 80 percent study materials and 20 percent hands-on experience
34.
Page 34Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 34Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Check Point Certifications
35.
Page 35Fundamentals of
Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page 35Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Summary U.S. DoD/Military Directive 8570.01 and DoDD 8140.01 Popular vendor-neutral professional certifications Popular vendor-specific professional certifications
Download now