Security Certification

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Reasons to Become CISSP Certified Keith A. Watson, CISSP CERIAS.
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Security and Personnel
StanSource Inc. is Information Technology services and solutions providing organization engaged in providing a full range of solutions and services to.
INFORMATION SECURITY MANAGEMENT L ECTURE 10: P ERSONNEL & S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development EDUCAUSE Live! November 14,
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Stephen S. Yau CSE , Fall Security Strategies.
(c) 2004 Allan Berg Building the Security Workforce of Tomorrow Allan Berg University of Dallas Graduate School of Management.
Security Certifications
What is CISSP Anyway? A Presentation by: George L. McMullin II, CISSP COO, CorpNet Security, Inc. Executive Director, NEbraskaCERT.
Certified Information System Security Professional (CISSP)
Module 1 – MIS Careers & Intro to Systems Architecture MIS5122: Enterprise Architecture for IT Auditors.
Certification and Training Presented by Sam Jeyandran.
1 © (ISC) 2, 2002 INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Andreja Satran, (ISC)2 & ITIL Manager qSTC - (ISC)2 Certified.
W. Hord Tipton, CISSP- ISSEP, CAP, CISA (ISC)² Executive Director.
SOFTWARE SECURITY EDUCATION WHAT NEXT???? Submitted by Srinath Viswanathan Srinivas Gudisagar
SEC835 Database and Web application security Information Security Architecture.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Overview of Systems Audit
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
The Guide to the Software Engineering Body of Knowledge
Доколку не сакате сами себе си да си помогнете, никој не може да ви помогне IT auditing as a profession at 4 th MASIT Open Days, Skopje 28 th of September.
SCSC 311 Information Systems: hardware and software.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
CISSP Thomas Moore. Thomas Moore, Ph.D., EMBA BCSA BCSP LCNAD CISM CISSP LMNOP (Licensed Microsoft Network Operations Professional) B.S. No, really, in.
CISSP Best Practices Guide to the Basics of Certified Information Systems Security Professional 1 The Certified Information System Security Professional.
Hosted by Staffing Security Positions How To Choose The Right Personnel Jeffrey Posluns, CISA, CISSP, SSCP, CCNP, GSEC SecuritySage Inc.
Engineering Essential Characteristics Security Engineering Process Overview.
Certified Information System Security Professional (CISSP)
IT Controls Global Technology Auditing Guide 1.
Center for Cybersecurity Research and Education (CCRE)
2 Information System Security Association ISSA Buffalo Niagara Introduction to CISSP Study Sessions.
Introduction to Information Security
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
SecSDLC Chapter 2.
CSCE 727 Industry Certifications in IA. Global IA Workforce Trends A Frost & Sullivan Market Survey Sponsored by (ISC) 2® Prepared by Robert Ayoub, CISSP,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA Concentrations June 24, 2008 Cisco Confidential.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Job offer IT Infrastructure Specialist We are currently looking for an IT infrastructure specialist in order to respond to one key-account customer demand.
Computer & Info Security Instructor: David Wilkeson, CISSP Class Website: Grades.
Access Control. Assignment Review  Current  Next 6/23/2016 Access Control 2.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
LINUX ADMIN CERTIFICATION PART OF THE CISCO AAT DEGREE DRAFT PROPOSAL.
نبذة عن دورات الترقي الوظيفي
MS in IT Auditing, Cyber Security, and Risk Assessment
Overview of IT Auditing
Security Criteria, Certifications, and Training
Associate Degree in Cyber security
CISSP TRAINING IN.
Careers in IT.
CMGT 245 Possible Is Everything/snaptutorial.com
Building the Security Workforce of Tomorrow
Building the Security Workforce of Tomorrow
CS 490/CIS 790 Information System Security
Information Assurance & Network Security Certificate
CompTIA A+ Essentials (2015 Edition) Objectives Exam Number:
Security week 1 Introductions Class website Syllabus review
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security Certification David Cass, CISSP, NSA-IAM

Why Security Certification Professional validation of skills exposure to industry standards best practices baseline skills for a specific role

Why Security Certification Internal & External Value Credible advice & support Quality of work & productivity Differentiation of your organization or group Culture of excellence

Why Security Certification Not a substitute for years of experience

Which certifications are right for my organization? Organizational Needs Assessment: Roles & Responsibilities Experience Types of Infrastructure equipment supported

Security Certifications Classifications: Benchmark Wide recognition by professionals in all sectors Advanced level Prerequisite for many senior jobs Foundation Introductory certifications One to four years of experience

Security Certifications Classifications: Intermediate 3 to 4 years of networking experience 2 years of IT Security experience Advanced Expert level Minimum of 4 years of IT Security experience

Security Certifications Vendor and Product Specific Hardware/ software dependent Range from intro to expert or advanced levels Examples include: Cisco, Check Point, Symantec, Tivoli, Microsoft, and others

Security Certifications Benchmark certifications: CISSP isc2.org Common Body of Knowledge Access Control Systems and Methodology Applications & Systems Development Business Continuity Planning Cryptography Law, Investigation & Ethics

Security Certifications Benchmark: CISSP Common Body of Knowledge Operations Security Physical Security Security Architecture & Models Security Management Practices Telecommunications, Network & Internet Security

Security Certifications Benchmark: Certified Information Systems Auditor (CISA) isaca.org IT audit community Covers: Management, planning and organization of IS Technical infrastructure and operational practices Protection of Information Assets Disaster Recovery and Business Continuity

Security Certifications Benchmark: Certified Information Systems Auditor (CISA) Covers: Business Application Systems Development, Acquisition, Implementation and Maintenance Business Process Evaluation and Risk Management IS Audit Process

Security Certifications Foundation level: Security+ CompTIA Focus on basic architecture, business, and products Covers: General Security Concepts Communications Security Infrastructure Security Basics of Cryptography Operational/Organizational Security

Security Certifications Foundation level: TICSA Certified Security Associate by Trusecure Network admins, and entry level audit personnel Focus on architecture and products Covers: Security Practices and Procedures Security Fundamentals TCP/IP Networking Fundamentals Firewall Management Fundamentals Detection, Response & Recovery

Security Certifications Foundation level: TICSA Certified Security Associate by Trusecure Covers: Administration & Maintenance Fundamentals Design & Configuration Basics Malicious Code Fundamentals Law, Ethics, and Policy Authentication Fundamentals Cryptography Basics

Security Certifications Foundation level: SANS GIAC Security Essentials (GSEC) Basic understanding of the CBK Basic skills to incorporate good infosec practices GIAC IT Security Audit Essentials Developing audit checklists Perform limited risk assessment

Security Certifications Foundation level: SSCP (Systems Security Certified Practitioner) isc2 Covers: Access Controls Administration Audit and Monitoring Risk, Response, and Recovery Cryptography Data Communications Malicious Code/Malware

Security Certifications Intermediate level: National Security Agency Infosec Assessment Methodology NSA-IAM NSA process for identifying and correcting security weaknesses in information systems and networks GIAC Systems and Network Auditor (GSNA) Apply risk analysis techniques Conduct technical audits

Security Certifications Intermediate level: CIW Security Analyst Certification Deployment of e-business transaction and payment security solutions Implementing e-business security policies GIAC Certified Windows Security Administrator (GCWN) Secure and audit Windows systems GIAC Certified UNIX Security Administrator (GCUX) Secure and audit UNIX and Linux systems

Security Certifications Intermediate level: GIAC Specializations Firewall Analyst Forensic Analyst Incident Handler

Security Certifications Advanced level: Certified Information Systems Security Professional (CISSP) isc2: CBK Additional concentrations: Information Systems Security Engineering Professional Information Systems Security Management Professional Information Systems Security Architecture Professional

Security Certifications Advanced level: Certified Information Systems Auditor Information Systems Audit and Control Association Globally accepted standard IS Audit and Control

Security Certifications Vendor Specific: Cisco: Cisco Certified Security Professional (Intermediate) Cisco Certified Internetwork Expert Security (Advanced) Check Point: Check Point Certified Security Administrator (Foundation) Check Point Certified Security Expert (Advanced)

References & Resources (isc)2 = International Information Systems Security Certifications Consortium, Inc. https://www.isc2.org Information Systems Audit and Control Association http://www.isaca.org SANS & Global Information Assurance Certification http://www.giac.org/subject_certs.php Certification Magazine http://certmag.com

References & Resources CIW Certified http://www.ciwcertified.com Cisco http://cisco.com Check Point http://checkpoint.com CSO Magazine http://csoonline.com

The End For Additional Information: David.Cass.wt06@wharton.upenn.edu