SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Size: px
Start display at page:

Download "SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH"

Transcription

1 SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1

2 SECURITY+ VS GIAC GSEC

3 Where does GSEC fit? 3

4 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+ GIAC GSEC Certifying organization Industry recognized (see description above) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes GIAC (Global Information Assurance Certification) (for-profit organization) Professional Development Qualifying Credential ISO/ANSI and Continuing education Yes Yes DoD M IAT II, IAM I IAT II Target audience Entry-level cybersecurity professionals Entry-level cybersecurity professionals 4

5 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+ GIAC GSEC Exam topics Similar, more in-depth Similar, less in-depth Prerequisites Performance-based questions No required prerequisites; CompTIA A+ and Network+ recommended Yes None, no recommendations No 5

6 Why Security+ instead of GSEC? Reason #1 Security+ is better suited to help IT professionals reach a base level of cybersecurity competence for the least amount of money GSEC is less in-depth and costs more (GSEC $659 vs Security+ $320 retail) Reason #2 The Security+ exam assesses hands-on cybersecurity skills through performance-based questions GSEC does not Reasons #3 Security+ is focused 100% on cybersecurity skills GSEC is more general and includes networking and Linux fundamentals 6

7 Reasons to work with CompTIA instead of GIAC Reason #1 CompTIA encourages partners to choose any training option GIAC uses SANS 401 training Reason #2 Security+ is more costeffective to assess entry-level cybersecurity skills GSEC USD $659 vs Security+ $179 retail Reason #3 CompTIA certifications are more widely adopted by the industry 96,131 GIAC certifications issued versus over 2,000,000 CompTIA certifications issued (July 2017) 7

8 SECURITY+ VS (ISC) 2 SSCP

9 Where does SSCP fit? 9

10 CompTIA Security+ and (ISC)2 Systems Security Certified Practitioner (SSCP) Feature CompTIA Security+ (ISC) 2 SSCP Certifying organization CompTIA (nonprofit association) (ISC) 2 Information Systems Security Certification Consortium (nonprofit association) Industry recognized Professional Development Qualifying Credential Professional Development Qualifying Credential Vendor-neutral Yes Yes ISO/ANSI and Yes Yes Continuing education DoD M IAT II, IAM I IAT I, IAT II, CSSP-IS Target audience Entry-level cybersecurity professionals Entry-level cybersecurity professionals 10

11 CompTIA Security+ and (ISC)2 Systems Security Certified Practitioner (SSCP) Feature CompTIA Security+ (ISC) 2 SSCP Exam topics Baseline cybersecurity skills, more in-depth Baseline cybersecurity knowledge, less in-depth Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA A+ and Network+ recommended Yes Requires proof of one year IT-related experience and an endorsement. Candidates can also pass the exam, become an associate and get the experience later No 11

12 Why Security+ instead of SSCP? Reason #1 Reason #2 Reason #3 Reason #4 Security+ is more technical and goes further indepth into cybersecurity skills than SSCP SSCP is considered CISSP light because it covers an extremely broad level of topics without going into depth The Security+ exam assess hands-on skills through performance-based questions (and closed-response questions) The SSCP exam has no performance-based questions, only closed-response questions 12

13 Reasons to work with CompTIA instead of (ISC) 2 Reason #1 Reason #2 Reason #3 CompTIA certifications are more widely adopted by the industry: Over 400,000 CompTIA Security+ certifications have been issued versus 3,360 SSCP certifications (April 2017) SSCP requires one-year verification for ITrelated work to certify, otherwise test takers become an associate Security+ assesses cybersecurity skills when the student sits for the exam; no proof of IT experience required because the hands-on skills are verified immediately at the testing center 13

14 SECURITY+ VS EC-COUNCIL CEH

15 Where does CEH fit? 15

16 CompTIA Security+ and EC-Council Certified Ethical Hacker (CEH) Feature CompTIA Security+ EC-Council CEH Certifying organization Industry recognized (see description on first page) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes EC-Council (Int l. Council of Electronic Commerce Consultants) (for-profit association) Professional Development Qualifying Credential ISO/ANSI and Continuing education Yes Yes DoD M IAT II, IAM I CSSP-Analyst, CSSP-IS, CSSP-IR, CSSP-Auditor Target audience Entry-level cybersecurity professionals Intermediate-level cybersecurity professionals 16

17 CompTIA Security+ and EC-Council Certified Ethical Hacker (CEH) Feature CompTIA Security+ EC-Council CEH Exam topics Baseline cybersecurity skills required for an entry-level IT professional, including basic penetration testing skills Penetration testing knowledge Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA A+ and Network+ recommended Yes Requires proof of two-years cybersecurity related experience, unless the candidate attends official EC-Council training No 17

18 Why Security+ instead of CEH? Reason #1 The Security+ and CEH audiences are different: Security+ is designed to help IT professionals reach a base level of cybersecurity competence CEH is designed to help IT professionals ethically hack and pen test at the intermediate level (CPT+) Reason #2 The Security+ exam assesses hands-on skills through performance-based questions and closed-response questions: The CEH exam has no performance-based questions The CEH exam assesses only knowledge Security+ assesses knowledge, comprehension and application of skills 18

19 Reasons to work with CompTIA instead of EC-Council Reason #1 Reason #2 EC-Council requires candidates to attend official EC-Council CEH training, otherwise candidates must provide two-years of employer-endorsed proof of cybersecurity experience CompTIA allows partners to choose less expensive training options CompTIA requires no proof of IT experience to receive Security+; hands-on skills are verified at the testing center Security+ is more cost-effective to assess entrylevel cybersecurity skills (USD $179 vs $700 retail) Reason #3 CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus over 200,000 EC-Council certifications (July 2017) 19

20 CSA+ COMPETITIVE ANALYSIS 1. EC-COUNCIL CEH 2. EC-COUNCIL CND 3. LOGICAL OPERATIONS CFR 20

21 CSA+ VS EC-COUNCIL CEH

22 Where does CEH fit? 22

23 CompTIA CSA+ and EC-Council Certified Ethical Hacker (CEH) Feature CompTIA CSA+ EC-Council CEH Certifying organization Industry recognized (see description on first page) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes EC-Council (Int l. Council of Electronic Commerce Consultants) (for-profit association) Professional Development Qualifying Credential ISO/ANSI and Continuing education DoD M Target audience Yes In review: IAT II, CSSP-Analyst, CSSP-IS, CSSP-IR, CSSP-Auditor Intermediate-level cybersecurity professionals Yes CSSP-Analyst, CSSP-IS, CSSP-IR, CSSP-Auditor Intermediate-level cybersecurity professionals 23

24 CompTIA CSA+ and EC-Council Certified Ethical Hacker (CEH) Feature CompTIA CSA+ EC-Council CEH Exam topics Security analyst knowledge, application and analysis Penetration testing knowledge Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA Network+ and Security+ recommended Yes Requires proof of two-years cybersecurity related experience, unless the candidate attends official EC-Council training No 24

25 Why CSA+ instead of CEH? Reason #1 They have different audiences: CSA+ focuses on security analyst techniques to protect and defend networks CEH focuses on ethical hacking and penetration testing, which is a subset of CSA+ There is only a 38% overlap between the exams, most in penetration testing and vulnerability assessment and management Reason #2 CSA+ objectives cover higher-level learning objectives by analyzing and applying; CEH requires only knowledge of a given topic 25

26 Why CSA+ instead of CEH? Reason #3 Reason #4 The upcoming CompTIA CPT+ exam will directly compete with CEH The CSA+ exam assesses hands-on skills through performance-based questions and closedresponse questions The CEH exam has no performance-based questions, only closed-response questions The CEH exam only assesses knowledge of skills. CSA+ assesses knowledge, comprehension, application and analysis of skills 26

27 Reasons to work with CompTIA instead of EC-Council Reason #1 Reason #2 EC-Council requires candidates to attend official EC-Council CEH training, otherwise candidates must provide two-years of employer-endorsed proof of cybersecurity experience CompTIA allows partners to choose less expensive training options CompTIA requires no proof of IT experience to receive CSA+; hands-on skills are verified at the testing center CSA+ is more cost-effective to assess intermediate-level cybersecurity skills (USD $179 vs $700 retail) Reason #3 CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus over 200,000 EC-Council certifications (July 2017) 27

28 CSA+ VS EC-COUNCIL CND

29 Where does CND fit? 29

30 CompTIA CSA+ and EC-Council Certified Network Defender (CND) Feature CompTIA CSA+ EC-Council CND Certifying organization Industry recognized (see description on first page) CompTIA (nonprofit association) Professional Development Qualifying Credential EC-Council (Int l. Council of Electronic Commerce Consultants) (for-profit association) Professional Development Vendor-neutral Yes Online exam ( ISO/ANSI and Continuing education DoD M Target audience Yes In review: IAT II, CSSP-Analyst, CSSP-IS, CSSP-IR, CSSP-Auditor Intermediate-level cybersecurity professionals Yes No No 30

31 CompTIA CSA+ and EC-Council Certified Network Defender (CND) Feature CompTIA CSA+ EC-Council CND Exam topics Security analyst knowledge, application and analysis Focuses on traditional perimeter defense knowledge, such as firewalls and anti-virus software; includes basic security analyst knowledge (closer to Security+ knowledge) Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA Network+ and Security+ recommended Yes Requires proof of two-years cybersecurity related experience, unless the candidate attends official EC-Council training No 31

32 Why CSA+ instead of CND? Reason #1 Reason #2 The CND exam focuses more on traditional perimeter techniques, such as firewalls and antivirus software CSA+ focuses more on modern security analytics, such as the Advanced Persistent Threat (APT) CSA+ covers the essential concepts of zeroday anomaly detection that focuses on symptoms and analysis, and penetration testing aspects of vulnerability assessment and management; CND does not The CSA+ exam includes Secure Information and Event Management (SIEM) practices and concepts; the CND exam does not 32

33 Why CSA+ instead of CND? Reason #3 CSA+ objectives cover Bloom s taxonomy higherlevel learning objectives by analyzing and applying CND objectives cover mostly lower-level learning objectives through knowledge and comprehension. The best way to assess performance is by analyzing and applying technology, in addition to memorizing knowledge and comprehending Reason #4 The CND exam focuses more on entry-level concepts, rather than intermediate security analytics skills; CND is closer to Security+ than CSA+ 33

34 Why CSA+ instead of CND? Reason #5 Reason #6 Reason #7 CSA+ contains both performance-based assessment items and multiple-choice items; CND contains only multiple-choice items. CSA+ objectives cover higher-level learning objectives by analyzing and applying; CND requires only knowledge of a given topic. EC-Council certifications also tend to focus on arcane security tool features, rather than industry-standard best practices. 34

35 Reasons to work with CompTIA instead of EC-Council Reason #1 Reason #2 EC-Council requires candidates to attend official EC-Council CND training, otherwise candidates must provide two-years of employer-endorsed proof of cybersecurity experience CompTIA allows partners to choose less expensive training options CompTIA requires no proof of IT experience to receive CSA+; hands-on skills are verified at the testing center CSA+ is more cost-effective to assess cybersecurity skills (USD $179 vs $350 retail) 35

36 Reasons to work with CompTIA instead of EC-Council Reason #3 At CompTIA, we are very careful to create highquality exams. EC-Council tends to focus on training. Reason #4 CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus approximately 200,000 EC-Council certifications (July 2017) 36

37 CSA+ VS CFR

38 Where does CFR fit? 38

39 CompTIA CSA+ and Logical Operations CyberSec First Responder (CFR) Feature CompTIA CSA+ LO CFR Certifying organization Industry recognized (see description above) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes Logical Operations (for-profit association) Professional Development Qualifying Credential ISO/ANSI and Continuing education DoD M Target audience Yes In review: IAT II, CSSP- Analyst, CSSP-IS, CSSP-IR, CSSP-Auditor Intermediate-level cybersecurity professionals Yes CSSP-Analyst, CSSP-IR Intermediate-level cybersecurity professionals 39

40 CompTIA CSA+ and Logical Operations CyberSec First Responder (CFR) Feature CompTIA CSA+ LO CFR Exam topics Security analyst knowledge, application and analysis; includes Incident response Incident response knowledge Prerequisites Performance-based questions No required prerequisites; CompTIA Network+ and Security+ recommended Yes None No 40

41 Why CSA+ instead of CFR? Reason #1 Reason #2 The CSA+ exam focuses on the unique skills of a security analyst. These include the ability to place, configure, manage, and interpret a Security Information and Event Management (SIEM) tool, interpret packet captures, logs, and other readouts from network, endpoint, and server devices, conduct effective vulnerability assessments and penetration tests, as well as respond properly to incidents. Only 30% of the topics are similar, mostly covering incident response 41

42 Why CSA+ instead of CFR? Reason #3 CSA+ is an intermediate-level certification; CFR is closer to entry-level Security+ skills. Most CSA+ objectives cover scenarios and applying skills. Most CFR objectives explain concepts. Reason #4 The CSA+ exam assesses hands-on skills through performance-based questions and closedresponse questions The CFR exam has no performance-based questions, only closed-response questions The CFR exam only assesses knowledge and comprehension of skills. CSA+ assesses knowledge, comprehension, application and analysis of skills 42

43 Reasons to work with CompTIA instead of Logical Operations Reason #1 Reason #2 CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus very few LO certifications (July 2017) LO is primarily a small publishing company that has gotten into the certification business recently. CompTIA has been an industry IT certification heavyweight for over 25 years. 43

44 CASP COMPETITIVE ANALYSIS 1. (ISC)2 CISSP 2. ISACA CISM 3. GIAC GCED 44

45 CASP VS (ISC)2 CISSP

46 Where does CISSP fit? 46

47 CompTIA CASP and (ISC) 2 Certified Information Systems Security Professional (CISSP) Feature CompTIA CASP (ISC)2 CISSP Certifying organization Industry recognized (see description on first page) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes (ISC) 2 Information Systems Security Certification Consortium (nonprofit association) Professional Development Qualifying Credential ISO/ANSI and Continuing education Yes Yes DoD M IAT III, IAM II, IASAE I & II IAT III, IAM II & III, IASAE I, II & III, CSSP Manager Target audience Cybersecurity practitioners Cybersecurity managers 47

48 CompTIA CASP and (ISC)2 Certified Information Systems Security Professional (CISSP) Feature CompTIA CASP (ISC)2 CISSP Exam topics Enterprise cybersecurity architecture, tools and system resilience Enterprise cybersecurity management knowledge Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA Security+ recommended Yes Requires proof of five years of cybersecurity-related experience and an endorsement. Candidates can also pass the exam, become an associate and get the experience later No 48

49 Why CASP instead of CISSP? Reason #1 It depends on the audience: CompTIA CASP is the ideal certification for advanced practitioners of cybersecurity. CASP is intended for those technical professionals who wish to remain immersed in technology as opposed to managing cybersecurity policy and frameworks. CASP is also highly technical in nature. Instead of focusing on theoretical risk management, CASP requires hands-on, practical knowledge of risk management practices. (ISC)2 CISSP is the ideal certification for those in cybersecurity management. CISSP is intended for technical and non-technical candidates that manage cybersecurity policy and frameworks 49

50 Why CASP instead of CISSP? Reason #2 CASP goes in-depth into advanced cybersecurity skills; in contrast, CISSP covers an extremely broad level of topics without going in-depth. Some people say CISSP is six miles wide and two inches deep Reason #3 The CASP exam assesses hands-on skills through performance-based questions (and closedresponse questions); the CISSP exam has no performance-based questions, only closedresponse questions 50

51 Reasons to work with CompTIA instead of (ISC) 2 Reason #1 Reason #2 Reason #3 CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus approximately 130,000 (ISC)2 certifications (April 2017) CISSP requires verification for five-years of cybersecurity-related work to certify, plus an endorsement, otherwise test takers become an associate CASP assesses cybersecurity skills when the student sits for the exam; no proof of IT experience required because the hands-on skills are verified immediately at the testing center 51

52 Reasons to work with CompTIA instead of (ISC) 2 Reason #4 Reason #5 CASP is more cost-effective to assess entry-level cybersecurity skills (USD $320 vs $599 retail) The CompTIA continuing education program is far more simple, yet just as thorough as (ISC)2 52

53 CASP VS ISACA CISM

54 Where does CISM fit? 54

55 CompTIA CASP and ISACA Certified Information Security Manager (CISM) Feature CompTIA CASP ISACA CISM Certifying organization Industry recognized (see description on first page) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes ISACA (nonprofit association) Professional Development Qualifying Credential ISO/ANSI and Continuing education Yes Yes DoD M IAT III, IAM II, IASAE I & II IAM II & III, CSSP-M Target audience Cybersecurity practitioners Cybersecurity managers 55

56 CompTIA CASP and ISACA Certified Information Security Manager (CISM) Feature CompTIA CASP ISACA CISM Exam topics Enterprise cybersecurity architecture, tools and system resilience Enterprise cybersecurity management knowledge Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA Security+ recommended Yes Requires verification of at least five years of experience working in the information security field No 56

57 Why CASP instead of CISM? Reason #1 It depends on the audience: CompTIA CASP is the ideal certification for advanced practitioners of cybersecurity. CASP is intended for those technical professionals who wish to remain immersed in technology as opposed to managing cybersecurity policy and frameworks ISACA CISM is a management-focused certification that promotes security practices and recognizes the individuals who manage, design, oversee and assess an enterprise s information security Reason #2 CASP goes in-depth into advanced cybersecurity topics and hands-on skills; CISM covers cybersecurity governance, compliance and management 57

58 Why CASP instead of CISM? Reason #3 CISM is highly respected, yet also quite theoretical. CASP is respected in the industry because it focuses on practical knowledge and security implementation Reason #4 The CASP exam assesses hands-on skills through performance-based questions (and closedresponse questions); the CISM exam has no performance-based questions, only closedresponse questions 58

59 Reasons to work with CompTIA instead of ISACA Reason #1 Reason #2 Reason #3 Reason #4 CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus approximately 110,000 ISACA certifications CISM requires verification of at least five years of experience working in the information security field CASP assesses cybersecurity skills when the student sits for the exam; no proof of IT experience required because the hands-on skills are verified immediately at the testing center CASP is more cost-effective to assess advanced cybersecurity skills (USD $320 vs $595 retail) 59

60 CASP VS GIAC GCED

61 Where does GCED fit? 61

62 CompTIA CASP and GIAC Certified Enterprise Defender (GCED) Feature CompTIA CASP GIAC GCED Certifying organization Industry recognized (see description on first page) CompTIA (nonprofit association) Professional Development Qualifying Credential Vendor-neutral Yes Yes GIAC (Global Information Assurance Certification) (for-profit organization) Professional Development Qualifying Credential ISO/ANSI and Continuing education Yes Yes DoD M IAT III, IAM II, IASAE I & II IAT III Target audience Advanced cybersecurity practitioners Advanced cybersecurity practitioners 62

63 CompTIA CASP and GIAC Certified Enterprise Defender (GCED) Feature CompTIA CASP GIAC GCED Exam topics Enterprise defense, cybersecurity architecture, tools and system resilience Enterprise defense Prerequisites Performance-based questions (PBQs) No required prerequisites; CompTIA Security+ recommended Yes None, no recommendations No 63

64 Why CASP instead of GCED? Reason #1 Reason #2 Reason #3 GCED covers only enterprise defense; CASP covers enterprise defense, plus cybersecurity architecture, tools and resilience techniques used to predict how the network will react when under attack The CASP exam assesses hands-on cybersecurity skills through performance-based questions; GCED does not CASP was developed for the industry in general, but also with a goal to help the United States Department of Defense secure its systems 64

65 Reasons to work with CompTIA instead of GIAC Reason #1 Reason #2 Reason #3 Reason #4 GIAC sells SANS 501 training; CompTIA can guide partners to less expensive training options CASP is more cost-effective to assess entry-level cybersecurity skills (USD $320 vs $659 retail) CompTIA certifications are more widely adopted by the industry: Over 2,000,000 CompTIA certifications have been issued versus 96,131 GIAC certifications (July 2017) SANS training is highly-respected. But CASP training and certification provides hands-on understanding of risk management at less cost, with significant Return on Investment (ROI) 65

CyberVista Certify cybervista.net

CyberVista Certify cybervista.net ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management

More information

Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) May 17

Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) May 17 Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) 255-2328 Paul.phillips.12@us.af.mil 9 May 17 Disclaimer: The information provided herein represents the Government s best understanding of the procurement

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can

More information

A Passage to Penetration Testing!

A Passage to Penetration Testing! A Passage to Penetration Testing! EC-Council Cyber Research This paper is from EC-Council s site. Reposting is not permitted without express written permission. What Is Penetration Testing? A penetration

More information

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert? Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert? Presented by: Curtis Coats, CISSP, CAP Kelley P. Archer, CISSR MN ISSA Agenda Types

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE) What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.

More information

Certification and Career Guide

Certification and Career Guide Certification and Career Guide CompTIA offers some of the most recognized entry-level certifications for IT professionals, including its A+, Network+ and Security+ certifications. This certification guide

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, Security+ and CySA+. DDLS

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified EC-Council C T Certified I A Threat Intelligence Analyst CERTIFIED THREAT INTELLIGENCE ANALYST PROGRAM BROCHURE 1 Predictive Capabilities for Proactive Defense! Cyber threat incidents have taken a drastic

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

Wolfpack Cyber Academy Training Catalogue

Wolfpack Cyber Academy Training Catalogue Wolfpack Cyber Academy Training Catalogue IT GOVERNANCE I INFORMATION RISK I CYBERSECURITY I PRIVACY I FOUNDATION I INTERMEDIATE I ADVANCED 2017 WOLF PACK www.wolfpackrisk.com Contents About Wolfpack Information

More information

CERTIFICATION TRAINING - ISC2

CERTIFICATION TRAINING - ISC2 MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).

More information

Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based

More information

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least

More information

Management Update: Information Security Risk Best Practices

Management Update: Information Security Risk Best Practices IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine

More information

Certified information Systems Security Professional(CISSP) Bootcamp

Certified information Systems Security Professional(CISSP) Bootcamp Certified information Systems Security Professional(CISSP) Bootcamp Length: 5 days Format: Bootcamp Time: Day About This Course Official CISSP training draws from a comprehensive, up-to-date, global common

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM H Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Voucher Procedures This office provides a maximum of 2 vouchers per position. No exceptions

Voucher Procedures This office provides a maximum of 2 vouchers per position. No exceptions Voucher Procedures This office provides a maximum of 2 vouchers per position. No exceptions Location of training and documents: Measureup pre-test: http://dod.measureup.com Skillport: https://usarmy.skillport.com:

More information

Certifications Part Two: Security Certifications By Shawn Conaway

Certifications Part Two: Security Certifications By Shawn Conaway Certifications Part Two: Certifications By Shawn Conaway Information security spans many different roles and responsibilities. Growth in the available number of security certifications now provides enough

More information

CIT 480: Securing Computer Systems. Putting It All Together

CIT 480: Securing Computer Systems. Putting It All Together CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

CURRICULUM VITAE SHON L. HARRIS, CISSP

CURRICULUM VITAE SHON L. HARRIS, CISSP CURRICULUM VITAE SHON L. HARRIS, CISSP Logical Security, Inc. 9901 I-10 West, Suite 800 San Antonio, Texas 78230 210-566-0488 888-373-5116 888-373-5116 Fax ShonHarris@LogicalSecurity.com www.logicalsecurity.com

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012 Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2 Certification... 4 2.1 Framework for certification...

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers 2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

CYBER APPRENTICESHIP. Dr Leigh Armistead, President

CYBER APPRENTICESHIP. Dr Leigh Armistead, President CYBER APPRENTICESHIP Dr Leigh Armistead, President 1 EVERYBODY HAS THE SAME ISSUE 2 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security,

More information

ISO Lead Auditor Program Risk Management System (RMS) Training Program

ISO Lead Auditor Program Risk Management System (RMS) Training Program FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 31000 Lead Auditor Program Risk Management System (RMS) Training Program ISO 31000 Lead Auditor Risk Manager training enables you to gain comprehensive and

More information

CompTIA IT Fundamentals:

CompTIA IT Fundamentals: CompTIA IT Fundamentals: The IT Fundamentals certification is ideal for you if you re considering a career in IT or if you work in an allied field that requires a broad understanding of IT, like in a sales

More information

CompTIA CASP (Advanced Security Practitioner)

CompTIA CASP (Advanced Security Practitioner) CompTIA CASP (Advanced Security Practitioner) Course Length: 5 days (virtual) Click here to view the current class schedule! Overview: The CompTIA Advanced Security Practitioner (CASP) Certification is

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

Cybersecurity Employment SecureNinja

Cybersecurity Employment SecureNinja Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

Cyber Security Advanced Education: Preparing the Emerging Workforce

Cyber Security Advanced Education: Preparing the Emerging Workforce Cyber Security Advanced Education: Preparing the Emerging Workforce Scott vonfischer, CISO We are all apprentices in a craft where no one ever becomes a master. Ernest Hemingway A Unique Perspective on

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+)   17 Sep 2018 Course Outline CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Hidden Figures: Women in Cybersecurity

Hidden Figures: Women in Cybersecurity Hidden Figures: Women in Cybersecurity This is not a webinar. This is a topic relevant to the community and our initiatives. What is a virtual community meeting? We want to hear from you! Join into the

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing

More information

Unlocking Potential Through Learning

Unlocking Potential Through Learning Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution

More information

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

CISA Training.

CISA Training. CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Certified Ethical Hacker V9

Certified Ethical Hacker V9 Certified Ethical Hacker V9 Certificate: Certified Ethical Hacker Duration: 5 Days Course Delivery: Blended Course Description: Accreditor: EC Council Language: English This is the world s most advanced

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

You Can Click at the enclosed Link to check out AATP Authorization:

You Can Click at the enclosed Link to check out AATP Authorization: Apple Education App Development Training Introduction to Swift 4 Introduction to the ios 11 SDK App Development with Swift 4 macos and OS X Training macos Support Essentials 10.12 (Sierra 101) macos Server

More information

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India. CertStore (The Certification Store) A complete certification online and offline store where you can accomplish any of IT certification and Training. CertStore is master and specialized to deliver the IT

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding

More information

Workforce Certification

Workforce Certification Services Include Secure certification testing in our hi-tech labs. Group testing for your company or organization. Test and certification preparation training. Community Proctoring Services. Workforce

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

Certified Ethical Hacker - CEH v9 Training & Certification

Certified Ethical Hacker - CEH v9 Training & Certification Certified Ethical Hacker - CEH v9 Training & Certification SecureNinja's CEH v9 (Certified Ethical Hacker) training and certification boot camp in Alexandria, VA, Dulles, VA and San Diego, CA will immerse

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Training + Information Sharing: Pillars of enhancing cybersecurity posture

Training + Information Sharing: Pillars of enhancing cybersecurity posture Training + Information Sharing: Pillars of enhancing cybersecurity posture Welland Chu VP, Professional Development & Secretary ISACA China Hong Kong Chapter June 2018 www.isaca.org Reported cyber incidents

More information

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL BECOME A PECB CERTIFIED ISO 27001 AUDITOR OR INSTRUCTOR Trasys International established a partnership with the Professional Evaluation and Certification

More information

CISA EXAM PREPARATION - Weekend Program

CISA EXAM PREPARATION - Weekend Program CISA EXAM PREPARATION - Weekend Program THE CISA QUALIFICATION: CERTIFICATION PREPARATION COURSE SYLLABUS PT. RIALACHAS TATHYA PRAYUKTI Menara Palma 12th Floor Jalan HR Rasuna Said Blok X2 Kav 6 Jakarta,

More information

The State of Security in 2017:

The State of Security in 2017: The State of Security in 2017: A report from experts in the field February 22, 2017 Ryan Frillman Director, Information Security & Compliance, Spire Energy Joey Smith Chief Information Security Officer,

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

Certified Information Systems Auditor Training and Certification

Certified Information Systems Auditor Training and Certification Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit

More information

Advanced Penetration Testing The Ultimate Penetration Testing Standard

Advanced Penetration Testing The Ultimate Penetration Testing Standard The Ultimate Penetration Testing Standard COURSE DESCRIPTION ADVANCED PENETRATION TESTING The program is created as a progression for ECSA credential professionals. The course is designed to show the advanced

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

PECB Certified ISO Lead Auditor. Master the Audit of Occupational Health and Safety Management System (OHSMS) based on ISO 45001

PECB Certified ISO Lead Auditor. Master the Audit of Occupational Health and Safety Management System (OHSMS) based on ISO 45001 Certified Lead Auditor Master the Audit of Occupational Health and Safety Management System (OHSMS) based on Why should you attend? is the first global Occupational Health and Safety Management System

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

CyberSec First Responder Continuing Education Program

CyberSec First Responder Continuing Education Program CyberSec First Responder Continuing Education Program Overview This document identifies the details of the continuing education program for Logical Operations CyberSec First Responder certification. This

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

So you want to be a Certified Quality Engineer?

So you want to be a Certified Quality Engineer? 1 IE 361 mini paper Karla Abrahamson Kara Johnson 9/22/00 So you want to be a Certified Quality Engineer? There is no doubt that quality is important in successful companies today. Because quality is so

More information