Перейти к содержимому. | Перейти к навигации

Персональные инструменты
Вход Регистрация
Вы здесь: Главная РЕСУРСЫ Профессиональная сертификация специалистов по ИБ
Protectiva Compliance Manager

Профессиональная сертификация специалистов по ИБ

Операции с документом
Наиболее известные и востребованные в профессиональной среде и на международном рынке программы профессиональной сертификации специалистов по информационной безопасности.
Certified Information Systems Security Professional - intended for information systems security specialists, especially those who develop policies, procedures, standards, and architectures, this credential covers topics such as system access control, cryptography, telecommunications security, computer risk management, data classification, computer operation security, and information ethics. This is the premier certification in the information security field and is the one most often requested by employers.
Systems Security Certified Practitioner - intended for systems administrators and network administrators, this credential provides a test which recognizes an international body of knowledge related to information security; the topics covered include access controls, systems security administration, auditing and monitoring, response and recovery from incidents, cryptography, data communications, and malicious code/malware.
Certified Information Systems Auditor - intended for Information Systems Auditors (alias EDP Auditors), this credential covers topics such as the information systems auditing process, business process evaluation and risk management, disaster recovery and business continuity, systems development and maintenance, management and organization of the information systems function, and the protection of information assets. This credential has been in existence longer than any other one relevant to the information security field.
Certified Information Systems Manager - This certification from ISACA is specifically geared toward experienced information security managers and those who have information security management responsibilities. This certification is for the individual who must maintain a view of the "big picture" by managing, designing, overseeing and assessing an enterprise's information security. It is business-oriented and focuses on information risk management while addressing management, design and technical security issues at a conceptual level. This credential is relatively new but one of the most popular certifications for information security professionals.
GIAC (Global Incident Analysis Center) Security Engineer - intended for systems administrators and others who must respond to hacker attacks and understand operating system logs and intrusion detection software reports; this in-depth certification is unique in that it not only tests an individual's knowledge, it also tests the individual's ability to put that knowledge to use in a real-world environment; separate certifications are available in specific areas: GSEC (GIAC Security Essentials Certification), GCFW (GIAC Certified Firewall Analyst), GCIA (GIAC Certified Intrusion Analyst), GCIH (GCIA Certified Incident Handler), GCWN (GIAC Certified Windows Security Administrator), GCUX (GIAC Certified UNIX Security Administrator), GISO (GIAC Information Security Officer), GSNA (GIAC Systems and Network Auditor), GCFA (GIAC Certified Forensic Analyst), GSLC (GIAC Security Leadership Certificate), and GIAK (GIAC Information Security for Auditors Kickstart).
Project Management Professional - Granted by the Project Management Institute (PMI), this certification is considered by many managers as essential for implementing complex enterprise-level information security projects. The certification is now the highest-paying certification that an information security professional can obtain. Covering project management principles, project quality metrics, leadership and communication skills, software risk management, and project risk management, this certification involves over a month of in-class courses offered by Management Concepts before candidates are eligible to sit for the exam.
TrueSecure ICSA Certified Security Associate - Endorsed by (ISC)2, this vendor-neutral practical designation is intended for systems administrators and others who are responsible for security but who may not have the word security in their job title, or for practitioners who wish to show their mastery of security system implementation details; the test covers topics such as widely adopted security standards, standard commercial security practices, commercially available products, TCP/IP networking basics, security law and ethics, PKI and digital certificates, encryption system implementation, malicious code, security system configuration, and Internet security product implementations. A more advanced version of this same certification is called TICSE, or TrueSecure ICSA Certified Security Expert. The latter requires test takers to demonstrate in-depth hands-on knowledge and self-sufficiency in the design, implementation, and deployment of security solutions. The latter is intended for senior network engineers.
Certified Counterespionage & Information Security Manager - this program seeks to support a variety of career tracks such as application programmers, help desk clerks, database admininstrators, access control system administrators, and information security managers. This is a management level certification which focuses on studying the threats and defeating attacks. Emphasis is placed on both technical as well as human factors related to information security. Topics covered include development of policies and procedures, encryption system usage, network administration, crime scene investigation, surveillance countermeasures, and competitive intelligence gathering.
Security Certified Professional - this designation involves a vendor-neutral network security training program intended for systems administrators and other information technology professionals, which is delivered in two discrete levels, and which covers information security fundamentals, network security implementation issues, network defense strategies and countermeasures, encryption including public key infrastructure system construction, and biometrics system implementation.
Certified Business Continuity Professional, formerly Certified Disaster Recovery Professional or CDRP (also related designations known as ABCP or Associate Business Continuity Planner, and MBCP or Master Business Continuity Planner) - intended for business contingency planners and information systems contingency planners, this credential covers topics such asbusiness impact analysis, emergency response, developing recovery strategies, testing recovery plans, and awareness training.
Certified Computing Professional (with demonstrated specialty in systems security) - intended for technical specialists like programmers and systems analysts, this credential covers topics such as data resource management, office information systems, systems programming, systems development, software engineering, structured programming, information systems management, and systems security.
CIW Security Professional (may also be abbreviated CIW-SP) - intended for network administrators, firewall administrators, application developers, and information security officers, this designation focuses on Internet commerce and the related security matters including information security policy development, risk assessment, development of countermeasures, intrustion detection, and attack response strategies. As a step in the direction of getting the CIWSP certification, some people may wish to be certified as a CIW Security Analyst (CIWSA or CIW-SA). The latter certification is intended for network administrators who wish to move into information security.
The Security+ examination is a benchmark foundation level certification for people who have been working in the field at least two years. It covers a wide range of information security areas including general security concepts, communications security, infrastructure security, operational/organizational security, and cryptography. This multiple choice test is based on an industry-wide survey of the topics most relevant to the jobs of people working in the information security field.
Network Security Certified Professional - this is an intermediate level certification intended for information technology specialists, especially network administrators and systems administrators. A similar but less senior designation offered by the same organization is called Enterprise and Web Security Certified Professional (EWSCP). Both include implementation specifics such as how to build virtual private networks, how to deploy intrusion detection systems, how to configure firewalls, and how to build public key infrastructure (PKI) encryption systems.
Certified Software Manager - intended for systems administrators, help-desk personnel, technical support specialists, purchasing agents, value added resellers, and information security specialists, this credential covers topics such as copyright law, software licenses, software inventory tools, software audit process, security awareness training, and virus infestation responses.
Security Certified Network Professional - intended as the designation for information security professionals who wish to demonstrate that they have a hands-on knowledge of defensive network security protection measures. This certification focuses on firewalls and network intrusion systems, but also covers biometrics, public key infrastructure (PKI), network security fundamentals, and network defensive and countermeasures. The SCNP is an intermediate level certification on the way to becoming a SCNA (Security Certified Network Architect). The SCNA designation, which is conferred by the same organization, shows mastery of advanced information security topics such as digital signatures and digital certificates, as well as PKI system implementation.
Certified Fraud Examiner - intended for internal auditors, forensic accountants, private investigators, academic researchers, and law enforcement personnel, this credential covers topics such as financial transactions, statistical analysis, fraud investigation, fraud deterrence, loss prevention, criminology and sociology, ethics, and the legal process.
Certified Protection Professional - intended for directors of Physical Security Departments, this credential covers topics such as emergency planning, sensitive information protection, personnel security, investigations, loss prevention, physical security, and substance abuse.
Certified Internal Auditor - intended for internal auditors, this credential covers topics such as the fraud detection, interviewing for investigations, reporting problems to management, control of information technology, mathematics of statistical sampling, managerial accounting, and financial accounting (also available from IIA: CCSA - Certification in Control Self-Assessment and CGAP - Certified Government Auditing Professional).
Как стать участником |  Что может участник  |  Как работать с порталом  |  Реклама |  Авторские права  |  Контакты  |  Конкурсы  |  RSS  |  Форум
©2003 - 2022 GlobalTrust
Рейтинг@Mail.ru Rambler's Top100 Yandex