Submitted by: Submitted by kauthar
Views: 165
Words: 490
Pages: 2
Category: Science and Technology
Date Submitted: 10/06/2013 07:34 AM
Chapter 2: Certification Programs and the Common Body of Knowledge
Objectives
Analyze the Certified Information Systems Security Professional (CISSP) certificate program Define and describe the role of the International Information Systems Security Certifications Consortium Distinguish the contents of the 10 domains of the Common Body of Knowledge (CBK) Distinguish the CISSP from other certifications programs
© Pearson Education Information Security: Principles and Practices 2
Certification and Information Security
Industry standards, ethics, and certification of information systems professionals and practitioners is critical to ensuring that a high standard of security is achieved Certification benefits both the employer and the employee Oversight and governance of the professional certification process is needed
To help maintain its relevance and currency To aid professionals in networking with other professionals To meet that need, the ISC2 organization was created
© Pearson Education Information Security: Principles and Practices 3
Certification and Information Security cont.
International Information Systems Security Certification Consortium (ISC2)
Maintaining a CBK for information security Certifying industry professionals and practitioners Administering training and certification examinations Ensuring credentials are maintained
Two primary certifications
Certified Information Systems Security Professional (CISSP) System Security Certified Practitioner (SSCP)
© Pearson Education Information Security: Principles and Practices
4
Information Security CBK
The CBK is a compilation and distillation of all security information collected that is relevant to information security professionals
CISSP certification includes a working knowledge of all 10 domains (www.isc2.org)
© Pearson Education Information Security: Principles and Practices
5
Information Security CBK cont.
10 Domains
Security Management Practices (Chap 4) Security Architecture and Models...