Preview

Questions and Answers on Professional Certifications in Security

Satisfactory Essays
Open Document
Open Document
814 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Questions and Answers on Professional Certifications in Security
1. Identify 3 vendor centric professional certifications in security.
a. Checkpoint
b. Cisco
c. IBM
d. Microsoft
e. RSA
f. Symantec
2. Within the DoD 8570.01M directive, which professional certifications map to the 8570.01M directive?
Technical Level
Level I
Level II
Level III
A+
Security+
CISSP
Network+
SSCP
CISA
SSCP
Other: GSEC, SCNP
Other: GSE, SCNA
Management Level
Level I
Level II
Level III
CAP
CAP
CISSP
Security+
CISSP,CISM
CISM
Other: GISF, GSLC
Other: GSLC
Other:GSLC
Computer Network Defense (CND) Certifications
Analyst
Infrastructure Support
Incident Responder
Auditor
SP-Manager
CEH
CEH
CEH
CEH
CISSP-ISSMP
Other: GCIA
SSCP

CISM
Information Assurance System Architecture and Engineering (IASAE) Certifications
Level I
Level II
Level III
CISSP
CISSP
CISSP-ISSAP

CISSP-ISSEP

3. From a career perspective, which professional certifications make sense for someone wishing to perform intrusive, penetration tests?
a. Profession certification to perform intrusive penetration tests would be the GIAC Penetration Tester (GPEN), GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), and Licensed Penetration Tester (LPT).
4. What is the primary difference between the (ISC) SSCP and CISSP professional certifications from an information systems security career path perspective?
a. SSCP certification is for an entry-level systems security analyst. The SSCP is open to all candidates with as little as one year experience, making it an ideal starting point for a new career in InfoSec or to add that layer of security you need in your current IT career. If you are SSCP certified, you have the ability to perform hands-on security countermeasures and implementation of security countermeasures.
b. CISSP certification is for someone who many years of experience in the InfoSec industry. Typically someone who is CISSP certified will manage a team of SSCP’s. CISSP’s are responsible for the InfoSec throughout the entire organization. They see to it that all

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Penetration testing, on Web applications and Web servers is a critical step in ensuring the confidentiality, integrity, and availability (CIA) of the Web application or service. If e-commerce or privacy data is entered into the Web application, the company is bound by compliance laws and standards to ensure the confidentiality of customer data. It is especially critical when the Web application requires customers to input private data.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 712 Words
    • 3 Pages

    When proceeding with a Penetration test you must specifically authorize access to X party for conducting Y testing on your network. You should specifically lay out details of what the test will include and not include. When it will be done. What systems they will attempt to breech, what indicators will be done to prove the breech. This will protect both you and the Pen testing company incase something happens during the test or in the future. If a report showing how exactly they breeched your network was released to an outside party and they…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. Information Systems Manager. The objective of this project is to develop an integrated system to improve day-to-day operations of Spa Works as well as to offer better reporting in the accounting and human resources. As a result, the IS manager of Spa Works has been chosen to serve on the committee to ensure the strategic IS planning is aligned with the company’s overall strategy. IS manager will advise on the hardware and software (software upgrades) that must be purchased to ensure smooth functionality of the system applications. The IS manager will also endorse an effective and efficient system design so that everyone across the organization is able to use it trouble-free. Being on the advisory board, IS manager will facilitate proper security and recovery software and will develop strategies for training the existing and new personnel if required. Spa Works’ IS manager will also ensure that a set of adequate IT policies is in place and the new system complies with…

    • 1046 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This project will include 1 consultant for a time period of 2 days onsite at a single customer location in order to provide internal penetration testing services. Malcolm Testing Solutions will provide tools, knowledge, and expertise in order to execute an internal penetration test on customer designated devices. Malcolm Testing Solutions will attempt to compromise access controls on internal systems by employing the following methodology:…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    8. As a security professional, you have been asked to perform an intrusive penetration test which involves cracking into the organization’s WLAN for a company. While performing this task, you are able to retrieve the authentication key. Should you use this and continue testing, or stop here and report your findings to the client?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    Every CA should have a certification practices statement (CPS) that outlines how identities are verified, the steps the CA follows to generate, maintain, and transmit certificates, and why the…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    There are several steps that need to take place while planning and executing a penetration test. The first is the planning and preparation stage. During this stage, penetration testers and management personnel should hold a meeting to determine the exact scope, goals, and method of the penetration test. Failure to do this will only result in a list of exploitable vulnerabilities without any type of prioritization or guidelines for the organization. Since these tests can cause networks to crash or connectivity to slow tremendously, it is very important the penetration testers know what kinds of tests are and are not acceptable to management. Legal documents should also be drafted during this time to protect the penetration testers. Since the testing involves acts that would normally be illegal and could compromise confidential information, these documents can outline how the information will be handled, returned and/or destroyed. A liability waiver should also be included to protect the testers from and ramifications of any system damage during the test.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Penetration Test plan

    • 869 Words
    • 4 Pages

    The scope of this project is to perform a penetration test on the web-based application server, Cisco Core Backbone Network, and post penetration test assessment. All other aspects are considered out of scope.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Due to recertification requirements, employer personnel policy, and laboratory licensure requirements, participation in a continuing education (CE) program of some sort is necessary. But should that be the only reason - simply to fulfill an obligation?…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The CISSP certification is meant for someone who has “gained satisfactory knowledge of the material in the ISC2 CBK as well as 5 years of actual security work experience (ISC2).” The CISSP certification is very useful to an established security veteran however, an Associate of (ISC)² which is for a student or a person who is considering a career change and possibly contemplating entering the field of information security. The CISSP certification represents to a future employer that the applicant knows what they are doing and has obtained enough work experience to satisfy the CISSP requirement. Consensus has it that the CISSP material and exam has become stagnant and requires little in the form of actual hands on knowledge, and has been referred…

    • 400 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Dau Course Material

    • 6501 Words
    • 27 Pages

    he following checklists provide a concise description of the education, experience, and training required to meet the standards for certification in Acquisition, Technology, and Logistics (AT&L) career fields. The Under Secretary of Defense for AT&L (USD(AT&L)) has approved these checklists for the DoD AT&L workforce under the authority of DoD Directive 5000.52, “Defense Acquisition Education, Training and Career Development Program.” DoD components are responsible for ensuring that workforce personnel are trained to qualify for their current assignments, prepared for more responsible jobs, and cross-trained for assignments in other AT&L fields. All courses that may be taken to meet Defense Acquisition Workforce Improvement Act (DAWIA) certification requirements are included in this Appendix. The USD(AT&L) has designated certain courses that provide knowledge required to perform particular duties specific to an assignment. These assignmentspecific courses are presented in Chapter 3. Each checklist explains the flow and relational aspects of the standards. Mandatory standards are indicated by an open box or, when options are available, by an open circle. Individuals may be certified in an acquisition career level when all mandatory standards have been met. Some standards are designated “Desired” and are indicated by shaded boxes and circles. Where no standard exists for an element, the box is filled in black. (See legend at the bottom of this page.) The checklists incorporate other information useful for determining how the standards may be met. Personnel Data System (PDS) codes used to track training in automated personnel…

    • 6501 Words
    • 27 Pages
    Good Essays
  • Good Essays

    There are a number of computer forensics certifications that one could choose to challenge including the Encase Certified Examiner (EnCE), AccessData Certified Examiner (ACE), Certified Computer Examiner (CCE), GIAC Certified Forensics Analyst (GCFA) and Certified Computer Forensic Examiner (CFCE) to name a few.…

    • 423 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    Information Systems Auditor™ (CISA®) designation, earned by more than 35,000 professionals since inception, and the…

    • 8174 Words
    • 33 Pages
    Better Essays