Pathway to Information Security

3.CISM(Certified Information Security Manager)

The Certified Information Security Manager (CISM) is a top credential for IT professionals responsible for managing, developing and overseeing information security systems in enterprise-level applications, or for developing best organisational security practices.It is offered by Information Systems Audit and Control Association ISACA, a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance.ISACA’s organisational goals are specifically geared toward IT professionals interested in the highest quality standards with respect to audit, control and security of information systems.The exam consists of  200 MCQ, which covers four content areas:

  •  Information security management
  •  Information risk management and compliance
  •  Information security program development and management
  •  Information security incident management

To obtain the CISM credential, candidates must do the following:

  1. Pass the CISM exam.
  2. Agree to the ISACA Code of Professional Ethics.
  3. Possess a minimum of five years of information security work experience, including at least three years of work experience in information security management in three or more of the job practice analysis areas. Experience must be verifiable and obtained in the preceding 10-year period prior to the application date or within five years after passing the exam. There are some exceptions to this requirement depending on current credentials held.
  4. Submit an application for CISM certification (some amount of processing fee). The credential must be obtained within five years of passing the exam.
  5. Agree to the CISM Continuing Education Policy.

In addition to the CISM, ISACA offers numerous certifications for those interested in information security and best practices. Other credentials worth considering include the following:

  • Certified Information Systems Auditor (CISA)
  • Certified in the Governance of Enterprise IT (CGEIT)
  • Certified in Risk and Information Systems Control (CRISC)

4.OSCP(Offensive Security Certified Professional)

Is an ethical hacking course offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux and is the world’s first completely hands-on offensive information security certification. The OSCP challenges the students to prove they have a clear and practical understanding of the penetration testing process and life-cycle through an arduous twenty-four(24) hour certification exam in which holders successfully attack and penetrate various live machines in a safe lab environment.It is considered more technical than other ethical hacking certifications, and is one of the few certifications that requires evidence of practical penetration testing skills.The course is offered in two formats, either online or live “instructor led” classes.The online course is a package consisting of videos, a PDF, lab assignments and lab access. The instructor led course is intensive live training covering the same material, also with lab access. The labs are accessible via a high speed internet connection, and contain a variety of operating systems and network devices where the students perform their assignments.

The OSCP examination consists of a virtual network containing targets of varying configurations and operating systems. At the the start of the exam, the student receives the exam and connectivity instructions for an isolated exam network that they have no prior knowledge or exposure to.

 

Job Board Search Results

Certification
SimplyHired
Indeed
LinkedIn Jobs
TechCareers Total
CEH 1,977 2,184 1,427 257 5,845
CISM
3,286 3,585 2,337 10,629 19,837
CISSP
10,526 11,617 7,632 15,212 44,987

Pages: 1 2 3

2 thoughts on “Pathway to Information Security

Add yours

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: