(ISC)2

www.isc2.org

In addition to the CISSP certification, the International Information Systems Security Certifications Consortium (ISC)2 offers the Systems Security Certified Practitioner (SSCP), Certified Secure Software Lifecycle Professional (CSSLP), and Certification and Accreditation Professional (CAP) certifications.

SSCP

Developed in 1998, the SSCP certifies network and systems administrators who implement security policies, standards, and procedures. The SSCP tests the candidate’s knowledge in seven domains that comprise the Information Systems Security Administrator Common Body of Knowledge (CBK):

check.png Access Controls

check.png Analysis and Monitoring

check.png Cryptography

check.png Malicious Code

check.png Networks and Telecommunications

check.png Risk, Response, and Recovery

check.png Security Operations and Administration

Similar in format to the CISSP exam, the SSCP exam is a paper-based, 125-question, multiple-choice examination. You have three hours to complete the exam. A minimum of one year of related work experience in at least one of the seven domains is required.

CSSLP

The CSSLP is designed to address security deficiencies in the software life cycle, as evidenced by the fact that most security breaches are related to applications security. The CSSLP is for any stakeholder in the software life cycle who has at least four years of experience. Potential candidates include

check.png Top management

check.png Business unit heads

check.png IT managers

check.png Security specialists

check.png Application owners

check.png Developers and coders

check.png Project managers and team leaders

check.png Technical architects

check.png Quality assurance managers

check.png Business analysts

check.png Industry group delivery heads

check.png Client-side program managers

check.png Auditors

The CSSLP CBK focuses on building security into the software development life cycle (SDLC) and consists of the following domains:

check.png Secure Software Concepts

check.png Secure Software Requirements

check.png Secure Software Design

check.png Secure Software Implementation/Coding

check.png Secure Software Testing

check.png Software Acceptance

check.png Software Deployment, Operations, Maintenance, and Disposal

CAP

The CAP certification is for candidates in U.S. state and local governments, and for civilians in the commercial job market, who are responsible for formally certifying and accrediting security in information systems. Candidates have job positions such as authorizing officials, system or information owners, information system security officers (ISSOs), and senior system managers. CAP candidates must have a minimum of two years of direct, full-time systems security certification and accreditation in one or more of the following five CAP domains:

check.png Understanding the Purpose of Certification

check.png Initiation of the System Authorization Process

check.png Certification Phase

check.png Accreditation Phase

check.png Continuous Monitoring Phase

CISSP concentrations

(ISC)2 also offers three CISSP concentrations:

check.png ISSAP (Information Systems Security Architecture Professional): For CISSPs who have at least two years of experience in security architecture. The six CBK domains are

• Access Control Systems and Methodology

• Cryptography

• Physical Security Integration

• Requirements Analysis and Security Standards, Guidelines, and Criteria

• Technology-Related Business Continuity and Disaster Recovery Planning

• Telecommunications and Network Security

check.png ISSEP (Information Systems Security Engineering Professional): Developed in cooperation with the U.S. National Security Agency (NSA) for systems security engineering professionals. The four CBK domains include

• Certification and Accreditation

• Systems Security Engineering

• Technical Management

• U.S. Government Information Assurance Regulations

check.png ISSMP (Information Systems Security Management Professional): For CISSPs who have at least two years of management experience, specifically in the areas of project management, risk management, security awareness program development and management, or Business Continuity Planning management at an enterprise-wide level. The five included CBK domains are

• Business Continuity Planning (BCP), Disaster Recovery Planning (DRP), and Continuity of Operations Planning (COOP)

• Enterprise Security Management Practices

• Enterprise-Wide System Development Security

• Law, Investigations, Forensics, and Ethics

• Overseeing Compliance of Operations Security

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.156.235