Wednesday, 4 June 2014

Avoid an infosec catastrophe – three certifications that help


By 

Cyber-crime divisions of law enforcement agencies around the world took a great step towards defeating hackers responsible for malware such as Gameover Zeus and Cryptolocker, a ransomware that encrypts its victim’s information and demands money in exchange for the decryption key.

The authorities had recently seized control of two computer networks, specifically used for distributing malware to steal sensitive personal information, including banking credentials and passwords.

However, this is only a short-term victory and the UK’s National Crime Agency (NCA) warned people to take action now, in order to protect themselves against possible future attacks. 

Image courtesy of chanpipat/FreeDigitalPhotos.net

Help your organisation stay protected against cyber-criminals; here are three IT security certifications that will help you:

(ISC)2 – CISSP

Due to the increasing complexity of cyber-attacks, the CISSP certification has become one of the most sought after IT security certifications.
As an advanced level certification, the CISSP was designed for experienced infosec professionals. As a CISSP-certified pro, you’ll be an expert in developing and managing security standards, policies, and procedures within your organisation.
To get this certification, you’ll need minimum 5-years of experience in at least two of the following vital topics:
  • Access Control
  • Telecommunications and Network Security
  • Information Security Governance and Risk Management
  • Software Development Security
  • Cryptography
  • Security Architecture and Design
  • Operations Security
  • Business Continuity and Disaster Recovery Planning
  • Legal, Regulations, Investigations and Compliance
  • Physical (Environmental) Security

EC-Council – CEH

The Certified Ethical Hacker (CEH) certification is a relatively new credential in the industry, but its importance and influence have increased significantly since its inception. CEH introduces you to the so-called dark side of IT, i.e. the tools and techniques hackers use to attack systems.

With the CEH under your belt, you’ll know how hackers think to find and exploit vulnerabilities. Therefore you’ll also know how to take a more proactive approach and protect against threats by seeing beyond current security tools and policies.

On this course you’ll learn about a wide range of security topics, including but not limited to:
  • Scanning Networks
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Social Engineering
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection

ISACA – CISM

CISM, developed by ISACA, is a top IT security credential focusing on managing, developing and supervising information security systems and developing security best practices.
This certification addresses the needs of security professionals with enterprise level security management responsibilities. As a CISM certified pro, you’ll have advanced skills in:
  • Security Risk Management
  • Program Development and Management
  • Responding to Incidents
  • Governance, and Incident Management
If you haven't yet taken the necessary countermeasures to protect against cyber-criminals, do it now to make sure your money and data stay safe and intact.

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry.