Certifications

Total Page:16

File Type:pdf, Size:1020Kb

Certifications CERTIFICATIONS Our highly qualified security professionals have decades of combined experience servicing complex organisations across the CampusGuard is your partner globe, and hold the following certifications: for cybersecurity, privacy, and QSA – Qualified Security Assessor compliance ASV – Approved Scanning Vendor PCIP – Payment Card Industry Professional Our mission is to guide complex organisations through CISSP – Certified Information Systems Security Professional all of their information security, privacy, and compliance needs in order to establish and maintain a secure and CISM – Certified Information Security Manager compliant environment within their IT areas and busi- CISA – Certified Information Systems Auditor ness operations. OSCP – Offensive Security Certified Professional OSWP – Offensive Security Wireless Professional CampusGuard provides a full range of services that eMAPT – Mobile Application Penetration Tester are the result of our comprehensive knowledge of the CEH – Certified Ethical Hacker unique nature and needs of complex environments. CHFI – Computer Hacking Forensic Investigator eWPT – eLearnSecurity Web App Penetration Tester GCIH – GIAC Certified Incident Handler Cybersecurity and Compliance and more availabile upon request. for Complex Organisations www.CampusGuard.com [email protected] FRAMEWORKS & STANDARDS ISO/IEC 27000 Series ISO 7000 999 CIS COBIT Essential Eight Maturity Model OWASP Cybersecurity and Compliance challenges are much different for complex organisations CYBERSECURITY Customers across the globe have come to rely on their dedicated CampusGuard team to provide reliable, accurate, and timely support for their information security and compliance needs. Our services are considered to be some of the most inclusive in the industry, supporting our CampusGuard mission assuring that ONGOING SUPPORT our customers have the highest level of expert services available. CampusGuard’s unique customer-centric service delivery model is at the center of who we are and what we do. At all times, you will • Cybersecurity & Compliance Program Evaluation have a dedicated Customer Advocate Team focused on your 100% • IT Security Assessment satisfaction. CampusGuard is a full-service cybersecurity and compliance company focused specifically, and most ideally positioned, to • Vulnerability Scanning • Annual Support Agreement serve complex organisations. Our advantage comes from the • Penetration/Segmentation Testing • Premier Partner Services decades of experience working within complicated settings like • Web Application Scanning & Penetration Testing • Our Portal - CampusGuard Central® higher education, kindergarten to year twelve, healthcare, and • Wireless Penetration Testing federal, state, and local government. This vast amount of knowl- • Mobile Application Penetration Testing edge is shared by our talented information security advisors, • Red Teaming TRAINING customer relationship managers, and offensive security • Social Engineering All training courses are delivered as SCORM-compliant modules for professionals. use on your Learning Management System (LMS) or can be delivered • Phishing/Spear Phishing via our fully hosted, robust LMS. Together on your behalf, we deliver a comprehensive set of • Password Auditing services designed specifically for you. Our unique team approach • Incident Response Plan (IRP) Testing • Information Security Awareness provides the highest level of quality available in the market. • Policies and Procedures Review • PCI DSS Bundle - for Merchants - for Information Technology Staff - for Executives COMPLIANCE • Phishing CampusGuard is widely viewed as the experts in providing assessment services, guidance, and support to complex organisations to meet many of their compliance requirements. “CampusGuard has been a trusted Our dedicated team approach and wealth of experience partner and provided real solutions consistently sets us apart from the rest. and recommendations - not just • Payment Card Industry Data Security Standard (PCI DSS) theoretical ones.” • European General Data Protection Regulation (GDPR).
Recommended publications
  • Employment Application
    CSX-P Application NYU Exam Passers September 2020 and Later *Designates Required Field APPLICANT DETAILS FULL NAME*: ISACA ID*: EMAIL*: PHONE: STEP 1: PASS EXAM Please provide the year that you passed the CSX-P Certification Exam. EXAM PASS YEAR*: STEP 2: EDUCATION AND WORK EXPERIENCE Please indicate if you hold any of the Certifications and/or Certificates, as well as if you have experience in any of the work domains listed below. Certifications and Certificates: Certified Information System Auditor (CISA) Certified in Risk and Information Systems Control (CRISC) Certified in the Governance of Enterprise IT (CGEIT) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) EC-Council Certified Security Analyst (ECSA) Licensed Penetration Tester (LPT) GIAC Certified Incident Handler (GCIH) Offensive Security Certified Professional (OSCP) GIAC Certified Penetration Tester (GPEN) CompTIA Cybersecurity Analyst+ (CySA+) Certified Information Systems Security Professional (CISSP) CSX Cybersecurity Fundamentals CSX Penetration Testing Overview (CPTO) Other College/University Program Name* Work Experience Domains: Domain 1: Identify • Analyze network infrastructure and digital assets • Analyze network topology, data flows, and communication pathways • Perform security reviews and identify gaps in security architecture 1 • Contribute to the development of security policies and procedures • Interpret and evaluate impact of applicable regulations and laws • Participate in information sharing within the enterprise and with specialized
    [Show full text]
  • TIBER-EU Services Procurement Guidelines
    TIBER-EU Framework Services Procurement Guidelines August 2018 Contents 1 Executive summary 3 1.1 What is TIBER-EU? 4 1.2 What are the risks of the TIBER-EU test? 4 1.3 What are the Services Procurement Guidelines? 4 2 Introduction 6 2.1 Use of the Services Procurement Guidelines 6 2.2 Structure of the Guidelines 6 2.3 Target audience of the Guidelines 7 2.4 Multinational entities 7 2.5 Procurement agreements 7 3 Threat intelligence providers 9 3.1 Threat intelligence for TIBER-EU 9 3.2 The role of the TI provider 10 3.3 TI provider requirements 10 3.4 Guiding principles and criteria for selecting TI providers 12 4 Red team providers 18 4.1 The role of RT provider 18 4.2 RT provider requirements 19 4.3 Guiding principles and criteria for selecting RT providers 20 5 Possible roles of authorities 25 6 Annexes 26 6.1 List of qualifications and certifications 26 6.2 List of questions to facilitate the procurement process – TI providers 27 6.3 List of questions to facilitate the procurement process – RT providers 31 6.4 TI provider agreement checklist 34 TIBER-EU Framework – Services Procurement Guidelines 1 6.5 RT provider agreement checklist 36 TIBER-EU Framework – Services Procurement Guidelines 2 1 Executive summary The Threat Intelligence-based Ethical Red Teaming (TIBER-EU) Framework enables European and national authorities to work with financial infrastructures and institutions (hereafter referred to collectively as “entities”1) to put in place a programme to test and improve their resilience against sophisticated cyber attacks.
    [Show full text]
  • Security Certifications - 2016 Security Certifications
    Security Certifications - 2016 Security Certifications Roy Gertig, CISSP SSCP CISA CISM Security+ SCSecA NSA-IAM/IEM PMP Project+ ITILv3 SSGB CVE4.0 TCC SCSA CIW-Pro Linux+ LPIC-1 SUSE-CLA Storage+ Server+ A+ N+ iNet+ CDIA+ Information current as of July 2016 © SAIC. All rights reserved. Disclaimer • The acronyms used throughout this presentation are either “registered®” or “trademarked™” and are a product of their respective companies • This presentation covers a multitude of certifications, but by no means is all inclusive • This presentation is to be used as a resource and the links throughout work as of today 3 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Agenda • (ISC)2 and Test Builds • Government and Information Assurance • Overview of Security Certifications • Have some fun 4 S A IC.c om © SAIC. All rights reserved. | SAIC Communications First, a story • Reminiscence 5 S A IC.c om © SAIC. All rights reserved. | SAIC Communications What do these have in common? IRS / IG 6 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Answer We’re here to help! 7 S A IC.c om © SAIC. All rights reserved. | SAIC Communications What do these have in common? (ISC) 2 / IRS 8 S A IC.c om © SAIC. All rights reserved. | SAIC Communications Answer They both want your money! 9 S A IC.c om © SAIC. All rights reserved. | SAIC Communications (ISC)2 Banquet . Workshop Timetable – Starts on a Friday AM, ends Sunday PM . NDA – 24 month limitation – Possible loss of CPE and Certs . Why hold workshops – Several times a year to update and refresh item test bank 10 S A IC.c om © SAIC.
    [Show full text]
  • IT Security Audit (Full Scope of Audit)
    EMPANELLED INFORMATION SECURITY AUDITING ORGANISATIONS by CERT-In The List of IT Security Auditing Orgnisations, as given below, is up-to-date valid list of CERT-In Empanelled Information Security Auditing Orgnisations. This list is updated by us as soon as there is any change in it. 1. M/s AAA Technologies Pvt Ltd 278-280, F-Wing, Solaris-1, Saki Vihar Road, Opp. L&T Gate No. 6, Powai, Andheri (East), Mumbai – 400072. Website URL : http://www.aaatechnologies.co.in Ph : 022-28573815 Fax: 022-40152501 Contact Person : Mr. Anjay Agarwal, Chairman & Managing Director Mobile : +91 09322265876, 9821087283 E-mail : anjay[at]aaatechnologies.co.in 2. M/s AUDITime Information Systems (I) Ltd. A-504, Kailash Esplanade, L B S Marg, Ghatkopar (West), Mumbai – 400086 Ph: 022 40508210 Fax: 022 40508230 Contact Person :Mr. Madhav Bhadra, Director Mobile : +91 9320253902 E-mail: mmb[at]auditimeindia.com 3. M/s AKS Information Technology Services Pvt Ltd E-52, Sector-3, Noida – 201301. Website URL : http://www.aksitservices.co.in Ph: 0120-4545911, 0120-2542253 Fax : 0120-4243669 Contact Person : Mr. Ashish Kumar Saxena, Managing Director Mobile : +91 7290058951 E-mail : info.cert[at]aksitservices.co.in 4. M/s Aujas Networks Pvt Ltd #595, 4th floor, 15th Cross, 24th Main, 1st Phase, JP nagar, Bangalore, Karnataka- 560078. Website URL : http://www.aujas.com/ Ph : 080-26087878 Fax: 080-26087816 Contact Person : Mr. Jaykishan Nirmal, Vice President Mobile : +91 9980238005 E-mail : Jaykishan.Nirmal[at]aujas.com 5. M/s AGC Networks 2nd Floor, Equinox Business Park, Tower 1, (Peninsula Techno Park), Off Bandra Kurla Complex, LBS Marg, Kurla (West), Mumbai – 400070, INDIA Ph : +91 2266617490 Ext.
    [Show full text]
  • Cybersecurity Fortification Initiative 2.0
    Annex Cybersecurity Fortification Initiative 2.0 The HKMA has conducted a holistic review of the Cybersecurity Fortification Initiative (CFI) taking into account i) the experience gained in the past few years; ii) feedback of authorized institutions (AIs) obtained via an industry survey and interviews with selected institutions; and iii) overseas developments and new practices. The HKMA then issued a consultation paper in January 2020 putting forward a set of recommendations to enhance the three pillars of the CFI. Two workshops were conducted with members of the Hong Kong Association of Banks (HKAB), one in March and another in June, to discuss the industry feedback received during the consultation. A revised CFI, or CFI 2.0, is subsequently developed, having regard to the findings of the review. The revised framework aims to simplify the assessment process while maintaining effective control standards that are commensurate with latest technology trends. Substantial efforts will be made to expand the talent supply and encourage cyber threat intelligence sharing across the industry. Details of the major enhancements are set out below. C-RAF 2.0 – Risk assessment Introduction of new and enhanced control principles reflecting recent international sound practices in cyber incident response and recovery, as well as latest technology trends (e.g. cloud technology and virtualisation security); Introduction of Blue team requirements for iCAST to measure the effectiveness of detection, response and recovery functions of AIs; Allowing more
    [Show full text]
  • Career Tracks Available After CEH
    APPENDIX A Career Tracks Available after CEH The goal of this appendix is to introduce the various certifications related to Information Security and provide tips on building a successful career in Information Security. According to a recent report from Forbes , the cyber security market is expected to grow from $75 Billion in 2015 to $170 Billion by 2020. According to another survey, there are around 209,000 vacant cyber security jobs in the United States. This clearly indicates that there is a huge demand for cyber security professionals worldwide. The leaders of major economies are also expressing serious concerns over the cyber security threats to their nations. With this being said, this appendix introduces some of the most in-demand Information Security certifications and some add-on tips to take your professional career to next level. Certifications There are literally dozens of certifications available on the market. This section lists some of the best and most in-demand certifications from various domains of Information Security. The Network Security Track This track helps you learn how to install, configure, deploy and manage various network security devices, like firewalls, intrusion detection systems, intrusion prevention systems, VPNs, and so on. Cisco offers certifications for gaining in-depth knowledge in network security systems. Following are a few of the certifications related to network security: Certification Description Vendor CCNA Cisco Certified Network Associate Cisco CCNA Security Cisco Certified Network Associate with specialization in Security Cisco CCNP Security Cisco Certified Network Professional with specialization in Security Cisco CCIE Security Cisco Certified Internetworking Expert with specialization in Security Cisco ArcSight ESM Security SIEM Certification HP Administrator and Analyst Splunk Administrator or Log Management Splunk Splunk Certified Architect © Sagar Ajay Rahalkar 2016 183 S.A.
    [Show full text]
  • Standards Supporting Certification
    STANDARDS SUPPORTING CERTIFICATION Analysis of Standards in Areas Relevant to the Potential EU Candidate Cybersecurity Certification Schemes DECEMBER 2019 0 STANDARDS SUPPORTING CERTIFICATION December 2019 ABOUT ENISA The mission of the European Union Agency for Cybersecurity (ENISA) is to achieve a high common level of cybersecurity across the Union, by actively supporting Member States, Union institutions, bodies, offices and agencies in improving cybersecurity. We contribute to policy development and implementation, support capacity building and preparedness, facilitate operational cooperation at Union level, enhance the trustworthiness of ICT products, services and processes by rolling out cybersecurity certification schemes, enable knowledge sharing, research, innovation and awareness building, whilst developing cross-border communities. Our goal is to strengthen trust in the connected economy, boost resilience of the Union’s infrastructure and services and keep our society cyber secure. More information about ENISA and its work can be found at www.enisa.europa.eu. CONTACT For contacting the authors please use [email protected]. For media enquiries about this paper please use [email protected]. EDITORS Ioannis Agrafiotis, Dorin Bugneac, Slawomir Gorniak AUTHORS Inigo Barreira, Hendrik Dettmer, Massimiliano Masi, Leire Orue Echevarria, Andreas Sfakianakis LEGAL NOTICE Notice must be taken that this publication represents the views and interpretations of ENISA, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the Regulation (EU) No 2019/881. This publication does not necessarily represent state-of the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate.
    [Show full text]
  • Pentest MARKET 01 2012__T
    �������������� ������������������������������������������������� ��������������������������������������������� ��������������� ��������������� �������������������������������������������� ���������������������������������������������� ���������������������������� ������������������������������������������������������������������������� ���������������������������������� � EDITOR’S NOTE Market 01/2012 (01) Something Fresh, Something New – PenTest Market! March is going to be an extraoridary month for the PenTest gang! We can finally present to you our new project – PenTest Market. This magazine is going to make all the difference. You will see pentesting from a different perspective. Our contributors come from the IT security world but not exclusively. Especially for you we invited potential clients of pen testers to show the other side of the barricade. This is a great opportunity to learn about their expectations. The thing that makes this magazine unique is structure. PenTest Market will consist mainly of interviews with IT security specialists, who will share their experience with you. We will also include some reports about pentesting market in different parts of the world and several guides, for example: „How to recruit a pentester?, etc. I am sure that we have many great issues of this magazine ahead. Now, however, let’s focus on what we have in this pioneer issue. On the cover you can see Derek Manky, who is the Senior Security Strategist of Fortinet, where he is in charge of directing the FortiGuard research team. We have talked with Derek about hiring for the FortiGuard, cyber war and some more interesting subjects, which you can find on page 06. These days it is hard to find good pentesters or any other IT security specialists. This is a quite big problem for companies. That matter is described by Fabiana Schütz in a revealing article „The Hunt for Pentesters”.
    [Show full text]
  • Mohamed Hasabo Eltayeb
    Mohamed Hasabo Eltayeb Email: [email protected] Contact: +966554491034 Linkedin: https://www.linkedin.com/in/mohamed-eltayeb-44a35bba OBJECTIVE: Provide network, systems, and security experience, knowledge, and solutions in a system and network diverse environment. Protect confidentiality, integrity, and availability of information and information systems. Advise and engineer secure solutions for business opportunities. Learn and experience, mentor and share. Education and Certifications: BSC. Information Systems & management (Madras University,2009-2012 ,India) Offensive Security Certified Professional (OSCP) elearnSecurity Certified Professional Penetration Tester (eCPPT) elearnSecurity Web Penetration Tester (eWPT) EC-council Certified Ethical Hacker (CEHv9) Computer Hacking Forensic Investigation (CHFI) Cyber Security Analyst (CySA+) Palo Alto Certified Network Security Engineer (PCNSE) Fortinet NSE4 Security Professional PECB ISO 27001 Lead Implementer PECB ISO 27005 Lead Risk Manager PECB ISO 22301 Lead Implementer Cisco Certified Security Professional (CCNP-Security) Cisco Certified Networks Associate Security (CCNA Security) Cisco Certified Network Professional (CCNP Routing & Switching) Cisco Certified Networks Associate (CCNA Routing & Switching) Microsoft Certified Solutions Associate (Windows Server 2012) AREA OF EXPERTISE: Penetration Testing Tools (Metasploit.Nessus,Qualys,Core Impact,CANVAS,KALI,RED-ARCH linux) 1 Web Application Penetration Testing Tools (Fortify ,Acuentix ,Appsec,Nstalker,Vega,OWASP-
    [Show full text]
  • DIR Course PDF for Website
    Texas Department of Information Resources (DIR) 101001001001010101010 101010010101010010101 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 101001001001010101010001010101010111010101 101010010101010010101001010100000101001010 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 001010101010111010101 001010100000101001010 InfoSec Academy Learning Tree provides the training and operational management services for DIR’s InfoSec Academy. The Texas DIR InfoSec Academy provides security and education training support to state of Texas agencies and institutions of higher education. The security certification training list below and exams are included in the program: CCSP Certification - Gain a thorough understanding of the information security risks and mitigation Certified Cloud Security strategies critical to data security in the cloud with this (ISC)² Certified Cloud Professional Training and Security Professional (CCSP) training. This course covers the six domains of the ® Certification Exam Prep Official (ISC)² CCSP Common Body of Knowledge (CBK ) and prepares you to pass the CCSP exam and become a Certified Cloud Security Professional. Course 1213 • 5 Days CHFI Certification - EC-Council’s Computer Hacking Forensic Investigator (CHFI) certification Computer Hacking Forensic course outlines a detailed, methodological approach to computer forensic and Investigator Exam Prep evidence analysis, including searching and seizing, chain-of-custody, acquisition, preservation,
    [Show full text]
  • A Guide to Cyber Security Career Development
    A GUIDE TO CYBER SECURITY CAREER DEVELOPMENT DIGITAL WORLD SHAPE IT Looking to upskill your knowledge and climb up the Cyber Security ladder? Confused by the industry certifications landscape and trying to decide which one is right for you? Check out our handy guide to Cyber Security Professional Certifications currently available in Scotland (as of June 2019) Cyber Cyber Cyber Cyber Cyber Cyber Security Cyber Cyber Forensic Security and Security Security Security Security Security Project Security Security DevSecOps Computer Incident Penetration Risk Compliance Security Analyst Architect Engineer Instructor Manager Manager Researcher Technician Developer Analyst Responder Tester Adviser Auditor Consultant • CASP+ • CASP+ • CASP+ • CASP+ • EC-Council • CASP+ • CREST Certified • CASP+ • (ISC)2 CISSP • GCTI • CREST Certified • CREST Certified • CASP+ • (ISC)2 CISSP • (ISC)2 CISSP • CREST • CCIE Security • CCIE Security • (ISC)2 CISSP CCISO • (ISC)2 CISSP Malware Reverse • (ISC)2 CISSP • GNFA Network Simulated Attack • ISACA CISA • ISACA CISA • ISACA CISA EXPERT Certified Threat • (ISC)2 CISSP • (ISC)2 CISSP • ISACA CISA • (ISC)2 CISSP Engineer Intrusion Analyst Manager • ISACA CISM • ISACA CISM (5+ YEARS’ Intelligence • ISACA CISM • ISACA CGEIT • (ISC)2 CISSP • CREST Certified EXPERIENCE) Manager • ISACA CISM • GCTI Incident • (ISC)2 CISSP Manager • CREST • CREST • CCNP Enterprise • CCNP Security • GSLC • GCPM • GREM • CCNP Enterprise • (ISC)2 CSSLP • GASF • CREST • CREST Certified • ISACA CRISC • GCCC • CCNP Security Registered Registered
    [Show full text]
  • Certified Ethical Hacking / Penetration Testing Overview
    CERTIFIED ETHICAL HACKING OVERVIEW [email protected] January 19, 2009 National Security Cyberspace Institute, Inc. (NSCI) Through the combination of research and education, NSCI supports public and private clients aiming to increase cyberspace awareness, interest, knowledge, and/or capabilities. NSCI is committed to helping increase security in cyberspace whenever and wherever possible. NSCI publishes a bi-weekly newsletter (CyberPro), has published numerous whitepapers on various cyberspace topics, maintains an online cyber reference library, and has established an email distribution list for sharing cyber-related resumes to interested parties. NSCI is a small, veteran-owned business headquartered in Virginia. Ethical hacking, also known as penetration tests, intrusion testing or red teaming, is increasingly being used by government and industry organizations to identify security risks. Ethical hackers, sometimes called white hats, are hackers that use penetration testing or security system attacks at the request of an organization in order to identify flaws or vulnerabilities before actual malicious hackers are able to exploit them. Ethical hackers duplicate the same attack methods as criminal hackers, but they report their findings back to the client. Ed Skoudis, Vice President of Security Strategy for Predictive Systems’ Global Integrity consulting practice, says that ethical hacking has continued to grow despite drawbacks in the IT industry. Ethical hacking was first used primarily in the government and technology sectors, although many large companies are now requesting penetration tests. Other companies, such as IBM, keep employee teams of ethical hackers.1 Searchsecurity.com offers the following definition of an ethical hacker: “An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
    [Show full text]