Security Certification Resource Guide Essential Information on Security2 Certifications003 for IT Professionals and Managers

Total Page:16

File Type:pdf, Size:1020Kb

Security Certification Resource Guide Essential Information on Security2 Certifications003 for IT Professionals and Managers This guide offers in-depth coverage of security certifications in the IT industry as well as resources for further study. IT Influencer Series Security Certification Resource Guide Essential information on security2 certifications003 for IT professionals and managers. Introduction 3 EC-Council: Know Your Enemy 14 (ISC)2 : Experience Counts 4 Blueprint for a Career 15 Contents in Security SANS: A Practical Approach 6 Guide to Security Job Titles 19 Microsoft: Locking Windows 7 Q&A: Can Security 22 Certifications Help Your Career? CompTIA: Security for the Masses 8 Salary Data for IT 23 Professionals Cisco: Hardware Lockdown 9 About Those U.S. Government 24 Check Point: Enterprise Certified 10 Security Clearances CWNP: Wireless Pro 10 15 Best Web Sites for Security 25 ISACA: Audit Secure 12 5 Must-Read Security 26 Newsletters TruSecure: TISCA Experience 12 5 Web Picks for Security 26 Symantec: Sleeper Hit 13 Certification SCP: Security Certified Pro 13 Security Bookshelf 28 SCSA: Seeking the Sun 14 Advertiser Index 30 Introduction ecurity is one of the hottest areas in IT certification today. S It can also be the most confusing. As little as two years ago, IT profes- sionals wanting to certify their security-related knowledge and expertise had only a handful of cre- dentials to choose from, most of which were reserved for the most experienced professionals. Since then, several vendors have added security-related titles and options, and those specializing in security are offering more credentials than ever. This boom has created a mix of titles that, while serving a wider cross-section of the IT commu- nity, also make understanding and an honest perspective from an indus- evaluating security certifications an try insider on exactly what certifica- arduous endeavor. tion can (and can’t) do for your We’ve created this guide to help career. We also share the real way IT professionals and managers sort those all-too-elusive U.S. security out the many options available. On clearances are obtained. its pages you’ll find profiles of almost To help in the learning process, every major security-related certifi- we’ve included our top picks for secu- cation available today. For each, we rity Web sites and newsletters, as well explain the audience they’re aimed as certification preparation resources. for, the requirements for obtaining Whether you’re an IT profes- the titles, and what separates each sional considering a career in securi- from the other credentials. ty or a manager who needs to guide But we also know that becoming your security staff’s professional an IT security professional takes more development, we hope the following than just certification. That’s why information will offer you the com- you’ll also find advice on developing prehensive overview of security cer- an IT security career, including frank tification you’ve been searching for. words from security maven and Enjoy. author Roberta Bragg on what it takes to excel in this field, as well as —The Editors All content was written and/or developed by Keith Ward, senior editor, Microsoft Certified Professional Magazine; Becky Nagel, editor, CertCities.com; Michael Domingo, editor, MCPmag.com and Dian Schaffhauser, editorial director, Microsoft Certified Professional Magazine. Page 3 • Security Certification 2003 Resource Guide (c) 2003 101communications LLC, http://certcities.com, http://mcpmag.com certification profiles Experience Counts It takes more than just knowledge to earn (ISC)2’s CISSP and SSCP titles. The International Information Systems Security Certification to attempt the organization’s Systems Consortium, (ISC)2,formed in 1989 to create an industry Security Certified Practitioner (SSCP) title. This three-hour, 125-question standard for information security best practices. Since that exam focuses on seven of the above time, the organization has released several vendor-neutral domains and requires only one year of certifications that combine testing candidates’ knowledge of direct work experience. Like the CISSP, you must subscribe to the organization’s these practices along with experience, ethical and ongoing code of ethics and earn continuing edu- education requirements. cation units to maintain the title. If you don’t have enough experi- The organization’s flagship title, the degree can substitute for one year. This ence to earn either title but you still Certified Information Systems Security experience must be documented by an want to take the above exams, you can Professional (CISSP), focuses on 10 independent third-party and submitted become an Associate of (ISC)2. This common bodies of knowledge (CBKs) to the (ISC)2 for audit, along with a new program from the organization based on the above-mentioned standards: signed document stating that the candi- allows candidates without the required • Access Control Systems & Methodology date will subscribe to the organization’s experience to take the exams and then • Applications & Systems Development code of ethics. Only then will the title of earn the certifications once they obtain • Business Continuity Planning CISSP be granted. But that’s not the end the needed experience. • Cryptography of it—all CISSPs must complete 120 If you’re already a CISSP and want • Law, Investigation & Ethics units of continuing education per year to to distinguish yourself further, the • Operations Security keep their title active. organization recently announced sever- • Physical Security If you don’t quite have four years of al “concentrations” that candidates can • Security Architecture & Models direct work experience, you may want add on to their CISSP: CISSP Man- • Security Management Practices agement and CISSP Architecture. 2 • Telecommunications, Network & (ISC) There’s also the Information System Internet Security Vendor: The International Information Security Engineering Professional The resulting exam is a six-hour, Systems Security Certification (ISSEP), a concentration formed in 250-question affair, for which most can- Consortium (ISC)2 conjunction with the United States didates study months to prepare. Certifications: CISSP, SSCP, related National Security Agency that focuses Because of the broad depth of knowl- concentrations on the information security needs of edge covered on the exam, most stu- Certification Type/Focus: Vendor- federal government employees. dents prefer not to go it alone, joining neutral titles focusing on best practices Note that because the organization’s study groups or attending instructor-led for information security professionals. exams are paper-based, candidates must training courses. Candidates must meet experience sign up through (ISC)2 and travel to an However, simply passing the exam requirements and sign an ethics pledge. official testing location. Prices for the 2 won’t earn you the CISSP. (ISC) cites Exam Prices: $350 to $550 (U.S.) organization’s exams currently range its mission to create a “gold standard” Training Required?: No from $350 to $550, but will rise as much certification as the reason it requires all as $100 beginning January 1, 2004. Testing Centers: Available only candidates to have at least four years of More information on all of the through vendor “direct full-time security professional above titles can be found on (ISC)2’s work experience” in one or more of the More information: Web site at http://www.isc2.org. http://www.isc2.org test domains listed above. A college — Becky Nagel Page 4 • Security Certification 2003 Resource Guide (c) 2003 101communications LLC, http://certcities.com, http://mcpmag.com MCPSecurityAd12-03 11/20/03 8:31 AM Page 1 STAY ON TOP OF THE LATEST SECURITY TRAINING... ...or your replacement will be happy to do it for you. With 28 hands-on Security Training courses, Global Knowledge offers the industry’s most comprehensive collection of Network Security courses delivered by real-world, expert instructors. Visit our web site now for more information: www.globalknowledge.com Keyword: MCPSECURE or call 1-800-COURSES. GET A FREE T-SHIRT When you take our 1-minute IT survey at www.globalknowledge.com/securitytee © 2003 Global Knowledge Network, Inc. All rights reserved. certification profiles A Practical Approach The SANS Institute’s GIAC certifications combine testing with practical assignments. Like (ISC)2, the SANS Institute’s Global Information Assurance Certification (GIAC) takes a vendor-neutral approach. However, this organization’s titles focus on the practical more than the theoretical, testing candidates’ skills in a wide variety of areas through online or in-person testing as well as practical assignments. Those interested in GIAC testing have Administrator; and GIAC Certified a wide variety of titles to choose from: Unix Security Administrator—can • GIAC Security Essentials earn the organization’s highest certifi- GIAC exam, candidates must complete Certification (GSEC) cation, the GIAC Security Engineer. a “practical assignment”—an original • GIAC Certified Firewall Analyst According to the organization, only research paper that demonstrates the (GCFW) two GIAC Security Engineers exist in candidate’s knowledge of the material • GIAC Certified Security the world today. being tested. These assignments are Leadership (GSLC) Before being allowed to take any reviewed and graded by the organiza- • GIAC Certified Intrusion Analyst tion, and those who pass are then (GCIA) SANS/GIAC allowed to sit the related exam. • GIAC Certified Incident Handler GIAC exams are delivered online (GCIH) Vendor: The SANS Institute and at SANS
Recommended publications
  • Ethical Hacking
    Official Certified Ethical Hacker Review Guide Steven DeFino Intense School, Senior Security Instructor and Consultant Contributing Authors Barry Kaufman, Director of Intense School Nick Valenteen, Intense School, Senior Security Instructor Larry Greenblatt, Intense School, Senior Security Instructor Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Official Certified Ethical Hacker © 2010 Course Technology, Cengage Learning Review Guide ALL RIGHTS RESERVED. No part of this work covered by the copyright herein Steven DeFino may be reproduced, transmitted, stored or used in any form or by any means Barry Kaufman graphic, electronic, or mechanical, including but not limited to photocopying, Nick Valenteen recording, scanning, digitizing, taping, Web distribution, information networks, Larry Greenblatt or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior Vice President, Career and written permission of the publisher. Professional Editorial: Dave Garza Executive Editor: Stephen Helba For product information and technology assistance, contact us at Managing Editor: Marah Bellegarde Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, Senior Product Manager: submit all requests online at www.cengage.com/permissions Michelle Ruelos Cannistraci Further permissions questions can be e-mailed to Editorial Assistant: Meghan Orvis [email protected]
    [Show full text]
  • AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas Jo
    Computing and Informatics, Vol. 32, 2013, 145{174 NOA: AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas S3Lab, DeustoTech { Computing Deusto Institute of Technology, University of Deusto Avenida de las Universidades 24, 48007, Bilbao, Spain e-mail: fisantos, xabier.ugarte, felix.brezo, [email protected] Jos´eMar´ıa Gomez-Hidalgo´ Optenet, Madrid, Spain e-mail: [email protected] Communicated by Deepak Gang Abstract. Malware refers to any type of code written with the intention of harming a computer or network. The quantity of malware being produced is increasing every year and poses a serious global security threat. Hence, malware detection is a cri- tical topic in computer security. Signature-based detection is the most widespread method used in commercial antivirus solutions. However, signature-based detec- tion can detect malware only once the malicious executable has caused damage and has been conveniently registered and documented. Therefore, the signature-based method fails to detect obfuscated malware variants. In this paper, a new malware detection system is proposed based on information retrieval. For the representa- tion of executables, the frequency of the appearance of opcode sequences is used. Through this architecture a malware detection system prototype is developed and evaluated in terms of performance, malware variant recall (false negative ratio) and false positives. Keywords: Malware detection, computer security, information retrieval, static analysis Mathematics Subject Classification 2010: 68-00, 68T30, 68U3 146 I. Santos, X. Ugarte-Pedrero, F. Brezo, P. G. Bringas, J. M. G´omez-Hidalgo 1 INTRODUCTION Malware (or malicious software) is defined as computer software that has been ex- plicitly designed to harm computers or networks.
    [Show full text]
  • Paul Collins Status Name/Startup Item Command Comments X System32
    SYSINFO.ORG STARTUP LIST : 11th June 2006 (c) Paul Collins Status Name/Startup Item Command Comments X system32.exe Added by the AGOBOT-KU WORM! Note - has a blank entry under the Startup Item/Name field X pathex.exe Added by the MKMOOSE-A WORM! X svchost.exe Added by the DELF-UX TROJAN! Note - this is not the legitimate svchost.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder X SystemBoot services.exe Added by the SOBER-Q TROJAN! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a HelpHelp subfolder of the Windows or Winnt folder X WinCheck services.exe Added by the SOBER-S WORM! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "ConnectionStatusMicrosoft" subfolder of the Windows or Winnt folder X Windows services.exe Added by the SOBER.X WORM! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "WinSecurity" subfolder of the Windows or Winnt folder X WinStart services.exe Added by the SOBER.O WORM! Note - this is not the legitimate
    [Show full text]
  • Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families
    Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families Lars Strande Grini Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2015 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families Lars Strande Grini 15/12/2015 Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families Abstract There exist different methods of identifying malware, and widespread method is the one found in almost every antivirus solution on the market today; the signature based ap- proach. This approach uses a one-way cryptographic function to generate a unique hash of each file. Afterwards, each hash is checked against a database of hashes of known mal- ware. This method provides close to none false positives, but this does also mean that this approach can only detect previously known malware, and will in many cases also provide a number of false negatives. Malware authors exploit this weakness in the way that they change a small part of the malicious code, and thereby changes the entire hash of the file, which then leaves the malicious code undetectable until the sample is discovered, analyzed and updated in the vendors database(s). In the light of this relatively easy mit- igation for malware authors, it is clear that we need other ways to identify malware.
    [Show full text]
  • Aceae -Aceous -Ad -Ade -Aemia
    -able -acea -aceae -aceous -ad -ade -aemia -age -agogue -al -ales -algia -ally -amine -an -ana -ance -ancy -androus -andry -ane -ant -ar -arch -archy -ard -arian -arium -art -ary -ase -asis -aster -ate -ation -ative -ator -atory -blast -cade -carp -carpic -carpous -cele -cene -cephalic -chrome -cide -cle -colous -cracy -crat -cule -cy -cyst -cyte -derm -dom -drome -dromous -ean -ectomy -ed -ee -eer -eme -emia -en -ence -ency -ene -ent -eous -er -ery -es -escent -ese -esque -ess -est -et -eth -ette -ey -facient -fer -ferous -fic -fid -florous -fold -form -fuge -ful -fy -gamy -gen -genesis -genic -genous -geny -gerous -gnathous -gnosis -gon -gonium -gony -grade -gram -graph -grapher -graphy -gynous -hedron -hemia -hood -i- -ia -ial -ian -iana -iasis -iatrics -iatry -ible -ic -ical -ician -ics -id -idae -ide -ie -ier -ify -ile -in -inae -ine -ing -ion -ious -ise -ish -ism -ist -istic -ite -itis -itol -ity -ium -ive -ize -kin -lalia -latry -lepsy -less -let -like -ling -lite -lith -lithic -log -logue -logy -ly -lysis -lyte -lytic -mancy -mania -mantic -mas -ment -mer -mere -merous -meter -metry -mo -most -n't -nasty -ness -nik -ock -ode -odont -oid -oidea -ol -ole -oma -on -one -onym -opia -opsis -or -ory -ose -osis -otic -ous -parous -path -pathy -pede -petal -phage -phagy -phane -phasia -phile -philia -philous -phobe -phone -phony -phore -phyll -phyllous -phyte -plasia -plasm -plast -plastic -plasty -pod -podium -proof -pterous -rhoea -rrhagia -rrhoea -ry -s -scope -sepalous -ship -some -sophy -sperm -st -stat -ster -stichous -stome -stomy -stress -taxis -th -thermy -tion -tome -tomy -trix -trope -trophy -tropic -tropism -tropous -tude -ty -type -ule -ulent -ure -uria -vorous -ward -wards -ways -wise -y -yl -zoa -zoon 3-D A A & R A battery A horizon A number 1 A-1 A-bomb A-frame A.
    [Show full text]
  • NOA: an INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas Jo
    Computing and Informatics, Vol. 32, 2013, 1001{1030, V 2013-Feb-11 NOA: AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM Igor Santos, Xabier Ugarte-Pedrero Felix Brezo, Pablo G. Bringas S3Lab, DeustoTech { Computing Deusto Institute of Technology, University of Deusto Avenida de las Universidades 24, 48007, Bilbao, Spain e-mail: fisantos, xabier.ugarte, felix.brezo, [email protected] Jos´eMar´ıa Gomez-Hidalgo´ Optenet, Madrid, Spain e-mail: [email protected] Communicated by Deepak Gang Abstract. Malware refers to any type of code written with the intention of harming a computer or network. The quantity of malware being produced is increasing every year and poses a serious global security threat. Hence, malware detection is a cri- tical topic in computer security. Signature-based detection is the most widespread method used in commercial antivirus solutions. However, signature-based detec- tion can detect malware only once the malicious executable has caused damage and has been conveniently registered and documented. Therefore, the signature-based method fails to detect obfuscated malware variants. In this paper, a new malware detection system is proposed based on information retrieval. For the representa- tion of executables, the frequency of the appearance of opcode sequences is used. Through this architecture a malware detection system prototype is developed and evaluated in terms of performance, malware variant recall (false negative ratio) and false positive. Keywords: Malware detection, computer security, information retrieval, static analysis Mathematics Subject Classification 2010: 68-00, 68T30, 68U3 1002 I. Santos, X. Ugarte-Pedrero, F. Brezo, P. G. Bringas, J. M. G´omez-Hidalgo 1 INTRODUCTION Malware (or malicious software) is defined as computer software that has been ex- plicitly designed to harm computers or networks.
    [Show full text]
  • The Rise of Roscoe Paine 1 the Rise of Roscoe Paine
    The Rise of Roscoe Paine 1 The Rise of Roscoe Paine Project Gutenberg's The Rise of Roscoe Paine, by J. C. Lincoln #5 in our series by Joseph C. Lincoln Copyright laws are changing all over the world, be sure to check the laws for your country before redistributing these files!!! Please take a look at the important information in this header. We encourage you to keep this file on your own disk, keeping an electronic path open for the next readers. Do not remove this. This should be the first thing seen when anyone opens the book. Do not change or edit it without written permission. The words are carefully chosen to provide users with the information they need about what they can legally do with the texts. **Welcome To The World of Free Plain Vanilla Electronic Texts** **Etexts Readable By Both Humans and By Computers, Since 1971** *These Etexts Prepared By Hundreds of Volunteers and Donations* Information on contacting Project Gutenberg to get Etexts, and further information is included below. We need your donations. Presently, contributions are only being solicited from people in: Texas, Nevada, Idaho, Montana, Wyoming, Colorado, South Dakota, Iowa, Indiana, and Vermont. As the requirements for other states are met, additions to this list will be made and fund raising will begin in the additional states. These donations should be made to: Project Gutenberg Literary Archive Foundation PMB 113 1739 University Ave. Oxford, MS 38655 Title: The Rise of Roscoe Paine Author: Joseph C. Lincoln Release Date: March, 2001 [Etext #3137] Edition: 10 Project Gutenberg's The Rise of Roscoe Paine, by J.
    [Show full text]