Credentials/Certifications |
Entry- Recommended: N/A
- Example Types: N/A
- Example Topics: N/A
|
Intermediate- Recommended: Not essential but may be beneficial
- Example Types: N/A
- Example Topics: Certifications addressing enterprise security, risk management and incident response, research and analysis, integration of computing, communications and business disciplines as well as technical integration of enterprise components, categorization of information systems, selection of security controls, security control implementation and assessment, information system authorization, monitoring of security controls, system security, network infrastructure, access control, cryptography, assessments and audits, organizational security, authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, malicious code countermeasures, strategic program management, program lifecycle (initiating, planning, executing, controlling, closing), benefits management, stakeholder management, and governance
|
Advanced- Recommended: Not essential but may be beneficial
- Example Topics: Certifications addressing network types, network media, switching fundamentals, TCP/IP, IP addressing and routing, WAN technologies, operating and configuring IOS devices, and managing network environments, system security, network infrastructure, access control, cryptography, assessments and audits, organizational security, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, access control theory, alternate network mapping techniques, authentication and password management, common types of attacks, contingency planning, critical security controls, concepts, crypto fundamentals, defense-in-depth, DNS, firewalls, honeypots, ICMP, incident handling fundamentals, intrusion detection overview, IP packets, IPS overview, IPv6, legal aspects of incident handling, Mitnick-Shimomura attack, network addressing, network fundamentals, network mapping and scanning, network protocol, policy framework, protecting data at rest, PKI, reading packets, risk management, securing server services, SIEM/Log management, steganography overview, TCP, UDP, virtual private networks, viruses and malicious code, vulnerability management overview, vulnerability scanning, web application security, auditing and forensics, network security overview, permissions and user rights, security templates and group policy, service packs, hotfixes and backups, active directory and group policy overview, wireless security, authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, and malicious code countermeasures, network and endpoint security technologies, network protocols for managers, project management and business situational awareness, selling and managing the mission, strategic program management, program lifecycle (initiating, planning, executing, controlling, closing), benefits management, stakeholder management, and governance
|
Education |
Entry- Recommended: No (not an Entry-level Work Role)
- Example Types: N/A
- Example Topics: N/A
|
Intermediate- Recommended: Not essential but may be beneficial
- Example Types: Bachelor's (certifications addressing information systems security, advanced systems management, may substitute education)
- Example Topics: Computer science, cybersecurity, information technology, software engineering, information systems, and computer engineering
|
Advanced- Recommended: Not essential but may be beneficial
- Example Types: Bachelor's, Master's, Ph.D. (certifications addressing information systems security and advanced systems management may substitute education)
- Example Topics: Computer science, cybersecurity, information technology, software engineering, information systems, and computer engineering
|