Tuesday, October 13, 2009

Security Certifications !

Information Systems Security Architecture Professional (CISSP-ISSAP)
The CISSP-ISSAP is an appropriate credential for Chief Security Architects and
Analysts who may typically work as an independent consultant or in a similar capacity within
an enterprise

The six domains of the CISSP-ISSAP CBK are:

• Access Control Systems and Methodology
• Cryptography
• Physical Security Integration
• Requirements Analysis and Security Standards, Guidelines and Criteria
• Technology Related Business Continuity and Disaster Recovery Planning
• Telecommunications and Network Security

Information Systems Security Engineering Professional
(CISSP-ISSEP)
was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes and all information systems. One of the domains of the CISSP-ISSEP CBK holds specific relevance to U.S. law - however it’s still an extremely relevant tool for any security professional.

The four domains of the CISSP-ISSEP CBK are:
• Certification and Accreditation
• Systems Security Engineering
• Technical Management
• U.S. Government Information Assurance Regulations

Information Systems Security Management Professional (CISSP-ISSMP)
An CISSP-ISSMP® establishes, presents and governs information security policies and
procedures as supportive to overall business goals rather than a drain on resources.
CISSP-ISSMP certification holder will be responsible for constructing the framework of the information security department and define the means of supporting the group internally.

The five domains of the CISSP®-ISSMP® CBK® are:

• Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) and
Continuity of Operations Planning (COOP)
• Enterprise Security Management Practices
• Enterprise-wide System Development Security
• Law, Investigations, Forensics and Ethics
• Overseeing Compliance of Operations Security
For more information on the CISSP Concentrations, visit www.isc2.org/concentrations.
www.isc2.org
Bibliography/References: CISSP All In One Review by Shon Harris, website www.cissp.com,website www.isc.com
http://book.bestwestern.com/bestwestern/productInfo.do?propertyCode=09103

Wayne Hudson (888) 373-5116 ext 102 OR Kathy Conlon (888) 373-5116 ext 104
WayneH@LogicalSecurity.com KathyC@LogicalSecurity.com

No comments:

Post a Comment