Samer Aoudi
Cybersecurity Certifications

What is certification, anyway? The dictionary meaning of certification is the action or process of providing someone or something with an official document attesting to a status or level of achievement. The term certification is associated with the achievement of some sort of a certificate. In the context of this article, a certification is a professional credential validated through testing and verified by a known body. For many Cybersecurity job positions, certification is a minimum requirement.

Achieving a cybersecurity certification requires time and effort spent acquiring knowledge and skills necessary to perform relevant tasks. A quick review of job postings shows that a majority of open positions require an industry-recognized certification appropriate for the job function. For instance, when you examine Cybersecurity Analyst job listings, you will see that one or more of the following certifications is required: CISA, CIPP, CISM, GIAC, or Security+.

Cybersecurity Careers

There are a wide range of cybersecurity certifications available, each with its own focus and requirements. Some of the most important and widely recognized certifications include:

  • Certified Information Systems Security Professional (CISSP): This certification is designed for experienced cybersecurity professionals and covers a wide range of topics, including security management, risk management, network security, and software development security.
  • Certified Ethical Hacker (CEH): This certification is designed for professionals who want to learn how to identify and prevent cyber attacks. It covers topics such as network security, web application security, and mobile security.
  • Certified Information Security Manager (CISM): This certification is specifically designed for information security managers and covers topics such as risk management, incident management, and security governance.
  • Certified Information Systems Auditor (CISA): This certification is designed for professionals who audit, control, monitor, and assess an organization's information technology and business systems.
  • Certified Cloud Security Professional (CCSP): This certification is designed for professionals who work with cloud technologies and covers topics such as cloud architecture, data security, and compliance.

In addition to these certifications, there are many other specialized cybersecurity certifications available, depending on an individual's specific career goals and areas of interest. It is important to carefully research the different options and choose a certification that aligns with your career aspirations and meets the requirements of your employer or industry.

Is Certification Alone Enough?

Market data shows that most cybersecurity professionals have a Bachelor's degree in Computer Science, Information Technology, or related fields. As I mentioned in another article, cyber attacks are evolving in complexity. To protect against complex attacks, the industry need professional defenders who possess the knowledge and skills.

Industry certifications are based on professional training for a specific role. Academic degrees, on the other hand, are often research-oriented and focus on a wider, but specific, field of study. Moreover, the acceptance of professional qualifications varies from one country to another. The USA, for example, is more accepting of professional qualifications, say, than Asia. One might argue that this is mainly due to the fact that many awarding bodies are US based and therefore more nationally recognized than internationally.

"While the internationalization of markets is changing the acceptance of professional qualifications, we're not quite there yet."

In recent years, and due to globalization, many professional awarding bodies are becoming internationally recognized. While the internationalization of markets is changing the acceptance of professional qualifications, we're not quite there yet. In my opinion, professional certifications are not sufficient on their own. In the Cybersecurity industry, the opposite is also true; an academic degree on its own is not enough. My role involves talking to industry representatives to determine skills gaps in the market. Many employers strongly believe that college graduates lack practical skills. While college graduates are trainable, most cybersecurity jobs require work readiness on day one. When you combine a college degree with professional qualifications, you are definitely improving your chances of attracting top employers.

The $1M Question: Which Certification?

Achieving a cybersecurity certification requires time and money (sometimes, lots of it). Therefore, selecting the right certification(s) is critical. As always, there are a lot of factors to consider and questions to ask:

  • What does the markey want?
  • Can you afford the certification (consider money and time)
  • Are there authorized training providers (F2F or online)?
  • Are there approved testing centers?
To better understand the cybersecurity job market, read the following article:

Careers in Cybersecurity »

Below is US market data to help you better understand the demand for cybersecurity certifications

Job Openings Requesting Certifications*

*Based on the CyberSeek Cybersecurity USA Heat Map from May 2021 through April 2022

CISSP
137,140
CompTIA Security+
94,175
CISA
80,685
GIAC
59,326
CISM
55,561
CIPP
5,513


#cybersecurity #careers #certifications #cissp #comptia
Ads by Google
2022 Top Cybersecurity Certifications
*Based on the CyberSeek Cybersecurity USA Heat Map from May 2021 through April 2022

CISSP (Certified Information Systems Security Professional) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².

#Job Openings Requiring CISSP*
137,140

Who is CISSP for?
The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles, including those in the following positions:
  • Chief Information Security Officer
  • Chief Information Officer
  • Director of Security
  • IT Director/Manager
  • Security Systems Engineer
  • Security Analyst
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Consultant
  • Network Architect
CISSP Domains
CISSP curriculum organizes the material into eight Information Security topics called domains. The eight domains are:
  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security
CISSP Requirements

To qualify for the CISSP, candidates must pass the exam and have at least five years of cumulative, paid work experience in two or more of the eight domains of the (ISC)² CISSP Common Body of Knowledge (CBK®).

A candidate who doesn’t yet have the required experience to become a CISSP may become an Associate of (ISC)² after successfully passing the CISSP exam. The Associate of (ISC)² will then have six years to earn the experience needed for CISSP certification.

Exam Code NA
#Questions (English) 125-175
Question Type Computer Adaptive Testing
Max Time 4 hours
Passing Score (max 1,000) 700
Cost $125 AMF**
**Once your endorsement application has been approved, you will need to pay your first Annual Maintenance Fee (AMF). Associates of (ISC)² AMFs pay $50

Download The CISSP Guide (PDF) »

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

#Job Openings Requiring Security+*
94,175

Who is Security+ for?

CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
  • Identify, analyze, and respond to security events and incidents

Security+ Overview

Security+ certification covers the following topics:

  • Attacks, Threats and Vulnerabilities: Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
  • Operations and Incident Response: Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
  • Architecture and Design: Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.
  • Governance, Risk and Compliance: Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.
  • Implementation: Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.

Security+ Requirements

The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents

Exam Code SY0-601
#Questions 90
Question Type Multiple choice and performance-based
Max Time 90 min
Passing Score (max 900) 750
Cost $381

ISACA's Certified Information Systems Auditor (CISA) is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems.

#Job Openings Requiring CISA*
80,685

Who is CISA for?

The CISA certification validate's one's expertise to move up in a cybersecurity career, including the following positions:

  • IT Auditor
  • Cybersecurity Engineer
  • Cybersecurity Analyst
  • Security Architect
  • Cybersecurity Manager

CISA Overview

The CISA job practice consists of domains, subtopics and supporting tasks representing the work performed in information systems audit, assurance and control. Below are the key domains, subtopics and tasks candidates will be tested on:
Domain 1—INFORMATION SYSTEMS AUDITING PROCESS - (21%)

Providing audit services in accordance with standards to assist organizations in protecting and controlling information systems. Domain 1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.

A. Planning
  1. IS Audit Standards, Guidelines, and Codes of Ethics
  2. Business Processes
  3. Types of Controls
  4. Risk-Based Audit Planning
  5. Types of Audits and Assessments
B. Execution
  1. Audit Project Management
  2. Sampling Methodology
  3. Audit Evidence Collection Techniques
  4. Data Analytics
  5. Reporting and Communication Techniques
  6. Quality Assurance and Improvement of the Audit Process
Domain 2—Governance and Management of IT - (17%)

Domain 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

A. IT Governance
  1. IT Governance and IT Strategy
  2. IT-Related Frameworks
  3. IT Standards, Policies, and Procedures
  4. Organizational Structure
  5. Enterprise Architecture
  6. Enterprise Risk Management
  7. Maturity Models
  8. Laws, Regulations, and Industry Standards affecting the Organization
B. IT Management
  1. IT Resource Management
  2. IT Service Provider Acquisition and Management
  3. IT Performance Monitoring and Reporting
  4. Quality Assurance and Quality Management of IT
Domain 3—Information Systems Acquisition, Development and Implementation - (12%)

A. Information Systems Acquisition and Development
  1. Project Governance and Management
  2. Business Case and Feasibility Analysis
  3. System Development Methodologies
  4. Control Identification and Design
B. Information Systems Implementation
  1. Testing Methodologies
  2. Configuration and Release Management
  3. System Migration, Infrastructure Deployment, and Data Conversion
  4. Post-implementation Review
Domain 4—INFORMATION SYSTEMS OPERATIONS AND BUSINESS RESILIENCE - (23%)

Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Operations
  1. Common Technology Components
  2. IT Asset Management
  3. Job Scheduling and Production Process Automation
  4. System Interfaces
  5. End-User Computing
  6. Data Governance
  7. Systems Performance Management
  8. Problem and Incident Management
  9. Change, Configuration, Release, and Patch Management
  10. IT Service Level Management
  11. Database Management
B. Business Resilience
  1. Business Impact Analysis (BIA)
  2. System Resiliency
  3. Data Backup, Storage, and Restoration
  4. Business Continuity Plan (BCP)
  5. Disaster Recovery Plans (DRP) 
Domain 5—Protection of Information Assets - (27%)

Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

A. Information Asset Security and Control
  1. Information Asset Security Frameworks, Standards, and Guidelines
  2. Privacy Principles
  3. Physical Access and Environmental Controls
  4. Identity and Access Managementv
  5. Network and End-Point Security
  6. Data Classification
  7. Data Encryption and Encryption-Related Techniques
  8. Public Key Infrastructure (PKI)
  9. Web-Based Communication Techniques
  10. Virtualized Environments
  11. Mobile, Wireless, and Internet-of-Things (IoT) Devices
B. Security Event Management
  1. Security Awareness Training and Programs
  2. Information System Attack Methods and Techniques
  3. Security Testing Tools and Techniques
  4. Security Monitoring Tools and Techniques
  5. Incident Response Management
  6. Evidence Collection and Forensics

CISA Requirements

The exam is available either online with remote proctoring or in-person at a testing center. CISA requires a five (5) or more years of experience in IS/IT audit, control, assurance, or security. Experience waivers are available for a maximum of three (3) years.

Exam Code NA
#Questions 150
Question Type Multiple choice
Max Time 4 hours
Passing Score (max 800) 450
Cost $575 (Member) / $760 (Nonmember)
Ads by Google
© Samer Aoudi 2005-2024