SlideShare a Scribd company logo
5
Most read
14
Most read
16
Most read
Presented By
Lionel Hackett
WiseCrowd
CEO & Co-Founder
2 November 2016@WiseCrowdGlobal
A Career in Cybersecurity
Lionel Hackett
WiseCrowd
CEO and Co-founder
About Me
Previous
Experience
“The trusted online platform
connecting businesses with freelance
consultants in
Governance, Risk & Compliance
(GRC)”
Introduction - A Career in Cybersecurity
• Why? The Opportunity
• What? The Certifications
• How? The Career Boosters
A Career in Cybersecurity
ISACA is an international professional
association focused on IT Governance.
Previously known as the Information
Systems Audit and Control
Association, ISACA now goes by its
acronym only, to reflect the broad
range of IT governance professionals it
serves
A Career in Cybersecurity
A Career in Cybersecurity
A Career in Cybersecurity
CSX Practitioner (CSXP)
• Demonstrates the ability to serve as a first responder to a cybersecurity incident following
established procedures and defined processes. One certification and three training courses.
• This certification is a prerequisite for any of the five CSX Specialist certifications.
CSX Specialist (CSXS)
• Demonstrates effective skills and deep knowledge in one or more of the five areas based closely
on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover.
• There is one certification and one training course for each of these five areas. Professionals can
choose to attain one or more of the five.
• CSX Practitioner is a prerequisite for a CSX Specialist designation.
CSX Expert (CSXE)
• Demonstrates ability of a master/expert-level cybersecurity professional who can identify,
analyse, respond to, and mitigate complex cybersecurity incidents.
• There is one training course and one certification at this level. No prerequisites are required.
ISACA’s new cybersecurity certifications
Certified Information Systems Auditor (CISA)
• Demonstrates audit skills and the ability to assess vulnerabilities, establish controls, and report on
compliance within the enterprise.
• Minimum of five years of work experience in the fields of Information Systems Auditing, Control, Assurance
or Security is a prerequisite.
Certified Information Security Manager (CISM)
• Demonstrates the ability to create a relationship between an information security program and broader
business goals and objectives. Ensures knowledge of information security, as well as development and
management of an information security program.
• Minimum of five years of work experience in the field of information security, with at least three years in
the role of information security manager is a prerequisite.
Certified in Risk and Information Systems Control (CRISC)
• Prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and
positions them to become strategic partners to the enterprise.
ISACA Certifications
Systems Security Certified Practitioner (SSCP)
• Good option for IT managers who have built their technical skills and practical security know-
how via hands-on roles.
• Offered by the International Information Systems Security Certification Consortium (ISC)2.
• Minimum of one year of cumulative paid full-time work experience in one or more of the seven
domains of the SSCP Common Body of Knowledge (CBK) is prerequisite.
Certified Information Systems Security Professional (CISSP)
• (ISC)2 certification for professionals who have extensive technical and managerial skills and
experience.
• Demonstrates credibility and expertise to design, implement, and manage their own
information security programs to protect their businesses from the rapid increase in
sophisticated cyberattacks.
• Minimum of five years of paid full-time work experience in two of the eight domains of the CISSP
CBK is prerequisite.
(ISC)² Cybersecurity Certifications
Global Information Assurance Certification (GIAC) tests and validates the ability of practitioners in
areas including security administration, forensics, management, audits, software security, and legal.
GIAC Security Essentials (GSEC)
• Demonstrates that they are qualified for IT systems hands-on roles with respect to security tasks.
Candidates are required to demonstrate an understanding of information security beyond simple
terminology and concepts.
GIAC Penetration Tester (GPEN)
• Demonstrates penetration-testing methodologies, the legal issues surrounding penetration
testing and how to properly conduct a penetration test as well as best practice technical and
non-technical techniques specific to conduct a penetration test.
GIAC Cybersecurity Certifications
EC-Council is a member-based organisation that certifies individuals in various e-business and
information security skills.
Certified Ethical Hacker (CEH)
• CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program,
suitable for candidates who want to acquaint themselves with the latest security threats,
advanced attack vectors, and practical real time demonstrations of the latest hacking
techniques, methodologies, tools, tricks, and security measures.
• Official training or at least two years of information security related experience is
prerequisite.
EC-Council Certified Security Analyst (ECSA)
• Advanced ethical hacking certification and a step ahead of a CEH. This certification helps
analysts validate the analytical phase of ethical hacking by being able to analyse the outcome
of hacking tools and technologies.
• Official training or at least two years of information security related experience is
prerequisite.
EC-Council Cybersecurity Certifications
Career Boosters
• Certification and accreditation
• Continuing Professional Education (CPE)
• Attend events and conferences
• Mentoring
• Write articles or blog
• Maintain LinkedIn and Twitter profile
• Develop good relationships with recruiters
Conclusion
• Massive Opportunity
• Personally Challenging
• Constantly Evolving
• Exciting
Any Questions?
: @WiseCrowdGlobal
Website: http://wisecrowd.global
Email: info@wisecrowd.global

More Related Content

PPTX
Career in cyber security
PPTX
Cisco router basic
PDF
Cyber security career development paths
PDF
Basic Internal Auditing Presentation
PDF
Cisco umbrella overview
PPTX
Microsoft Defender for Endpoint Overview.pptx
PDF
European Cybersecurity Context
PPTX
Steganography Project
Career in cyber security
Cisco router basic
Cyber security career development paths
Basic Internal Auditing Presentation
Cisco umbrella overview
Microsoft Defender for Endpoint Overview.pptx
European Cybersecurity Context
Steganography Project

What's hot (20)

PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cybersecurity
PPTX
Cyber Security A Challenges For Mankind
PDF
Cyber Security
PDF
Cyber Security Awareness
PPTX
Cybersecurity Awareness Training
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber security
PDF
Cyber security
PDF
Introduction to Cybersecurity
PPTX
Cybercrime and Security
PPTX
Cybersecurity
PPTX
Cyber security
PDF
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPT
Cyber Crime and Security
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cybersecurity
Cyber Security A Challenges For Mankind
Cyber Security
Cyber Security Awareness
Cybersecurity Awareness Training
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber security
Cyber security
Introduction to Cybersecurity
Cybercrime and Security
Cybersecurity
Cyber security
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber Crime and Security
Ad

Viewers also liked (20)

PPTX
The mobile health IT security challenge: way bigger than HIPAA?
PPTX
Getting Started with Business Continuity
PPTX
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
PPTX
Cybercrime and the Hidden Perils of Patient Data
PPTX
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
PPTX
Malware and the risks of weaponizing code
PPT
HIPAA, Privacy, Security, and Good Business
PPTX
Cyber security
PPTX
The Year Ahead in Cyber Security: 2014 edition
PPTX
Global threat landscape
PPTX
Enjoy Safer Technology and Defeat Cyber Criminals
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
PPTX
Cybersecurity for the non-technical
PPTX
2015: The year-ahead-in-cyber-security
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
Skills For Career In Security
PPTX
Cyber Security Career Advice
PDF
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
PDF
Operation Buhtrap - AVAR 2015
The mobile health IT security challenge: way bigger than HIPAA?
Getting Started with Business Continuity
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Cybercrime and the Hidden Perils of Patient Data
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware and the risks of weaponizing code
HIPAA, Privacy, Security, and Good Business
Cyber security
The Year Ahead in Cyber Security: 2014 edition
Global threat landscape
Enjoy Safer Technology and Defeat Cyber Criminals
Using Technology and People to Improve your Threat Resistance and Cyber Security
Cybersecurity for the non-technical
2015: The year-ahead-in-cyber-security
NCSAM = Cyber Security Awareness Month: Trends and Resources
Future of Cybersecurity 2016 - M.Rosenquist
Skills For Career In Security
Cyber Security Career Advice
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Operation Buhtrap - AVAR 2015
Ad

Similar to A Career in Cybersecurity (20)

PDF
PDF
Information Security Analyst- Infosec train
PDF
CISSP Certification Course InfosecTrain.pdf
PDF
Cyber-Security Certifications
PDF
PPSX
The Ultimate Guide To Cyber Security Certifications
PPTX
CISSP Vs. CISA Which is better for you.pptx
PPTX
What Cybersecurity Certifications Make You The Most Money Today.pptx
PDF
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
PPTX
Professional Designations IT Assurance
PDF
CISSO Certification| CISSO Training | CISSO
PDF
CISSO Certification | CISSO Training | CISSO
PPTX
Cyber-Security-Specialisttttttttttt.pptx
PDF
Alexander Knorr Transcript
DOCX
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
PPTX
CompTIA CySA+ domains and their Weightage.pptx
PPTX
5548 isaca for-students
PDF
EC-Council Certified SOC Analyst
PDF
Cissp exam outline 121417- final (2)
PPTX
Isaca career paths - the highest paying certifications in the industry
Information Security Analyst- Infosec train
CISSP Certification Course InfosecTrain.pdf
Cyber-Security Certifications
The Ultimate Guide To Cyber Security Certifications
CISSP Vs. CISA Which is better for you.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
Best Cyber Security Training Certification | ACS Networks and Technologies Pv...
Professional Designations IT Assurance
CISSO Certification| CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
Cyber-Security-Specialisttttttttttt.pptx
Alexander Knorr Transcript
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CompTIA CySA+ domains and their Weightage.pptx
5548 isaca for-students
EC-Council Certified SOC Analyst
Cissp exam outline 121417- final (2)
Isaca career paths - the highest paying certifications in the industry

Recently uploaded (20)

PPTX
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
PPTX
Principles of Inheritance and variation class 12.pptx
PDF
L-0018048598visual cloud book for PCa-pdf.pdf
PDF
Daisia Frank: Strategy-Driven Real Estate with Heart.pdf
PPTX
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
PPTX
1-4 Chaptedjkfhkshdkfjhalksjdhfkjshdljkfhrs.pptx
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
DOCX
mcsp232projectguidelinesjan2023 (1).docx
PPTX
Cerebral_Palsy_Detailed_Presentation.pptx
PDF
Sales and Distribution Managemnjnfijient.pdf
PDF
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
PPTX
Sports and Dance -lesson 3 powerpoint presentation
PPTX
The Stock at arrangement the stock and product.pptx
PDF
Josh Gao Strength to Strength Book Summary
PPTX
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
PPTX
Discovering the LMA Course by Tim Han.pptx
PPTX
PMP (Project Management Professional) course prepares individuals
PPTX
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
PPTX
normal_menstrual_cycle_,,physiology.PPTX
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
Principles of Inheritance and variation class 12.pptx
L-0018048598visual cloud book for PCa-pdf.pdf
Daisia Frank: Strategy-Driven Real Estate with Heart.pdf
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
1-4 Chaptedjkfhkshdkfjhalksjdhfkjshdljkfhrs.pptx
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
mcsp232projectguidelinesjan2023 (1).docx
Cerebral_Palsy_Detailed_Presentation.pptx
Sales and Distribution Managemnjnfijient.pdf
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
Sports and Dance -lesson 3 powerpoint presentation
The Stock at arrangement the stock and product.pptx
Josh Gao Strength to Strength Book Summary
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
Discovering the LMA Course by Tim Han.pptx
PMP (Project Management Professional) course prepares individuals
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
normal_menstrual_cycle_,,physiology.PPTX
esg-supply-chain-webinar-nov2018hkhkkh.pdf

A Career in Cybersecurity

  • 1. Presented By Lionel Hackett WiseCrowd CEO & Co-Founder 2 November 2016@WiseCrowdGlobal A Career in Cybersecurity
  • 2. Lionel Hackett WiseCrowd CEO and Co-founder About Me Previous Experience “The trusted online platform connecting businesses with freelance consultants in Governance, Risk & Compliance (GRC)”
  • 3. Introduction - A Career in Cybersecurity • Why? The Opportunity • What? The Certifications • How? The Career Boosters
  • 5. ISACA is an international professional association focused on IT Governance. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves
  • 9. CSX Practitioner (CSXP) • Demonstrates the ability to serve as a first responder to a cybersecurity incident following established procedures and defined processes. One certification and three training courses. • This certification is a prerequisite for any of the five CSX Specialist certifications. CSX Specialist (CSXS) • Demonstrates effective skills and deep knowledge in one or more of the five areas based closely on the NIST Cybersecurity Framework: Identify, Detect, Protect, Respond and Recover. • There is one certification and one training course for each of these five areas. Professionals can choose to attain one or more of the five. • CSX Practitioner is a prerequisite for a CSX Specialist designation. CSX Expert (CSXE) • Demonstrates ability of a master/expert-level cybersecurity professional who can identify, analyse, respond to, and mitigate complex cybersecurity incidents. • There is one training course and one certification at this level. No prerequisites are required. ISACA’s new cybersecurity certifications
  • 10. Certified Information Systems Auditor (CISA) • Demonstrates audit skills and the ability to assess vulnerabilities, establish controls, and report on compliance within the enterprise. • Minimum of five years of work experience in the fields of Information Systems Auditing, Control, Assurance or Security is a prerequisite. Certified Information Security Manager (CISM) • Demonstrates the ability to create a relationship between an information security program and broader business goals and objectives. Ensures knowledge of information security, as well as development and management of an information security program. • Minimum of five years of work experience in the field of information security, with at least three years in the role of information security manager is a prerequisite. Certified in Risk and Information Systems Control (CRISC) • Prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise. ISACA Certifications
  • 11. Systems Security Certified Practitioner (SSCP) • Good option for IT managers who have built their technical skills and practical security know- how via hands-on roles. • Offered by the International Information Systems Security Certification Consortium (ISC)2. • Minimum of one year of cumulative paid full-time work experience in one or more of the seven domains of the SSCP Common Body of Knowledge (CBK) is prerequisite. Certified Information Systems Security Professional (CISSP) • (ISC)2 certification for professionals who have extensive technical and managerial skills and experience. • Demonstrates credibility and expertise to design, implement, and manage their own information security programs to protect their businesses from the rapid increase in sophisticated cyberattacks. • Minimum of five years of paid full-time work experience in two of the eight domains of the CISSP CBK is prerequisite. (ISC)² Cybersecurity Certifications
  • 12. Global Information Assurance Certification (GIAC) tests and validates the ability of practitioners in areas including security administration, forensics, management, audits, software security, and legal. GIAC Security Essentials (GSEC) • Demonstrates that they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts. GIAC Penetration Tester (GPEN) • Demonstrates penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test. GIAC Cybersecurity Certifications
  • 13. EC-Council is a member-based organisation that certifies individuals in various e-business and information security skills. Certified Ethical Hacker (CEH) • CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program, suitable for candidates who want to acquaint themselves with the latest security threats, advanced attack vectors, and practical real time demonstrations of the latest hacking techniques, methodologies, tools, tricks, and security measures. • Official training or at least two years of information security related experience is prerequisite. EC-Council Certified Security Analyst (ECSA) • Advanced ethical hacking certification and a step ahead of a CEH. This certification helps analysts validate the analytical phase of ethical hacking by being able to analyse the outcome of hacking tools and technologies. • Official training or at least two years of information security related experience is prerequisite. EC-Council Cybersecurity Certifications
  • 14. Career Boosters • Certification and accreditation • Continuing Professional Education (CPE) • Attend events and conferences • Mentoring • Write articles or blog • Maintain LinkedIn and Twitter profile • Develop good relationships with recruiters
  • 15. Conclusion • Massive Opportunity • Personally Challenging • Constantly Evolving • Exciting
  • 16. Any Questions? : @WiseCrowdGlobal Website: http://wisecrowd.global Email: info@wisecrowd.global