EC-Council Cyber Security Programs Guide

EC-Council, a global leader in InfoSec certification programs, recently launched their Cyber Security Programs Guide. This guide groups various EC-Council certifications into six tracks designed to provide cyber professionals with a compounding skill set that allows them to grow from beginner to advanced stages in their particular cyber security job area.

The EC-Council Cyber Security Tracks Include:

  1. Foundation
  2. Vulnerability Assessment and Penetration Testing
  3. Cyber Forensics
  4. Network Defense and Operations
  5. Software Security
  6. Governance

Download the Full EC-Council Cyber Security Programs Guide 

Foundation Track

The Foundation track is designed for general computer users who need a basic understanding of security in order to stay safe online while leveraging the Internet for work or play.

Foundation Certification Track

Beginner:

  • CSCU – Certified Secure Computer User

Intermediate:

  • FNS – Network Security Fundamentals
  • FIS – Information Security Fundamentals
  • CFF – Computer Forensics Fundamentals

Expert:

  • ECSS – EC-Council Certified Security Specialist

What You Will Learn

This track certifies individuals in a basic understanding of:

  • Cloud Security
  • Password Security
  • Social Engineering Countermeasures
  • Mitigating Identity Theft
  • Email Security
  • Safe Browsing
  • Data Protection
  • Physical Security
  • Mobile Device Security
  • Data Backup
  • Social Network Security
  • Antivirus Protection
  • Disaster Recovery
  • Internet Security
  • Credit Card Security
  • Monitoring Kids Online
  • Wireless & Home Network Security
  • OS Security

Vulnerability Assessment and Penetration Testing (VAPT) Track

The Vulnerability Assessment & Penetration Testing (VAPT) track is designed primarily for Information Security professionals. These InfoSec workers hold job roles such as:

  • Information Assurance Security Officer
  • InfoSec Analyst/Administrator
  • InfoSec Manager/Specialist
  • Information Systems Security Engineer/Manager
  • Security Analyst
  • InfoSec Officer
  • InfoSec Auditor
  • Risk or Vulnerability Analyst

Vulnerability Assessment and Penetration Testing Certification Track

In addition to following the certification path below, InfoSec professionals interested in holistically developing their knowledge should consider coupling the certifications with higher education degrees. EC-Council suggests a BS in Cyber Security, Graduate Certificate in ITA, SP and a MS in Cyber Security as being complementary to the certification track.

Beginner:

Intermediate:

Expert:

  • CAST 611 – Advanced Penetration Testing
  • CAST 613 – Hacking & Hardening Your Corporate WebApplication
  • CAST 616 – Securing Windows Infrastructure

What You Will Learn – According to NICE

According to the Cybersecurity Workforce Framework designed by NICE, this track will map to several of the KSAs tied to the Protect and Defend, Securely Provision and Analyze categories. The KSAs include:

  • Cybersecurity Defense Analysis
  • Cybersecurity Defense Infrastructure Support
  • Incident Response
  • Vulnerability Assessment and Management
  • Test and Evaluation
  • Threat Analysis
  • Exploitation Analysis

Cyber Forensics Track

The cyber forensic track is ideal for Computer Forensic Analysts, Computer Network Defense, Forensic Analyst and Digital Forensic Examiners. This track can also be paired with a BS and MS in Cyber Security as well as Graduate Certificates in DF, EIA.

Cyber Forensics Certification Track

Beginner:

Intermediate:

Expert:

  • CAST 612 – Advanced Mobile Forensics and Security

What You Will Learn – According to NICE

This track also maps to the NICE Cyber Workforce KSAs under the Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend and Analyze categories. The specific KSAs include:

  • Risk Management
  • Test and Evaluation
  • Network Services
  • System Administration
  • Systems Analysis
  • Cybersecurity Management
  • Cybersecurity Defense Analysis
  • Cybersecurity Defense Infrastructure Support
  • Incident Response
  • Vulnerability Assessment and Management
  • Threat Analysis
  • Exploitation Analysis

Network Defense and Operations Track

The Network Defense and Operations Track is best suited for IT professionals involved in network administration and needed to incorporate an understanding of security and disaster recovery into their daily operations. These professionals typically hold job titles such as:

  • Network Security Administrators
  • Network Security Engineer or Specialist
  • Network Defense Technicians
  • Security Analyst
  • Security Operator
  • Computer Network Dense Analyst
  • Cybersecurity Intelligence Analyst
  • Enterprise Network Defense Analyst

Network Defense and Operations Certification Track

This certification track can be coupled with academic achievements such as earning a BS and MS in Cyber Security as well as Graduate Certificate in DR, EIA and ITA.

Beginner:

Intermediate:

Expert:

  • CAST 616 – Security Windows Infrastructure
  • CAST 614 – Advanced Network Defense

What You Will Learn – According to NICE

The Network Defense and Operations track maps to several of the NICE Cyber Workforce job categories, including Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend and Analyze. The specific KSAs these combined certifications address, include:

  • Risk Management
  • Test and Evaluation
  • Network Services
  • Systems Administration
  • Systems Analysis
  • Cybersecurity Management
  • Cybersecurity Defense Analysis
  • Cybersecurity Defense Infrastructure Support Incident Response
  • Vulnerability Assessment and Management
  • Threat Analysis

Software Security Track

Professionals involved in the software development process either as an Application, Software or Security Engineer/Developer are most ideal to follow this certification track.

Software Security Certification Track

The Software Security track can be complemented with a Graduate Certificate in ISP, DR, ITA, EIA as well as a Bachelor’s and Master’s Degrees in Cyber Security.

Beginner:

  • CSCU – Certified Secure Computer User

Intermediate:

  • ECSP Java – EC-Council Certified Secure Programmer JAVA
  • ECSP .NET – EC-Council Certified Secure Programmer .NET

Expert:

  • CAST 611 – Advanced Penetration Testing
  • CAST 616 – Securing Windows Infrastructure

What You Will Learn – According to NICE

Professionals who complete the Software Security Track have demonstrated capabilities in the NICE specialty areas of Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend and Analyze and the concepts learned match the following KSAs:

  • Software Development
  • Technology R&D
  • Data Administration
  • Systems Analysis
  • Cybersecurity Management
  • Cybersecurity Defense Analysis
  • Vulnerability Assessment and Management
  • Analyzes collected information to identify vulnerabilities and potential for exploitation

Governance Track

This track is designed for senior level manages and it focuses on a single certification, the EC-Council Chief Information Security Officer (CCISO). Security professionals in job roles such as Chief Information Security Officer (CISO), Chief Security Officer (CSO), Information Security Director, or Information Assurance Program Manager will greatly benefit from the strategic concepts accredited by the CCISO certification. This program covers the following domains:

  1. Governance
  2. Information Security Core Competencies
  3. Security Program Management and Operations
  4. Information Security Core Concepts
  5. Strategic Planning, Finance, and Vendor Management

These hands-on skills pair well with the theoretical concepts covered in an MS in Cyber Security degree program as well as in preparation for a Graduate Certificate in Information Security Professional, Information Analyst, IT Analyst, Disaster Recovery or Digital Forensics.

How CCISO Maps to NICE

Like all the other EC-Council Cyber Security Programs, the Governance track also maps to the NICE Cyber Workforce Framework’s Securely Provision, Oversee and Govern and Collect and Operate specialty areas. Additionally, CCISO help professionals attain KSAs in:

  • Risk Management
  • Technology R&D
  • Systems Requirements Planning
  • Legal Advice and Advocacy
  • Training, Education and Awareness
  • Cybersecurity Management
  • Strategic Planning and Policy
  • Executive Cybersecurity Leadership
  • Acquisition and Program/Project Management
  • Cyber Operational Planning

The post EC-Council Cyber Security Programs Guide appeared first on Phoenix TS.

This is a Security Bloggers Network syndicated blog post authored by Ashley Wheeler. Read the original post at: Blog – Phoenix TS