All of a cybersecurity professional’s knowledge and experience cannot be reduced to their certifications and whether or not they have them. Nonetheless, having certifications shows prospective employers and clients that you understand the knowledge that each certification covers.
It’s also worthwhile for employers to invest in their employees by paying for their certification-specific training and exams. Paying for your IT employees to be security certified can be a useful staple in their cybersecurity training. IT workers who are trained in cybersecurity are a key component of your defense against cyberattack. Plus, certifications expire. That compels security practitioners to keep up with changing technology and standards, partly by writing new versions of security certification exams or acquiring CPEs.
A lot of product vendors, such as Cisco and Microsoft, have their own certifications, which may be useful to security practitioners who use their technology. But I’m going to cover vendor neutral security certifications for this post. In my opinion, they’re the most important certifications a security practitioner can have.
I believe the first certification security practitioners should get, before any others, is CompTIA’s Security+. It really does cover the basics that all security practitioners should know, regardless of their role.
CompTIA recommends that people who plan to write their Security+ exam should have a couple of years of general networking experience and preferably a CompTIA Network+ certification. I actually acquired my Network+ after I acquired my Security+ and I fared okay.
The Security+ certification covers subject matter such as cryptography, risk identification and mitigation, security infrastructure, identity management, and network access control. I would even recommend the Security+ to people who work as systems administrators or in helpdesk. Understanding the basics of security technology and implementation is useful for all IT roles.
If you acquired Security+ certification prior to January 1 (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Kim Crawley. Read the original post at: Cylance Blog