Advancing Your Career With Certifications: Tips from InfoSec Institute Alum Jeffrey Coa

Jeffrey Coa, ISSO, Northrop Grumman Corporation

InfoSec Institute alum Jeffrey Coa is an Information Security Systems Officer at Northrop Grumman Corporation in Maryland. In addition to earning two undergraduate degrees in Computer Networks, Cybersecurity and Information Systems Management, he holds nine professional certifications: A+, Network+, Security+, Microsoft Certified IT Professional (MCITP), Microsoft Certified Solutions Associate (MCSA), Certified Ethical Hacker (CEH), Certified in Risk and Information System Controls (CRISC), Certified Information Systems Security Professional (CISSP) and CISSP-Information Systems Security Engineering Professional (ISSEP).

Jeff’s gearing up to earn his tenth certification — Project Management Professional (PMP) — later this month, and is just a few semesters away from finishing his Master’s Degree in Cybersecurity Management and Policy at the University of Maryland University College.

Here’s what Jeff had to say about the value of certification and his training experiences as a five-time InfoSec Institute student.

How Did You Break Into the Field of Cybersecurity?

I’ve been in cybersecurity for over three years now and want to eventually become a Chief Risk Officer. I spent about the first ten years of my career in an IT role and always knew I wanted to get into cybersecurity. I decided to earn my Security+ certification first to get my foot in my door. Security+ is a basic requirement for most cybersecurity roles, so that was a good place to start. This is especially true in government or government contractor roles.

I earned my CEH next and got my first security role as a Systems Administrator shortly after that. Since then, I’ve earned my CRISC, CISSP and CISSP-ISSEP, and am currently working on my PMP.

Why Are Security Certifications Valuable?

Certifications help you stand out in your field, especially in IT and security. They confirm you know your stuff and validate your understanding of specific domains. (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/JT5v0fARkIE/