Information Security Management Certifications — Choose Wisely
Back in the day, if you asked someone in tech if they were certified, you would usually get one of two answers: “Yes, I just got my Cisco/A+/Microsoft cert” or “No, but I’m working on it.” There were fewer certifications then, and the ones that existed were considered fundamental.
Now, however, IT certifications exist in a myriad of topics, complexities and levels. The higher up the chain you get, the more paradoxical these certifications become: on the one hand, they get significantly more specialized, but at the same time they also expand out to cover additional, not necessarily technical, topics.
For this article, we’re looking at the top five information security management certifications. IS certifications are already pretty specialized when it comes to technical skills, but once you start getting into management-level items, you’re also expected to understand how to deal with multiple departments, multiple disciplines and C-level executives.
These certifications are among the best of the best at what they do and can prepare you for a wide variety of situations. However, these certifications are designed to go beyond just “If A, then B” type scenarios — they excel at teaching concepts which can then be adapted to new circumstances beyond what you were explicitly trained for.
So, in no particular order, here are the top five information security management certifications.
1. CISSP — Certified Information Systems Security Professional
Certification Body: (ISC)2
The Certified Information Systems Security Professional (CISSP) exam covers an enormous amount of material across multiple domains, and as a result is an excellent certification for consideration by persons going into IS management. Many times, it’s considered a capstone certification because it already expects you to be familiar with multiple technical and security fields and builds up from (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Kurt Ellzey. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/9Yn5kYB8dfY/