With the number of information security certifications seemingly growing by the day, some in information security are starting to wonder whether there are any specific benefits to be had by earning the common certifications for this career track in a certain order. Those focusing on systems security (including Cloud) may be asking themselves the optimal order in which to earn the Systems Security Certified Practitioner (SSCP), Certified Cloud Security Professional (CCSP) and the Certified Information Systems Security Professional (CISSP).
There is a pretty clear answer to this question. This article will detail these certifications, including what knowledge areas the certifications cover, the requirements of each certification, as well as a recommendation of which order to earn these pivotal systems-focused information security certifications.
Released by (ISC)2, the Systems Security Certified Practitioner (SSCP) is intended for those working in systems and network security who develop information security standards, policies and procedures, as well as who manages hardware and software implementation for an organization. The SSCP is fairly broad, as it covers seven domains of knowledge:
- Access controls
- Security operations and administration
- Risk identification, monitoring and analysis
- Incident response and recovery
- Network and communications security
- System and application security
Candidates for this certification have a couple of options to meet the experience requirement. SSCP candidates must have either one year of paid work experience minimum in one of the seven domains of knowledge covered by the certification exam, or they may be granted a one-year prerequisite pathway for earning either a bachelor’s or master’s degree in cybersecurity.
Another possible option is if candidates do not have the work experience or prerequisite pathway, they can earn an Associate of (ISC)2 by passing the SSCP certification exam and will then have two years to earn (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/2RGHp5eaFvQ/