0% found this document useful (0 votes)
197 views24 pages

Infosec Certifications: The Very Good, The Almost Good and The Really Ugly

The document discusses several information security certifications including CompTIA Security+, EC-Council CEH, ISECOM OSSTMM, Silensec, Offensive Security OSCP and OSCE, CREST, SANS, GIAC, ISACA CISM and CISA, and CISCO security certifications. It provides details on the requirements, content, and benefits of each certification.

Uploaded by

Lucian Corlan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
197 views24 pages

Infosec Certifications: The Very Good, The Almost Good and The Really Ugly

The document discusses several information security certifications including CompTIA Security+, EC-Council CEH, ISECOM OSSTMM, Silensec, Offensive Security OSCP and OSCE, CREST, SANS, GIAC, ISACA CISM and CISA, and CISCO security certifications. It provides details on the requirements, content, and benefits of each certification.

Uploaded by

Lucian Corlan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

INFOSEC

CERTIFICATIONS
THE VERY GOOD, THE ALMOST
GOOD AND THE REALLY UGLY
18-Jun-2014
Lucian Corlan [email protected]
MSc InfoSec CISSP OSCP CISA SABSA CCNA Security CISM CSSLP(a) CEH
Cristian Serban [email protected]
SABSA OSCP CEH OSWP Security+ ISO27001 Auditor GIAC MCAD

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
DISCLAIMER

- From experience (and a bit of informed gossip) only


- Membership of some of the organisations (paying annual fees), nothing
more
- Not representing a professional services or training company
- Didn’t find any good, independent and impartial studies / comparisons of
security certifications
Agenda

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
3
Top Charts

#1 CompTIA SECURITY+
#2 CRISC
#3 CISM
#4 CISSP
#5 OSCE
#6 LPT
#7 CREST ACE/ICE
#8 GIAC Security Essentials
#9 CEH
#10 OSCP

https://www.linkedin.com/pulse/top-10-cyber-security-certifications-2015-sid-vanderloot

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
4
CompTIA
Security+

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
5
EC-Council
CEH – Certified Ethical Hacker

Ethical Hacking & Information Systems Security Auditing


◦ latest security threats
◦ advanced attack vectors
◦ practical real time demonstration of latest hacking techniques
◦ training with hands-on labs
◦ signed agreement stating the info will not be used for illegal or malicious attacks
◦ not anyone can be a student – screening process beforehand

Exam Details
◦ 125 multiple choice questions
◦ duration 4 hours
◦ passing score 70%

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
6
EC-Council
Other Certifications

CONFIDENTIAL and not for reproduction without prior written consent. © of The Sporting Exchange Limited. 7
CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN
CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
7
ISECOM
Institute for Security and Open Methodologies
began with the release of the OSSTMM, the Open Source Security
Testing Methodology Manual

8
Silensec

9
OFFENSIVE security
OSCP & OSCE

Penetration Testing with Kali Linux (PWK)


◦ Information Gathering Passive/Active
◦ Vulnerability Scanning
◦ Buffer Overflows (Windows and Linux)
◦ Working with Exploits
◦ Privilege Escalation
◦ Client Side Attacks
◦ Web Application Attacks
◦ Password Attacks
◦ Port Redirection and Tunneling
◦ The Metasploit Framework
◦ Bypassing Antivirus Software

Cracking the Perimeter


◦ Advanced Exploitation Techniques
◦ The Web Application angle
◦ The Backdoor angle
◦ The 0Day angle
◦ The Networking Angle - Attacking the Infrastructure

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
10
OFFENSIVE security
OSCP & OSCE

Offensive Security Certified Professional


◦ world’s first completely hands on offensive information security certification
◦ OSCP exam provides access to a dedicated vulnerable network
◦ designed to be compromised within a 24-hour time period
◦ entirely hands-on
◦ awarded to students who successfully gain administrative access to systems
◦ completed with the examinee submitting an in-depth penetration test report

Offensive Security Certified Expert


◦ next level after OSCP
◦ 48-hour certification exam

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
11
CREST

CREST is a
not for profit
organisation
that serves the
needs of a
technical
information
security
marketplace
that requires
the services of
a regulated
professional
services
industry.

CESG (Penetration Testing) 12


CREST + OSCP

Leading UK and US penetration testing certification bodies join forces in


global drive to professionalise cyber security sector.

CREST Registered Tester (CRT)


Offensive Security Certified Professional

13
14
SANS
Information Security

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
15
GIAC
Global Information Assurance Certification

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
16
Information Systems Audit and Control Association
CISM - Certified Information Security Manager

CISM requires demonstrated knowledge in four functional areas of information security 


◦ Information Security Governance (24%)
◦ Information Risk Management and Compliance (33%)
◦ Information Security Program Development and Management (25%)
◦ Information Security Incident Management (18%)

Exam
◦ administered biannually (June & December)
◦ in limited locations worldwide (only in Bucharest for Romania)
◦ 200 questions multiple choice – four hours
◦ submit verified evidence of five (5) years of work experience in the field of information security
◦ 3 of the 5 years of work experience must be gained performing the role of an information security manager

Maintain CISM
◦ annual maintenance fee
◦ annual minimum of 20 CPE hours
◦ minimum of 120 CPE hours for a three-year reporting period

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
17
Information Systems Audit and Control Association
CISA & CRISC

CISA – Certified Information Systems Auditor


◦ audit, control and security of information systems
◦ high degree of visibility and recognition in the fields of IT security
◦ certification is extremely challenging and is associated with a high failure rate

CISA certificate can be applied for if the following conditions are met + passed the CISA exam
◦ experience as an auditor of information systems
◦ compliance with Code of Ethics
◦ continuous training - CPE
◦ compliance with the standards for audits of information systems

CRISC – Certified in Risk and Information Systems Control


◦ experience in managing IT risks
◦ knowledge in five functional areas of IT risk management:
◦ Risk identification, assessment and evaluation
◦ Risk response
◦ Risk monitoring
◦ Information systems control, design and implementation
◦ IS control, monitoring and maintenance

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
18
CISCO Security Track

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
19
SABSA
Sherwood Applied Business Security
Architecture
SABSA is a framework and methodology for enterprise security architecture and
service management.

SABSA is a model and a methodology for developing risk-driven


enterprise information security architectures and for delivering security
infrastructure solutions that support critical business initiatives.

5 day course for Foundations


48 + 48 (really abstract!) questions

Sample question:
A security domain X comprises a set of security elements. All of these elements are also security elements of domain Y, but Y
also contains other additional security elements. Which ONE of the following statements is TRUE?
A. Y is a subdomain of X
B. X is a subdomain of Y
C. X and Y are equivalent domains
D. X is a subdomain of Y

20
CISSP
Certified Information Systems Security Professional
International Information Systems Security Certification Consortium
◦ vendor-neutral certification

Common Body of Knowledge


◦ Access control
◦ Telecommunications and network security
◦ Information security governance and risk management
◦ Software development security
◦ Cryptography
◦ Security architecture and design
◦ Operations security
◦ Business continuity and disaster recovery planning
◦ Legal, regulations, investigations and compliance
◦ Physical (environmental) security

Requirements
◦ five years of direct full-time security work experience in at least two CBK domains
◦ accept the CISSP Code of Ethics
◦ criminal history and related background
◦ pass multiple choice exam, 250 questions, six hours, 700/1000 possible points
◦ endorsed by another CISSP
◦ annual fee 85$ + renew by submitting Continuing Professional Education (CPE) credits

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
21
CISSP
Certified Information Systems Security Professional

Host Unknown presents: I'm a C I Double S P (CISSP Parody)


https://www.youtube.com/watch?v=whEWE6WC1Ew

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
22
Other certs

Cloud Security Alliance CCSK™ - Certificate of Cloud Security Knowledge


CGEIT (Governance of IT)
CRISC (focus on risk)
ISO 27001 Lead Auditor
ISO 27001 Lead Implementer
PRINCE2 (Project Management)
ITIL (not security)
COBIT (focus on risk)
Certified Secure Web Application Engineer (CSWAE) Mile2
Certified Penetration Testing Engineer (CPTE) Mile2
Certifications on specific product or technologies …Lots & Lots
….
….

23
Q&A

CONFIDENTIAL AND NOT FOR REPRODUCTION WITHOUT PRIOR WRITTEN


CONSENT. © OF THE SPORTING EXCHANGE LIMITED.
24

You might also like