Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.
AAA and Access Controls |
The candidate will demonstrate an understanding of access controls and effective authentication, authorization and accountability. |
Application Security |
The candidate will demonstrate an understanding of securing applications from malware and other common threats. |
Computer Math |
The candidate will demonstrate an understanding of foundational numbering systems. |
Cryptographic Algorithms and Attacks |
The candidate will demonstrate an understanding of cryptographic algrorithms. |
Fundamentals of Cryptography |
The candidate will demonstrate an understanding of cryptography and its application. |
History of Cryptography |
The candidate will demonstrate an understanding of cryptography throughout history.. |
Network Addressing and Protocols |
The candidate will demonstrate an understanding of network addressing and protcols. |
Network Attacks |
The candidate will demonstrate a foundational understanding of network attacks. |
Network Communication Fundamentals |
The candidate will demonstrate an understanding of network concepts and terminology. |
Network Security Technology |
The candidate will demonstrate an understanding of countermeasures and technologies employed to minimize the associated risks from attacks. |
Risk Management Principles and Security Policy |
The candidate will demonstrate an understanding of fundamental information security and risk management concepts as well as the components of effective policy creation and awareness programs. |
Systems Security |
The candidate will demonstrate an understanding of securing systems from common threats. |
Wireless Security Technology |
The candidate will demonstrate an understanding of wireless technologies as well as the defenses employed to minimize the associated risks from wireless attacks. |
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+