Top 10 Certifications for 2010

CISSP, CISM Are Most Sought by Professionals
Information Security Media Group (ISMG) recently conducted its first annual Information Security Today Career Trends survey. The main objective was to benchmark 2010 trends in information security careers across industries. Survey results show that professionals are committed to growing their competencies and will invest their time and resources in certifications bodies in 2010.

chart

Based on survey results, here is a list of top 10 certifications most sought after by security professionals -

1. CISSP - Certified Information Systems Security Professional

Certified Information Systems Security Professional offered by ISC2 is generally the most recognized internationally and popular with information security professionals. For security practitioners planning to build a career in information security and holding at least five full years of experience in information security, the CISSP credential is an ideal career goal. Increasingly recruiters look for this credential in potential candidates as a validation of their commitment toward this profession. Thirty percent of survey respondents said they want to pursue CISSP certification in the next year.

2. CISM - Certified Information Security Manager

Certified Information Security Manager certification is offered by ISACA and is developed specifically for experienced information security managers and those who have information security management responsibilities. The CISM certification is for the individual who manages designs, oversees and/or assesses an enterprise's information security (IS). The CISM certification promotes international practices and provides executive management with assurance that those earning the CISM certification have the required experience and knowledge to provide effective security management and consulting services. In the survey, 22% of respondents said they want to pursue CISM certification in the next year.

3. GIAC - The Global Information Assurance Certification

The Global Information Assurance Certification validate the real-world skills of IT security professionals. GIAC currently offers certifications for over 20 job-specific responsibilities that reflect the current practice of information security including digital forensics, intrusion and incident handling, security administration, management, operations, legal, audit and software security. The demand for GIAC certifications is increasing as organizations today is driving the need for hands-on technical personnel. According to the survey, 19% of respondents said they want to pursue GIAC certification in the next year.

4. CISA - Certified Information Systems Auditor

Certified Information Systems Auditor designation demonstrates proficiency in information security audit, control and security skills. CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction.

5. CSFA - CyberSecurity Forensic Analyst

CyberSecurity Forensic Analyst is an emerging certification and skill within information security getting popular with increased cyber crimes and fraud taking place within organizations. Possessing the CSFA certification is proof that the analyst can conduct a thorough and sound forensic examination of a computer system and other digital/electronic devices, properly interpret the evidence, and communicate the examination results effectively and understandably. The CSFA designation is held exclusively by the most qualified digital forensic professionals and is a testament that the holder has the skills necessary to perform a comprehensive analysis within a limited time frame.

6. CEH - Certified Ethical Hacker

Certified Ethical Hacker is another certification gaining popularity as hacking and fraud activities are on the upswing. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The CEH certification fortifies the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

7. CBCP - Certified Business Continuity Professional

Certified Business Continuity Professional is another specialization gaining prominence within information security, with the outbreak of H1N1 pandemic and with organizations increasingly focusing their efforts in effective crises management and business continuity planning efforts. The CBCP certification offers competency on business continuity and disaster recovery planning responsibilities and accomplishments.

8. CPP - Certified Protection Professional

Certified Protection Professional is a designation for individuals who have demonstrated competency in all areas constituting security management. As the emphasis on protecting people, property, and information increases, it has strengthened the demand for professional managers, to meet these needs. The ASIS International administers the Certified Protection Professional program.

9. CCE - Certified Computer Examiner

Certified Computer Examiner is a certification provided by the International Society of Computer Forensic Examiners (ISFCE). This certification focuses to increase the level of professionalism and further the field and science of computer forensics. The foundation of this certification maintains a fair, uncompromised process for certifying the competency of forensic computer examiners and sets high forensic and ethical standards for forensic computer examiners.

10. Vendor Certifications

CISCO and Microsoft specific certifications top the list as the demand for technical and hands-on professionals increase within organizations including security architects, security and network engineers and administrators.

About the Author

Upasana Gupta

Upasana Gupta

Contributing Editor, CareersInfoSecurity

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.