it security training library

Companies are beefing up their information technology teams to address an influx of mission-critical technology. More specially, many organizations and IT professionals are bolstering their knowledge via certificate programs. But while a number of third-party organizations offer these educational tracks, a select few garner great respect within the field.

IT-and-security-training

Foundational:
CompTIA A+ Certification

The CompTIA A+ Certification provides essential foundational knowledge for IT professionals. It covers basic enterprise hardware and software deployment, management techniques and cloud computing. Approximately 1 million IT professionals hold the highly coveted IT CompTIA A+ certification.

Professional:
Certified Ethical Hacker (CEH v9) – EC-Council and Cisco Certified Network Associate (CCNA)

Certified Ethical Hacker (CEH v9) – EC-Council
The Certified Ethical Hacker Certification demonstrates an IT professional has an understanding of how to look for weaknesses and vulnerabilities in target systems. He or she uses the same knowledge and tools as a malicious hacker, but in a lawful manner to assess the security of a target system(s) and plug holes in networks before black hat hackers find them. The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Cisco Certified Network Associate (CCNA)
As enterprises continue to use advanced technology, the need to properly configure, monitor, support, and secure their networks is essential. The Cisco Certified Network Associate (CCNA) understands the principles of Cisco CCNA Routing & Switching, Security, and Wireless certifications. Knowledge areas include: System & Network Management, Access Control Lists, Common Layer 2 Attacks, IP Services & Security, WLAN Security
and WLAN Maintenance.

Mastery:
Certified Information Systems Security Professional (CISSP)
The Certified Information Systems Security Professional credential covers eight central domains: asset security, communications and network security, identity and access management, security assessment and testing, security engineering, security operations, security and risk assessment and software development security. The CISSP exam, administered via an online portal, features 250 questions.

Sources:

https://www.isc2.org/cissp/default.aspx

https://certification.comptia.org/training/certmaster/security

https://cyber-defense.sans.org/certification/gsec

https://www.isc2.org/cissp/default.aspx

http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/

Preventing Data BreachesCASE STUDY: Maser Gets Proactive in Preventing Data Breaches

In this case study, find out how Maser Consulting P.A. realized the need to protect against a cyberattack or a data breach, where sensitive info about clients or the company is put at risk, lost or stolen.

“The fact that we have access to such a wide variety of IT and security learning content for both our IT professionals and our staff is a huge plus!” — Allison Colantuoni, PHR, SHRM-CP, Director of Human Resources/Principal Associate, Maser Consulting P.A.