CISSP Certification
- Posted by Prashant Arra
- Categories Social Awareness
- Date July 22, 2022
The CISSP (Certified Information Systems Security Professional) certification is a globally recognized credential in the field of information security. It is offered by (ISC)², which stands for the International Information System Security Certification Consortium.
The CISSP certification is designed for experienced professionals who are involved in designing, implementing, and managing an organization’s information security program. It covers various domains within the field of information security, including security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
To obtain the CISSP certification, candidates must meet specific requirements set by (ISC)². These requirements include having a minimum of five years of cumulative, paid, full-time work experience in two or more of the eight CISSP domains, or four years of experience if the candidate has a relevant college degree or an approved credential. Candidates must also pass the CISSP certification exam, which consists of multiple-choice questions covering all the domains.
Once certified, CISSP professionals are expected to adhere to the (ISC)² Code of Ethics and actively pursue continuing professional education to maintain their certification. The CISSP certification is widely recognized in the industry and can enhance career opportunities and professional credibility in the field of information security.
It’s important to note that certification requirements and details may change over time, so it’s always a good idea to refer to the official (ISC)² website for the most up-to-date information on the CISSP certification.
Results-oriented IT leader with over 25 years of experience. Proven track record in leading initiatives such as application rationalization, infrastructure migration, cost & workflow optimization, delivery excellence, and P&L optimization. Adept in infosec - identity & access management, security operations center, service delivery management, and ISO &compliance frameworks (ISO 27001, NIST 800-53, NIST CSF, HIPAA, PCI, and GDPR). Well-versed with cloud platforms (Azure, AWS, SAP BTP), program management, Agile and DevSecOps methodologies, middleware technologies (Boomi & Apigee), front-end development (Angular & React), database management (Oracle & SQL Server). Skilled in proposal writing, project budgeting, project transition, TOGAF, and COBIT framework. Well-experienced in performance assessment, skill/career development, mentoring, & coaching. Recognized for achievements in diverse roles, including program management, delivery leadership, and entrepreneurial endeavors.
Previous post
Unveiling the World of Ethical Hacking: Promoting Cybersecurity through Responsible Exploitation
You may also like
![courses-15 courses-15](https://unicalacademy.com/wp-content/uploads/2022/04/courses-15-300x200.jpg)
The Growing Threat of Social Media Fraud
![WhatApp Scam Awareness WhatApp Scam Awareness](https://unicalacademy.com/wp-content/uploads/2022/05/chiang-mai-thailand-lan-10-2022-man-holding-iphone-open-appstore-searching-social-internet-service-whatsapp-screen-iphone-was-created-developed-by-apple-inc-300x200.jpg)