Critical vulnerability at Palo Alto Networks: Patches and CISA warnings The latest serious security vulnerability in Palo Alto Networks products has
CISSP stands for “Certified Information Systems Security Professional”. In this article we will explain to you who is interested in the CISSP certification, what steps are necessary to obtain it and what is asked in the exam.
The CISSP certification is issued by the International Information Systems Security Certification Consortium, or ISC for short.2, offered since 1994. The certification is particularly widespread and recognized in the USA, but has become increasingly widespread and respected worldwide for years.
In Germany, too, this certification is viewed by employers and institutions as an important reference in the field of information security. This is not least because obtaining the certificate requires a great deal of knowledge, which must be proven in an examination followed by an assessment. We therefore recommend not only gaining theoretical knowledge before taking part in the certification, but also building up the relevant technical background in advance.
The certification process with its requirements consists of the following steps:
First, formal requirements regarding level of training and professional experience must be met. To fully obtain the certificate, five years of professional experience in various domains of the certification must be demonstrated. Studies and training are partially taken into account.
The necessary knowledge for the exam can be acquired in various ways; there are no formal requirements for this. However, there are a number of offers: These range from literature and documents for self-study to various online courses to face-to-face events that can be attended as a block or over longer periods of time. There is a wide selection of providers for every offer. This means there is a suitable path for every type of learner.
Registration for the exam takes place directly via (ISC)2. The test consists of 250 multiple-choice questions over a period of 6 hours, with the aim of achieving 700 out of 1.000 possible points.
Another mandatory requirement is the recommendation or assessment by a certified CISSP or one of (ISC)2 appointed person. This can be done up to 9 months after passing the exam. Without this recommendation, the CISSP cannot be obtained. Therefore, in your own interest, this should be done as early as possible.
This is how you can achieve CISSP certification in 5 steps:
The CISSP includes 8 so-called domains. These are queried for a given key in the exam.
The following 8 areas are tested in the CISSP exam:
The course is aimed at information security experts and those interested in information security who want to gain and demonstrate a comprehensive level of theoretical knowledge in this area.
The CISSP certification is particularly interesting for these professional groups:
Ultimately, the CISSP certification is relevant and helpful in any position in the information security environment. However, it should take place at the right time and appropriately complement existing practical experience.
We also recommend that you check whether the Systems Security Certified Practitioner (SSCP) certification is an option for you as a first step. To do this, you only need one year of professional experience and the scope of the exam is limited to around half the effort of the CISSP.
If you are interested in obtaining one of the certificates mentioned and would like to put the content into practice directly, please take a look at our Jobs page over. We offer you the ideal setting in this exciting environment with a variety of possible applications.
We will support you with time, money and personal support in obtaining your CISSP or SSCP certificate.
Critical vulnerability at Palo Alto Networks: Patches and CISA warnings The latest serious security vulnerability in Palo Alto Networks products has
Chinese hackers use T-Mobile and other US telecommunications systems for larger espionage campaign The giant US telecommunications company T-Mobile has confirmed that it is one of the
The challenge of permissions and non-human identities – Why managing credentials takes longer than you think With the
We use cookies, and Google reCAPTCHA, which loads Google Fonts and communicates with Google servers. By continuing to use our website, you agree to the use of cookies and our privacy policy.