email icon Email this citation

CIAO DATE: 05/04

ISQ Handbook 2003

Anna Hess Sargsyan and Edgar Danielyan

International Relations and Security Network

December 2003

 

The Information Security Qualifications Handbook offers in-depth coverage of existing information security qualifications. It is intended as a reference guide for information security professionals and their organizations. The qualifications have been grouped into two broad categories. The first lists vendor neutral qualifications that focus on universal information security principles, skills, and knowledge. These do not depend on a particular system, solution, or IT environment. The second part of the book is devoted to specific vendor's products and solutions and focuses less on general information security concepts and knowledge.

 

Table of Contents

Contents (PDF, 2 pages, 38.7 KB)

Preface (PDF, 2 pages, 41.7 KB)

Introduction (PDF, 6 pages, 80.8 KB)

Part I: Vendor Neutral Qualifications

International Information Systems Security Certification Consortium (ISC)2 (PDF, 8 pages, 81.3 KB)

Global Information Assurance Certification (GIAC) (PDF, 14 pages, 99.0 KB)

Computing Technology Industry Association (CompTIA) (PDF, 2 pages, 43.0 KB)

TruSecure Corporation (PDF, 2 pages, 40.9 KB)

Security Certified Program (SCP) (PDF, 2 pages, 40.6 KB)

Security Certified Network Architect (SCNA) (PDF, 1 page, 36.5 KB)

International Council of E-Commerce Consultants (EC-Council) (PDF, 2 pages, 38.7 KB)

CIW (PDF, 3 pages, 55.5 KB)

Information Systems Audit and Control Association (ISACA) (PDF, 3 pages, 45.6 KB)

British Standards Institute (PDF, 3 pages, 44.8 KB)

British Computer Society (PDF, 2 pages, 38.8 KB)

ASIS International (PDF, 4 pages, 54.5 KB)

DRI International (PDF, 4 pages, 50.1 KB)

Association of Certified Fraud Examiners (PDF, 2 pages, 38.8 KB)

CERT Coordination Center (PDF, 2 pages, 38.0 KB)

High Tech Crime Network (PDF, 5 pages, 45.9.3 KB)

International Information Systems Forensics Association (PDF, 2 pages, 36.3 KB)

International Association of Computer Crime Investigative Specialists (PDF, 2 pages, 36.0 KB)

Part II: Vendor Qualifications

Cisco Systems (PDF, 7 pages, 58.7 KB)

Check Point Software Technologies (PDF, 7 pages, 55.5 KB)

Internet Security Systems (PDF, 4 pages, 46.4 KB)

Sun Microsystems (PDF, 2 pages, 37.2 KB)

Microsoft Corporation (PDF, 3 pages, 41.2 KB)

Bindview Corporation (PDF, 2 pages, 36.7 KB)

Enterasys Networks (PDF, 2 pages, 36.1 KB)

IBM/Tivoli (PDF, 6 pages, 57.9 KB)

Netscreen Technologies (PDF, 4 pages, 47.1 KB)

RSA Security (PDF, 4 pages, 50.0 KB)

Sniffer Certification Program (PDF, 4 pages, 46.5 KB)

Symantec (PDF, 5 pages, 49.4 KB)

About the Editor (PDF, 1 pages, 19.8 KB)

Detailed Table of Contents (PDF, 5 pages, 52.3 KB)