Chapter 13 Flashcards

1
Q

Advantages of Self-Study Programs (5)

A
Self motivation
Low cost
Flexible materials
Flexible schedule
Supplemental materials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disadvantages of Self-Study Programs (5)

A
Procrastination 
Resource selection
Lack of interaction
Quality
Validated Outcome
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Guidelines for self study materials (4)

A
  1. Reputable sources
  2. Material reviews
  3. Multiple products
  4. Hands on skill set labs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Instructor-Led Programs

A

Alternative to self-study learning

Continuing education group can be part of the school or a closely related educational unit

Provide formal training courses that lead to a certificate or professional certification and not a degree

Courses can range from very general to highly specific and technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificate of completion:

A

A document that is given to a student upon completion of the program and signed by the instructor

Attests that the person has completed the course and made a sufficient score on an assessment

Specific to an educational institution

Many programs available online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Continuing Education Programs

A

Keep practitioners current and informed
Continuing professional education (CPE)
Continuing professional development (CPD)

Credit for courses measured in continuing professional education (CPE) units
Typically, 50 minutes of classroom instruction per CPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Postsecondary Degree Programs

A

Offered through colleges and universities

Programs available for information systems security, cybersecurity, and information assurance

Includes not-for-profit schools and for-profit schools

May be classroom-delivered, online-delivered, or blended-delivered for associate level up to PhD

Consider what career opportunities and employment you seek first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Associate’s Degree

A

Represents a two-year program (some institutions offer accelerated programs)

Basic education for people who want to enter the information security field without spending four or more years in school

Prepares you for a wide range of entry-level positions in IT and information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bachelor’s Degree

A

A four-year degree program (some institutions offer accelerated programs)

Often a requirement for any information security position other than entry-level positions

Includes:
Bachelor of science (BS or BSc)
Bachelor of science in information technology (BScIT)
Bachelor of applied science (BASc)
Bachelor of technology (B.Tech)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Master of Science Degree

A

Consists of two years of study beyond a bachelor’s degree

Is usually specific to a field of study

Focuses more on depth of knowledge than on breadth of knowledge

Includes:
Master of science (MS or MSc)
Master of science in information technology (MScIT)
Master of business administration (MBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Master of Business Administration (MBA)

A

Focuses on managing the process of securing information systems

Prepares students to manage and maintain the people and environment of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Doctoral Degree

A

Represents the most respected academic honor and is the most difficult to obtain

Requires rigorous coursework and extensive research

Takes from three to five years (but varies)

Includes: 
Doctor of science (DSc)
Doctor of information technology (DIT)
Doctor of technology (DTech)
Doctor of philosophy (PhD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information Security Training Programs

A

Differ from security education programs in their focus on hands-on skills and in their duration

Meet for intensive sessions lasting from a few hours to several days

Rapidly train students in one or more skills or to cover essential knowledge in one or more specific areas

Many specifically prepare students for certification exams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Training Requirements

A

NIST 800 Series publications contain procedures necessary to keep IT environments secure

U.S. OPM requires that federal agencies provide training suggested by the NIST guidelines

Requires agencies to train current employees and new employees within 60 days of hire date. Also when:

  • There is a significant change in the agency’s IT security environment
  • There is a significant change in the agency’s security procedures
  • An employee enters a new position that deals with sensitive information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security training organizations (6)

A
SANS institute
ITPG
InfoSec Institute
ISACA
Phoenix TS
SEI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SANS Institute

A

SANS is one of the largest and most trusted sources for information security training in the world. It offers classes on many security topics that cover development, implementation, management, and auditing roles. SANS classes range from a half day to six days, are available globally, and tend to be very hands-on and focused.

17
Q

IT Professional Group, Inc. (ITPG)

A

ITPG has been delivering and fulfilling professional certification programs for the International Information Systems Security Certification Consortium, known as (ISC)2 globally and throughout North America.

18
Q

InfoSec Institute:

A

InfoSec Institute is a large security training organization that holds regular classes across the United States. Its goal is to provide the best possible hands-on training for students in topics ranging from certification preparation to very specific technical security topics.

19
Q

ISACA:

A

ISACA is a nonprofit global organization that promotes “the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems.” It holds conferences and training events related to information systems auditing and management around the world.

20
Q

Phoenix TS Phoenix Technology Solutions (Phoenix TS):

A

provides cost-effective, hands-on computer training, IT certification, and management courses to government and commercial organizations in the Maryland, Virginia, and Washington, DC, area.

21
Q

Security Evolutions, Inc. (SEI):

A

SEI provides online, e-learning, self-study, and live virtual instructor delivery of various professional certification programs in IT security and information assurance. These include Security+, SSCP, CISSP, NSA 4011, and NSA 4013-Advanced.