Chapter 13 Flashcards
Advantages of Self-Study Programs (5)
Self motivation Low cost Flexible materials Flexible schedule Supplemental materials
Disadvantages of Self-Study Programs (5)
Procrastination Resource selection Lack of interaction Quality Validated Outcome
Guidelines for self study materials (4)
- Reputable sources
- Material reviews
- Multiple products
- Hands on skill set labs
Instructor-Led Programs
Alternative to self-study learning
Continuing education group can be part of the school or a closely related educational unit
Provide formal training courses that lead to a certificate or professional certification and not a degree
Courses can range from very general to highly specific and technical
Certificate of completion:
A document that is given to a student upon completion of the program and signed by the instructor
Attests that the person has completed the course and made a sufficient score on an assessment
Specific to an educational institution
Many programs available online
Continuing Education Programs
Keep practitioners current and informed
Continuing professional education (CPE)
Continuing professional development (CPD)
Credit for courses measured in continuing professional education (CPE) units
Typically, 50 minutes of classroom instruction per CPE
Postsecondary Degree Programs
Offered through colleges and universities
Programs available for information systems security, cybersecurity, and information assurance
Includes not-for-profit schools and for-profit schools
May be classroom-delivered, online-delivered, or blended-delivered for associate level up to PhD
Consider what career opportunities and employment you seek first
Associate’s Degree
Represents a two-year program (some institutions offer accelerated programs)
Basic education for people who want to enter the information security field without spending four or more years in school
Prepares you for a wide range of entry-level positions in IT and information security
Bachelor’s Degree
A four-year degree program (some institutions offer accelerated programs)
Often a requirement for any information security position other than entry-level positions
Includes: Bachelor of science (BS or BSc) Bachelor of science in information technology (BScIT) Bachelor of applied science (BASc) Bachelor of technology (B.Tech)
Master of Science Degree
Consists of two years of study beyond a bachelor’s degree
Is usually specific to a field of study
Focuses more on depth of knowledge than on breadth of knowledge
Includes:
Master of science (MS or MSc)
Master of science in information technology (MScIT)
Master of business administration (MBA)
Master of Business Administration (MBA)
Focuses on managing the process of securing information systems
Prepares students to manage and maintain the people and environment of information security
Doctoral Degree
Represents the most respected academic honor and is the most difficult to obtain
Requires rigorous coursework and extensive research
Takes from three to five years (but varies)
Includes: Doctor of science (DSc) Doctor of information technology (DIT) Doctor of technology (DTech) Doctor of philosophy (PhD)
Information Security Training Programs
Differ from security education programs in their focus on hands-on skills and in their duration
Meet for intensive sessions lasting from a few hours to several days
Rapidly train students in one or more skills or to cover essential knowledge in one or more specific areas
Many specifically prepare students for certification exams
Security Training Requirements
NIST 800 Series publications contain procedures necessary to keep IT environments secure
U.S. OPM requires that federal agencies provide training suggested by the NIST guidelines
Requires agencies to train current employees and new employees within 60 days of hire date. Also when:
- There is a significant change in the agency’s IT security environment
- There is a significant change in the agency’s security procedures
- An employee enters a new position that deals with sensitive information
Security training organizations (6)
SANS institute ITPG InfoSec Institute ISACA Phoenix TS SEI