Bita Beigishah
EC-Council, a global leader in InfoSec certification programs, recently launched their Cyber Security Programs Guide. This guide groups various EC-Council certifications into six tracks designed to provide cyber professionals with a compounding skill set that allows them to grow from beginner to advanced stages in their particular cyber security job area.
The EC-Council Cyber Security Tracks Include:
- Foundation
- Vulnerability Assessment and Penetration Testing
- Cyber Forensics
- Network Defense and Operations
- Software Security
- Governance
Foundation Track
The Foundation track is designed for general computer users who need a basic understanding of security in order to stay safe online while leveraging the Internet for work or play.
Foundation Certification Track
Beginner:
- CSCU – Certified Secure Computer User
Intermediate:
- FNS – Network Security Fundamentals
- FIS – Information Security Fundamentals
- CFF – Computer Forensics Fundamentals
Expert:
- ECSS – EC-Council Certified Security Specialist
What You Will Learn
This track certifies individuals in a basic understanding of:
- Cloud Security
- Password Security
- Social Engineering Countermeasures
- Mitigating Identity Theft
- Email Security
- Safe Browsing
- Data Protection
- Physical Security
- Mobile Device Security
- Data Backup
- Social Network Security
- Antivirus Protection
- Disaster Recovery
- Internet Security
- Credit Card Security
- Monitoring Kids Online
- Wireless & Home Network Security
- OS Security
Vulnerability Assessment and Penetration Testing (VAPT) Track
The Vulnerability Assessment & Penetration Testing (VAPT) track is designed primarily for Information Security professionals. These InfoSec workers hold job roles such as:
- Information Assurance Security Officer
- InfoSec Analyst/Administrator
- InfoSec Manager/Specialist
- Information Systems Security Engineer/Manager
- Security Analyst
- InfoSec Officer
- InfoSec Auditor
- Risk or Vulnerability Analyst
Vulnerability Assessment and Penetration Testing Certification Track
In addition to following the certification path below, InfoSec professionals interested in holistically developing their knowledge should consider coupling the certifications with higher education degrees. EC-Council suggests a BS in Cyber Security, Graduate Certificate in ITA, SP and a MS in Cyber Security as being complementary to the certification track.
Beginner:
Intermediate:
- LPT – Licensed Penetration Tester
- ECSA – EC-Council Certified Security Analyst
Expert:
- CAST 611 – Advanced Penetration Testing
- CAST 613 – Hacking & Hardening Your Corporate WebApplication
- CAST 616 – Securing Windows Infrastructure
What You Will Learn – According to NICE
According to the Cybersecurity Workforce Framework designed by NICE, this track will map to several of the KSAs tied to the Protect and Defend, Securely Provision and Analyze categories. The KSAs include:
- Cybersecurity Defense Analysis
- Cybersecurity Defense Infrastructure Support
- Incident Response
- Vulnerability Assessment and Management
- Test and Evaluation
- Threat Analysis
- Exploitation Analysis
Cyber Forensics Track
The cyber forensic track is ideal for Computer Forensic Analysts, Computer Network Defense, Forensic Analyst and Digital Forensic Examiners. This track can also be paired with a BS and MS in Cyber Security as well as Graduate Certificates in DF, EIA.
Cyber Forensics Certification Track
Beginner:
Intermediate:
- CHFI _ Computer Hacking Forensic Investigator
- ECIH – EC-Council Certified Incident Handler
Expert:
- CAST 612 – Advanced Mobile Forensics and Security
What You Will Learn – According to NICE
This track also maps to the NICE Cyber Workforce KSAs under the Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend and Analyze categories. The specific KSAs include:
- Risk Management
- Test and Evaluation
- Network Services
- System Administration
- Systems Analysis
- Cybersecurity Management
- Cybersecurity Defense Analysis
- Cybersecurity Defense Infrastructure Support
- Incident Response
- Vulnerability Assessment and Management
- Threat Analysis
- Exploitation Analysis
Network Defense and Operations Track
The Network Defense and Operations Track is best suited for IT professionals involved in network administration and needed to incorporate an understanding of security and disaster recovery into their daily operations. These professionals typically hold job titles such as:
- Network Security Administrators
- Network Security Engineer or Specialist
- Network Defense Technicians
- Security Analyst
- Security Operator
- Computer Network Dense Analyst
- Cybersecurity Intelligence Analyst
- Enterprise Network Defense Analyst
Network Defense and Operations Certification Track
This certification track can be coupled with academic achievements such as earning a BS and MS in Cyber Security as well as Graduate Certificate in DR, EIA and ITA.
Beginner:
Intermediate:
- ECIH – EC-Council Certified Incident Handler
- EDRP – EC-Council Disaster Recovery Professional
Expert:
- CAST 616 – Security Windows Infrastructure
- CAST 614 – Advanced Network Defense
What You Will Learn – According to NICE
The Network Defense and Operations track maps to several of the NICE Cyber Workforce job categories, including Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend and Analyze. The specific KSAs these combined certifications address, include:
- Risk Management
- Test and Evaluation
- Network Services
- Systems Administration
- Systems Analysis
- Cybersecurity Management
- Cybersecurity Defense Analysis
- Cybersecurity Defense Infrastructure Support Incident Response
- Vulnerability Assessment and Management
- Threat Analysis
Software Security Track
Professionals involved in the software development process either as an Application, Software or Security Engineer/Developer are most ideal to follow this certification track.
Software Security Certification Track
The Software Security track can be complemented with a Graduate Certificate in ISP, DR, ITA, EIA as well as a Bachelor’s and Master’s Degrees in Cyber Security.
Beginner:
- CSCU – Certified Secure Computer User
Intermediate:
- ECSP Java – EC-Council Certified Secure Programmer JAVA
- ECSP .NET – EC-Council Certified Secure Programmer .NET
Expert:
- CAST 611 – Advanced Penetration Testing
- CAST 616 – Securing Windows Infrastructure
What You Will Learn – According to NICE
Professionals who complete the Software Security Track have demonstrated capabilities in the NICE specialty areas of Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend and Analyze and the concepts learned match the following KSAs:
- Software Development
- Technology R&D
- Data Administration
- Systems Analysis
- Cybersecurity Management
- Cybersecurity Defense Analysis
- Vulnerability Assessment and Management
- Analyzes collected information to identify vulnerabilities and potential for exploitation
Governance Track
This track is designed for senior level manages and it focuses on a single certification, the EC-Council Chief Information Security Officer (CCISO). Security professionals in job roles such as Chief Information Security Officer (CISO), Chief Security Officer (CSO), Information Security Director, or Information Assurance Program Manager will greatly benefit from the strategic concepts accredited by the CCISO certification. This program covers the following domains:
- Governance
- Information Security Core Competencies
- Security Program Management and Operations
- Information Security Core Concepts
- Strategic Planning, Finance, and Vendor Management
These hands-on skills pair well with the theoretical concepts covered in an MS in Cyber Security degree program as well as in preparation for a Graduate Certificate in Information Security Professional, Information Analyst, IT Analyst, Disaster Recovery or Digital Forensics.
How CCISO Maps to NICE
Like all the other EC-Council Cyber Security Programs, the Governance track also maps to the NICE Cyber Workforce Framework’s Securely Provision, Oversee and Govern and Collect and Operate specialty areas. Additionally, CCISO help professionals attain KSAs in:
- Risk Management
- Technology R&D
- Systems Requirements Planning
- Legal Advice and Advocacy
- Training, Education and Awareness
- Cybersecurity Management
- Strategic Planning and Policy
- Executive Cybersecurity Leadership
- Acquisition and Program/Project Management
- Cyber Operational Planning
subscribe by email
Stay Ahead
Related Posts
-
Cyber Security
Cybersecurity Mindful Moments by Tara Lemieux
February 7, 2023
-
Training and Certification
CompTIA and Continuing Education (CE’s)
January 24, 2022
-
Cyber Security
Boost your Cyber Security Awareness
December 13, 2021