Solved

CISSP experience requirement.  The 10 realms

Posted on 2004-09-15
1
351 Views
Last Modified: 2008-02-01
What experiences can one prove that they have before attempting the CISSP exam.  Does working as a Junior network or network administrator qualify ?  
0
Comment
Question by:mutec1
1 Comment
 
LVL 7

Accepted Solution

by:
shahrial earned 125 total points
ID: 12082093
Mutec1,

Professional experience includes:

- Work requiring special education or intellectual attainment, usually including a liberal education or college degree.
- Work requiring habitual memory of a body of knowledge shared with others doing similar work.
- Management of projects and/or other employees.
- Supervision of the work of others while working with a minimum of supervision of one's self.
- Work requiring the exercise of judgement, management decision-making, and discretion.
- Work requiring the exercise of ethical judgement (as opposed to ethical behavior).
- Creative writing and oral communication
- Teaching, instructing, training and the mentoring of others
- Research and development
- The specification and selection of controls and mechanisms (i.e. identification and authentication technology). (It does not include the mere operation of these controls.)
- Applicable titles such as officer, director, manager, leader, supervisor, analyst, designer, cryptologist, cryptographer,   cryptanalyst, architect, engineer, instructor, professor, investigator, consultant, salesman, representative, etc. Title may include programmer. It may include administrator except where it applies to one who simply operates controls under the authority and supervision of others. Titles with the words "coder" or "operator" are likely excluded.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now