Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

CISSP experience requirement.  The 10 realms

Posted on 2004-09-15
1
Medium Priority
?
373 Views
Last Modified: 2008-02-01
What experiences can one prove that they have before attempting the CISSP exam.  Does working as a Junior network or network administrator qualify ?  
0
Comment
Question by:mutec1
1 Comment
 
LVL 7

Accepted Solution

by:
shahrial earned 250 total points
ID: 12082093
Mutec1,

Professional experience includes:

- Work requiring special education or intellectual attainment, usually including a liberal education or college degree.
- Work requiring habitual memory of a body of knowledge shared with others doing similar work.
- Management of projects and/or other employees.
- Supervision of the work of others while working with a minimum of supervision of one's self.
- Work requiring the exercise of judgement, management decision-making, and discretion.
- Work requiring the exercise of ethical judgement (as opposed to ethical behavior).
- Creative writing and oral communication
- Teaching, instructing, training and the mentoring of others
- Research and development
- The specification and selection of controls and mechanisms (i.e. identification and authentication technology). (It does not include the mere operation of these controls.)
- Applicable titles such as officer, director, manager, leader, supervisor, analyst, designer, cryptologist, cryptographer,   cryptanalyst, architect, engineer, instructor, professor, investigator, consultant, salesman, representative, etc. Title may include programmer. It may include administrator except where it applies to one who simply operates controls under the authority and supervision of others. Titles with the words "coder" or "operator" are likely excluded.
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question