Solved

CISSP experience requirement.  The 10 realms

Posted on 2004-09-15
1
355 Views
Last Modified: 2008-02-01
What experiences can one prove that they have before attempting the CISSP exam.  Does working as a Junior network or network administrator qualify ?  
0
Comment
Question by:mutec1
1 Comment
 
LVL 7

Accepted Solution

by:
shahrial earned 125 total points
ID: 12082093
Mutec1,

Professional experience includes:

- Work requiring special education or intellectual attainment, usually including a liberal education or college degree.
- Work requiring habitual memory of a body of knowledge shared with others doing similar work.
- Management of projects and/or other employees.
- Supervision of the work of others while working with a minimum of supervision of one's self.
- Work requiring the exercise of judgement, management decision-making, and discretion.
- Work requiring the exercise of ethical judgement (as opposed to ethical behavior).
- Creative writing and oral communication
- Teaching, instructing, training and the mentoring of others
- Research and development
- The specification and selection of controls and mechanisms (i.e. identification and authentication technology). (It does not include the mere operation of these controls.)
- Applicable titles such as officer, director, manager, leader, supervisor, analyst, designer, cryptologist, cryptographer,   cryptanalyst, architect, engineer, instructor, professor, investigator, consultant, salesman, representative, etc. Title may include programmer. It may include administrator except where it applies to one who simply operates controls under the authority and supervision of others. Titles with the words "coder" or "operator" are likely excluded.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question