Wireless security myths 2010 |
- Wireless security myths 2010
- Biggest tech industry apologies of 2010 – so far
- Fix-It Utilities Professional 10
- What Is Your Facebook Data Worth?
- How To use Gmail to safely access email from abroad
- iPhone management tools step it up with iOS 4
- Six tips for finding quality CISSP training
- Network access control vendors pass endpoint security testing
- Firefox add-on encrypts Facebook and Twitter
- Testing reveals security software often misses new malware
- Google Chrome gets 'native' PDF support
- 40/100G Ethernet standard ratified
Posted: 21 Jun 2010 09:00 AM PDT Wireless has become a part of our official and personal lives. Securing against wireless threats has been and will continue to be an important piece in the overall enterprise security puzzle. However, as if following Darwin's theory of evolution, wireless security myths too are born, evolve and then die to be replaced by new ones. |
Biggest tech industry apologies of 2010 – so far Posted: 21 Jun 2010 09:00 AM PDT |
Fix-It Utilities Professional 10 Posted: 21 Jun 2010 09:00 AM PDT |
What Is Your Facebook Data Worth? Posted: 21 Jun 2010 09:00 AM PDT |
How To use Gmail to safely access email from abroad Posted: 21 Jun 2010 09:00 AM PDT |
iPhone management tools step it up with iOS 4 Posted: 21 Jun 2010 09:00 AM PDT |
Six tips for finding quality CISSP training Posted: 21 Jun 2010 02:15 AM PDT The Certified Information Systems Security Professional (CISSP) certification has become a widely recognized credential for broad information security expertise. But the challenging exam for CISSP certification requires such a wide range of security knowledge that many tech pros require some help to pass it, regardless of their experience level. As a CISSP trainer for Certified Tech Trainers, I've heard a lot of horror stories about money wasted on not-so-great instructor-led training. In fact, many of my students have already invested in training that simply didn't work for them. You should look for several common elements when choosing a school and its course. To save you time and money, I've come up with six tips to help you evaluate instructor-led CISSP training. Tip 1: Verify the credentials of the instructor If a Microsoft Certified Trainer is teaching Windows 2000 directory services, you don't really need the instructor to also be a firewall guru. However, if the instructor is teaching Microsoft Internet Security and Acceleration (ISA) server, it would be kind of nice if the instructor really knew firewall implementations and could explain how ISA functions in comparison to Cisco PIX, Check Point Firewall NG, and Linux IP Tables. The CISSP exam covers 10 security domains, and it's really 10 exams in one. Look for an instructor who is a credentialed expert in each of the security domains. Desirable instructor certifications include (ISC)2's CISSP, ISACA's CISA, CompTIA's Security+, SCP's SCNP, Check Point's CCSE and CCSI, Cisco's CCIE, CCNP, and CCSP, Microsoft's MCT, MCSE, and MCSD, Nokia's NSA, TruSecure's TICSA, and SANS's GIAC. It is also desirable for your instructor to have a business or computer sciences degree. Some courses have even been created by recognized authors. Although this is certainly nice, be careful that authoring is not the instructor's only claim to fame. Getting a book deal is not that hard. Having coauthored and edited four books myself, I can speak from experience. The CISSP is an expert-level certification. Make sure your instructor is an expert in each of the 10 security domains before you sign up for a CISSP class. You should also be careful of a school that boasts of a course created by an expert but then uses someone else to teach it. The strength of an instructor-led class comes primarily from the instructor in front of you, since it is the instructor's ability to transfer knowledge that can really deliver the value of the class. I can tell you that it's a lot harder to hire extremely talented and qualified instructors than it is to find or create good base content. Promoting a course created by an expert and delivered by someone else is often little more than bait-and-switch marketing. Tip 2: Beware of the cookie-cutter course Oddly enough, you should also make sure that the instructor's presentation actually corresponds to the course materials provided. We've had many frustrated students come to us after attending a presentation that didn't even match the materials provided. Tip 3: Evaluate the after-course study materials The school should not rely on your ability to remember what was important to remember for the exam. It will be hard enough just keeping up, let alone discerning what to review. Make sure the school is doing its job by taking as much of the work out of the learning process as possible. You want to have energy and concentration left for pure retention efforts without wasting them on preparatory details the school could have taken care of. Tip 4: Ensure that the course addresses test-taking strategies You'll need to develop the skill of ferreting out the true point of a question and then determining the best answer out of four good and arguable answers. Most instructor-led courses shy from this kind of instruction, but that doesn't mean that testing skill is bad or that you don't need it. Just ask any CISSP about the exam. Most will just grin and swear they will never take it again! Tip 5: Check out the opportunity to practice for the exam In preparing for my own exam, I parsed more than 2,800 commercially available practice questions from Boson, The CISSP Prep Guide, the All-in-One CISSP Certification , and the SRV publications to find and memorize more than 1,100 nonredundant questions. I can't say for sure, but I don't remember more than about 25 real questions that mapped very closely to practice questions. The math says you would need 10 times the memorization to get the content you need. Not much of a shortcut, is it? So why do I recommend seeking mentored practice exams? The key word is mentored. If an exam expert walks you through the logic of attacking tricky questions, you can apply those same techniques to any exam. And if the instructor has the string of certifications mentioned in tip number 1, you can be confident that he or she has plenty of experience in taking tricky exams. Tip 6: Don't buy training based on pass guarantees |
Network access control vendors pass endpoint security testing Posted: 21 Jun 2010 09:00 AM PDT One of the main promises of NAC is that you can ensure that endpoint security tools are up to date and that non-compliant machines can be identified or blocked. As regulatory compliance has grown in importance, NAC vendors have reacted by building strong feature sets aimed at endpoint security and compliance. In our NAC testing, we had good, and sometimes great, results across the board when it came to endpoint security. |
Firefox add-on encrypts Facebook and Twitter Posted: 20 Jun 2010 09:00 AM PDT |
Testing reveals security software often misses new malware Posted: 20 Jun 2010 09:00 AM PDT |
Google Chrome gets 'native' PDF support Posted: 20 Jun 2010 09:00 AM PDT |
40/100G Ethernet standard ratified Posted: 21 Jun 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment