Security analyst course takes holistic approach

Security training specialist SSRI is introducing a course leading to certified security analyst status, the next step up from its certified ethical hacker qualification.

Security training specialist SSRI is introducing a course leading to certified security analyst status, the next step up from its certified ethical hacker qualification.

The new qualification, developed by the International Council of Electronic Commerce Consultants,  is aimed at security professionals and IT professionals in other fields – such as network managers or web developers – who already have a certified ethical hacker qualification or experience of hacking tools and the hacking environment.

The five-day classroom-based course covers risk analysis for existing IT systems, putting security measures in place when new environments are designed, and taking a holistic approach to the security needs of a business.

Rajive Kapoor, head of business development at SSRI, said, “There are many supplier-specific security qualifications, but nothing that creates an international standard, talking about all the products.”

The course aims to fill this gap, training professionals to look at security regardless of the environment, the infrastructure, the operating system or the tools used.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close