skip to main content
10.1145/2047456.2047463acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

The value of the CISSP certification for educators and professionals

Published:30 September 2011Publication History

ABSTRACT

The Certified Information Systems Security Professional (CISSP) is the preeminent information security certification. The sponsoring organization (ISC)2® describes the CISSP as "the credential for professionals who develop policies and procedures in information security." This paper examines the CISSP certifications. It discusses the value to educators and to professionals of preparing for, taking, and obtaining the CISSP certification.

References

  1. Harris, Shon, CISSP All-in-One Exam Guide, Fifth Edition, McGraw-Hill Osborne Media, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Charles E. Frank and Laurie Werner. 2010. The benefit of the CSSLP certification for educators and professionals. J. Comput. Small Coll. 26, 1 (October 2010), 49--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. (ISC)2® website, https://www.isc2.org/ accessed May 19, 2011.Google ScholarGoogle Scholar
  4. Amazon.com Shon Harris, CISSP All-in-One Exam Guide web page, http://www.amazon.com/CISSP-All---One-Guide-Fifth/dp/0071602178/ref=sr_1_1_?ie=UTF8&qid=1305895405&sr=8-1.Google ScholarGoogle Scholar
  5. The Open Web Application Security Project (OWASP) website, https://www.owasp.org/index.php/Main_PageGoogle ScholarGoogle Scholar
  6. Information Systems Security Association (ISSA) website, https://www.issa.org/.Google ScholarGoogle Scholar
  7. InfraGard website, http://www.infragard.net/.Google ScholarGoogle Scholar
  8. Silver Bullet Podcasts, http://www.cigital.com/silverbullet/Google ScholarGoogle Scholar
  9. OWASP Podcasts, https://www.owasp.org/index.php/OWASP_Podcast#tab=Latest_Shows.Google ScholarGoogle Scholar
  10. Microsoft Security Intelligence Report website, http://www.microsoft.com/security/sir/default.aspxGoogle ScholarGoogle Scholar
  11. Stanford University on demand webinars website, http://myvideos.stanford.edu/oce/seminars.aspx#Computer%20ScienceGoogle ScholarGoogle Scholar
  12. (ISC)2® e-Symposiums website, https://isc2.brighttalk.com/recorded-eventsGoogle ScholarGoogle Scholar
  13. IEEE Security and Privacy magazine website, http://www.computer.org/portal/web/security/homeGoogle ScholarGoogle Scholar
  14. The ISSA Journal website, https://www.issa.org/Members/Journal/Google ScholarGoogle Scholar
  15. Tipton, Harold F., Official (ISC)2® Guide to the CISSP CBK, Second Edition. (ISC)2® Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. The 2011 (ISC)2® Global Information Security Workstudy, Frost & Sullivan.Google ScholarGoogle Scholar
  17. (ISC)2® 2010 Annual Report, https://www.isc2.org/uploadedFiles/%28ISC%292_PublicContent/About_ISC2/2010%20Annual%20Report5-WEB%20LINKED.pdfGoogle ScholarGoogle Scholar
  18. Top 5 IT Security Certifications for 2011 Employers, Recruiters Identify the Most Valued Infosec Certifications, http://www.healthcareinfosecurity.com/articles.php?art_id=3222&opg=1Google ScholarGoogle Scholar
  19. McGraw, Gary, "Certifiable", http://www.darkreading.com/security/application-security/208803630/index.html.Google ScholarGoogle Scholar
  20. Schultz, Beth, "CISSP! Who Cares?", SC Magazine, May 2011Google ScholarGoogle Scholar

Index Terms

  1. The value of the CISSP certification for educators and professionals

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
      September 2011
      111 pages
      ISBN:9781450308120
      DOI:10.1145/2047456

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate18of23submissions,78%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader