Information Systems Security Architecture Professional
This redirect may meet Wikipedia's criteria for speedy deletion because in its current form it serves only to promote or publicise an entity, person, product, or idea, and would require a fundamental rewrite in order to become encyclopedic. However, the mere fact that a company, organization, or product is a page's subject does not, on its own, qualify that page for deletion under this criterion. This criterion also does not apply where substantial encyclopedic content would remain after removing the promotional material as deletion is not cleanup; in this case please remove the promotional material yourself, or add the {{advert}} tag to alert others to do so. See CSD G11.
If this redirect does not meet the criteria for speedy deletion, or you intend to fix it, please remove this notice, but do not remove this notice from pages that you have created yourself. If you created this page and you disagree with the given reason for deletion, you can click the button below and leave a message explaining why you believe it should not be deleted. You can also visit the talk page to check if you have received a response to your message. Note that this redirect may be deleted at any time if it unquestionably meets the speedy deletion criteria, or if an explanation posted to the talk page is found to be insufficient.
Note to administrators: this redirect has content on its talk page which should be checked before deletion. Administrators: check links, talk, history (last), and logs before deletion. Consider checking Google.This page was last edited by Duffbeerforme (contribs | logs) at 07:25, 9 July 2011 (UTC) (13 years ago) |
Information Systems Security Architecture Professional is an independent information security certification concentration of the CISSP governed by the International Information Systems Security Certification Consortium (commonly known as (ISC)2).
For experienced information security professionals with an International Information Systems Security Certification Consortium ((ISC)2) CISSP credential in good standing, the (ISC)2 ISSAP Concentration demonstrates acquired rigorous knowledge of select Common Body of Knowledge (CBK) domains in Security Architecture. As of August 1, 2010, (ISC)2 has reported certifying 867 ISSAPs in 41 countries.[1]
Certification subject matter
This concentration is an appropriate credential for Chief Security Architects and Analysts who may typically work as independent consultants or in similar capacities. The architect plays a key role within the information security department with responsibilities that functionally fit between the C-suite and upper managerial level and the implementation of the security program. He/she would generally develop, design, or analyze the overall security plan. Although this role may typically be tied closely to technology this is not necessarily the case, and is fundamentally the consultative and analytical process of information security.
ISSAP domains
The major domains of the CBK covered by ISSAP certification are:
- Access Control Systems and Methodology
- Cryptography
- Physical Security Considerations
- Security Architecture Analysis
- Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning
- Communications & Network Security
Requirements
According to the (ISC)2 Information Systems Security Architecture Professional (ISSAP) Candidate Information Bulletin, candidates for the ISSAP must meet the following requirements:
- Be a CISSP in good standing
- Demonstrate two years of professional experience in systems security architecture
- Pass the ISSAP exam with a scaled score of 700 or better. The exam is multiple choice, consisting of 125 questions with four options each, to be answered over a period of three hours.
- Maintain the ISSAP credential in addition to the underlying CISSP
- Adhering to the (ISC)2 Code of Ethics.[2]
Specialized concentrations
Passing a concentration examination demonstrates proven capabilities and subject-matter expertise beyond that required for the CISSP or SSCP credentials. Other current concentrations for CISSPs include the:
For all concentrations an official (ISC)2 training is available.[3] The CISSP-ISSAP CBK Review Seminar was developed by a Dutch company named CIBIT.
References
- ^ "ISSAP Member Counts". Retrieved 2010-12-08.
- ^ "(ISC)2 Code of Ethics". ISC2. Retrieved 2008-12-03.
- ^ https://www.isc2.org/concentrations.aspx