Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Top 5 Hot Software Security Training's in 2017

February 03, 2017

You’ve probably noticed that cybersecurity is in high demand. And is it any wonder? Cybercrime is on the rise. Recently, the World Economic Forum estimated the cost of cybercrime to be $3 trillion worldwide.

By 2020 it’s estimated that:

  • 4 billion people will be online (double the current amount)
  • 50 billion devices will be connected to the internet
  • Online data traffic will increase 50 times
  • 75% of infrastructure will be under third-party control

All of that means one thing: Cybersecurity is a growth industry.

To ensure your team is ready for the challenge, here are some important software security training opportunities to capitalize on:

CompTIA Security+

This is a key security training for the government vertical. CompTIA's Security+ is a well-respected, vendor-neutral security certification, and credential holders are recognized as among the elite, possessing superior technical skills, broad knowledge and expertise in multiple security-related disciplines.

 This training will provide expertise in:

  • Threat management
  • Cryptography
  • Identity management
  • Security systems
  • Security risk identification and mitigation
  • Network access control
  • Security infrastructure

The CompTIA Security+ credential is also approved by the U.S. Department of Defense to meet Directive 8570.01-M requirements.

Order training: www.ingrammicrotraining.com

Note: While this is an entry-level certification, we recommend at least two years of experience working in the area of network security as a prerequisite. Also, consider obtaining the Network+ certification first.

Certified Ethical Hacker (CEH)—EC Council

The CEH credential certifies individuals in the specific network security discipline of ethical hacking from a vendor-neutral perspective.

The purpose of the CEH credential is to:

  • Establish and govern minimum standards for credentialing professional IT security specialists in ethical hacking measures
  • Inform the public that credentialed individuals meet or exceed the minimum standards
  • Reinforce ethical hacking as a unique and self-regulating profession

Prerequisites:

  • MCSE or CCNA equivalent knowledge or experience
  • EC-Council—Network Security Administrator knowledge or experience

Order training: www.ingrammicrotraining.com

Note: No certifications are required to attend the course or take the C|EH exam.

Certified Information Systems Security Professional (CISSP)

Offered by the International Information Systems Security Certification Consortium, known as (ISC)2, this vendor-neutral credential is recognized worldwide for its standards of excellence and continues to be highly sought after by IT professionals and by IT organizations.

Ingram Micro offers a prep course in this area.

Order prep course: www.ingrammicrotraining.com

GSEC: SANS GIAC Security Essentials

This high-demand certification is especially crucial for those in the government vertical. Security professionals who want to demonstrate qualifications for IT systems hands-on roles with respect to security tasks should obtain this. Must have a deep understanding of information security.

GSEC credential holders demonstrate knowledge and technical skills in areas such as:

  • Identifying and preventing common and wireless attacks
  • Access controls
  • Authentication
  • Password management
  • DNS
  • Cryptography fundamentals
  • ICMP
  • IPv6
  • Public key infrastructure
  • Linux
  • Network mapping
  • Network protocols

Learn more: https://www.giac.org/certification/security-essentials-gsec

Certified in Risk and Information Systems Control (CRISC)

CRISC is the only certification that prepares IT professionals for the unique challenges of IT and enterprise risk management and positions them to become strategic partners.

This certification is the most current and rigorous assessment available to evaluate the risk management proficiency of IT professionals within an enterprise or financial institution.

Achieving CRISC certification validates that you have the expertise to help companies understand business risk. It also confirms that you have the technical knowledge to implement appropriate information system controls.

Learn more: https://www.isaca.org/Certification/CRISC-Certified-in-Risk-and-Information-Systems-Control/Pages/default.aspx

Start Here

Want to learn more and take advantage of these great training opportunities?

Contact Ingram Micro Professional and Training Services

(800) 456-8000, ext. 76094, training@ingrammicro.com

Learn More

www.ingrammicro.com/ptsplaybook

Order Training

www.ingrammicrotraining.com