Print This Post Print This Post

What would an Information Security degree offer you?

Do you know where your sensitive information is or more importantly who is responsible safeguarding it? In all likelihood your personal, sensitive information is sitting in various computer databases throughout the country in all types of organizations.

Hopefully your information is being guarded over by diligent and educated information security professionals whose mission in life is to ensure that this information does not fall into the wrong hands.

As you may have ascertained, the work that these men and women perform is critical to our economy, our businesses and our government.

Have you ever considered a career in information security? According to the U.S. Bureau of Labor Statistics (BLS), those who work in information security will see rapid job growth and greater demand for skilled technicians at a 10 year projected growth rate of 16%. This of course will generate a greater demand for information security experts which will lead to increases in the expected earnings of those working within the field.

According to Payscale.com, the current median salary for a computer security specialist is $70,943.00 annually. Unlike many information technology jobs, outsourcing data integrity or information security work will likely remain ill advised due to the various laws, policies and limitations placed on those organizations whose business it is to have access to such sensitive information. As a result, job security is expected to remain strong.

Education and training will of course remain vital to this industry. Those who have attained the proper credentials will not only be in the highest demand but also are expected to see the highest paying jobs.

For those considering earning a degree in information security, the opportunities in online education have never been better.

If you are considering a degree in information security, try to begin with the end in mind. What level of degree do you wish to attain? An associate’s, bachelor’s or even a master’s degree?

An associate’s degree will likely impart a good amount of technical knowledge and allow for an entry level position to the graduate. Fortunately an associate’s degree can be acquired while working towards a bachelor’s degree.

A bachelor’s degree is generally considered the standard foundation from which a professional career is built and will of course open many more doors than what would be expected from a two year degree.

Finally a graduate degree would best serve those who already have a healthy amount of industry experience, for those seeking management positions or even for those who already have an unrelated undergraduate degree and that are looking at making a career change.

In addition to earning a degree, a student may also earn various vendor neutral certifications in information security such as the Certified Information Systems Security Professional (CISSP) or the Systems Security Certified Practitioner (SSCP) offered by (ISC) which is largely regarded as a standard in the industry. The Security certification offered by CompTIA would also be a good credential to attain.

There are of course specific certifications which are designed to capitalize on technologies provided for by vendors, such as Symantec or Cisco Systems. Some degree programs may even require or at least provide training specific for these certifications which will look great on a resume next to a degree. So consider this in evaluating potential schools.

Information security is an up and coming profession holding a bright future for those working within the information technology industry. Due to the specialized skills and training required combined with the increased demand for these skilled professionals job opportunities are expected steadily grow.

For those potential students who would like to work with technology and computers, information security is one specialization that should be strongly considered due to the culmination of industry growth, job security and compensation.

Article Source: http://www.articlealley.com/article_614940_22.html

15 comments to What would an Information Security degree offer you?

  • In terms of security programs, specifically for businesses, I need to agree with you entirely. You’ll find so quite a few choices on the market, it truly is vital for any professional to be aware what is bestfor their scenario and as well as particular complex. The observations you’re giving are a good aid to businesses and also security experts similarly. Thanks again!

  • Ceren

    I have used uCertify’s GSLC tranning material and passed the exam. It is very helpful and I recommend all of you, who are preparing for GSLC certification exam can take help of GSLC practice test.

    http://www.ucertify.com/exams/GIAC/GSLC.html

  • [...] Security Certification for me? In one of our previous article we already discussed what an Information Security degree would bring you; now, let’s tackle this tricky question:  “What security certification [...]

  • [...] Start Your Information Security Career Sometime ago I posted a question on LinkedIn and an article here about the benefits of being graduated in Infosec. The topic generated almost a hundred replies, and [...]

  • [...] have always been a certification person. While I don’t have a long string of certificates behind my name, the three that I have [...]

  • Ronny

    Thanks Adriano for this wonderful article. I am curious to know the path for a student who has graduated with MS degree in CS and have less than one year of experience. What I understand from most of the posts that it is suggested to gain some experience and then go for masters, but I have already completed my MS and am eager to know my options and certification I should look forward to gain some knowledge in this field. As of now I am looking to get a CEH certification and I do not see its name mentioned anywhere.

  • [...] said, my personal recommendation is: Go for CISSP or any other certification/graduation in your area deemed hard. Don’t make the matter bigger than it actually [...]

  • It’s nice that you took your time to write this post; it’s inspiring to hear another’s opinion. I respect your work on this page, and I’ll revisit for more reading.

  • Chris

    I assume you can’t just have 3 of these certifications and a Masters in IA and be alright to be CISSP albeit you pass the exam. I wonder how respected the Associate of Isc2 is for when you pass the CISSP but don’t have all the experience required to satisfy the full requirement. Wonder which of these other certs listed above are high regarded and don’t have exp requirement. I know most probably don’t require experience but a lot of these tests are expensive, especially the GIAC ones and would want to be sure before taking them. I am looking to work on base someday again, so the ones most respected by government and private would be nice to know.

  • Approved Credentials for Experience Waiver:

    * CERT Certified Computer Security Incident Handler (CSIH)
    * Certified Business Continuity Planner (CBCP)
    * Certified Computer Crime Investigator (Advanced) (CCCI)
    * Certified Computer Crime Prosecutor
    * Certified Computer Examiner (CCE)
    * Certified Fraud Examiner (CFE)
    * Certified Information Systems Auditor (CISA)
    * Certified Information Security Manager (CISM)
    * Certified Internal Auditor (CIA)
    * Certified Protection Professional (CPP)
    * Certified Wireless Security Professional (CWSP)
    * CIW – Associates
    * CIW – Security Essentials
    * CIW – Security Analyst
    * CIW – Database Design Specialist
    * CompTIA Security+
    * Computer Forensic Computer Examiner (CFCE)
    * CyberSecurity Forensic Analyst (CSFA)
    * GIAC Security Essentials Certification (GSEC)
    * GIAC Certified Firewall Analyst (GCFW)
    * GIAC Certified Intrusion Analyst (GCIA)
    * GIAC Certified Incident Handler (GCIH)
    * GIAC Certified Windows Security Administrator (GCWN)
    * GIAC Certified UNIX Security Administrator (GCUX)
    * GIAC Certified Forensic Analyst (GCFA)
    * GIAC Information Security Officer (GISO)
    * GIAC IT Security Audit Essentials (GSAE)
    * GIAC Security Expert (GSE)
    * GIAC Certified ISO-17799 Specialist (G7799)
    * GIAC Security Leadership Certification (GSLC)
    * GIAC Systems and Network Auditor (GSNA)
    * GIAC Certified Security Consultant (GCSC)
    * Information Security Management Systems Lead Auditor (IRCA)
    * Information Security Management Systems Principal Auditor (IRCA)
    * Microsoft Certified Systems Administrator (MCSA)
    * Microsoft Certified Systems Engineer (MCSE)
    * Master Business Continuity Planner (MBCP)
    * Red Hat Certified Engineer (RHCE)
    * Systems Security Certified Practitioner (SSCP)

  • Chris

    I saw that on their website but where does it clarify about the Security+ counting as time.

  • Dear Chris,
    The information below was extracted from the ISC2 website:
    “Requirements: Assert that he or she possesses a minimum of five years of professional experience in the information security field or four years plus a college degree. Or, an Advanced Degree in Information Security from a National Center of Excellence or the regional equivalent can substitute for one year towards the five-year requirement.”

    Let e know if you have any other questions in this topic, hopefully I can help.

    Adriano

  • Thanks for the great writeup. This helps me alot in my decision making.

  • Ambar

    HI,

    I am an Information Technology post-graduate and I am having 10 years of industry experience in datacommunication testing domain ( Cisco,Juniper etc wrt routing protocols, switching technologies) . So, I have very limited exposure in InfoSec domain .

    -With this background, if I do certification now ( CISSP etc.) , will that help me in my career in InfoSec ?
    -After doing the certification , will I be treated a newcomer in InfoSec domain ;or, a good amount of weightage will be given for my industry experience ?

Leave a Reply

  

  

  

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>