Technical Certifications & DoD 8570 Requirements

Technical Certifications & DoD 8570 Requirements

Organizations are reaching out for trained and skilled information security professionals to help fill key positions.  People with the right skill sets are becoming increasingly scarce and companies need individuals who can protect their programs and data from unintended or unauthorized access, change, or destruction.   With the growing number of different technology platforms, there is a huge increase in the number of vulnerabilities to be exploited.  Cybercriminals only need one way in, but trained professionals must be knowledgeable in all areas of information and cybersecurity.  The skills gap is ever widening and businesses need professionals who can make recommendations based on business strategic initiatives as well as implement security measures that are cost effective and sustainable for long term management.  Information Security Professionals who can act in both realms are rare.  Many sectors including the government, utilities, and education need those individuals who are motivated and willing to step up to help defend our nation.  Methodist University's program assists in the Cybersecurity initiative by aligning courses and learning outcomes with industry standard objectives.  In doing so, students can be sure that they are learning skills that can assist them in obtaining industry standard certifications.  This helps to prove competency to prospective employers.

In addition to proving competency to prospective employers, Methodist University’s Digital Forensics and Cybersecurity program helps students to be able to meet the Department of Defense’s 8570.01m requirements.  DoD directive (DoD 8570.01m) requires military personnel and contractors who support DoD systems to participate in training and certification programs that provide an understanding of fundamental information assurance principles that relate to the functions of their assigned positions.  In order to for military personnel and contractors to meet these requirements, individuals require a combination of on the job training, formal education, and continuing education as well as certifications.  Certifications that are approved by the DoD to provide fundamental knowledge baselines for each area of responsibility are located on the Defense Information Systems Agency Information Assurance Support Environment website.  Methodist University Digital Forensics and Cybersecurity courses correlate to approved objectives on required certification exams to meet the DoD 8570.01m baseline functional requirements.

The following is a list of industry standard certifications that students can prepare for while taking courses in the Digital Forensics and Cybersecurity minor; in addition, the following certifications meet DoD Information Assurance (IA) requirements.

A+™
The CompTIA A+ certification is the starting point for a career in IT.  These exams cover maintenance of PCs, mobile devices, laptops, operating systems and printers.

In order to receive the CompTIA A+ certification, both of the below exams must be passed (but do NOT have to be taken simultaneously).

CompTIA A+™ 220-801 covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking. Click to view the CompTIA A+™ objectives for test 220-801.

CompTIA A+™ 220-802 covers the skills required to install and configure PC operating systems, as well as configuring common features (e.g. network connectivity and email) for mobile operating systems Android and Apple iOS. Click to view the CompTIA A+™ objectives for test 220-802.

Network+™
The exam covers network technologies, installation and configuration, media and topologies, management, and security. Candidate job roles include network administrator, network technician, network installer, help desk technician and IT cable installer.  Click to view the CompTIA Network+™ certification Exam Objectives.

Security+™
The Security+ exam covers the most important foundational principles for securing a network and managing risk.  Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities.  Security concerns associated with cloud computing, BYOD and SCADA are addressed.  Click to view the CompTIA Security+™ certification Exam Objectives.

Note:  CompTIA has updated their Security+™ exam from SY0-301 to SY0-401.  View the differences of the two exams.

ISC2  CISSP®
CISSP® certification (Certified Information Systems Security Professional) is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments.   Click to view the ISC2  CISSP®  certification Exam Objectives.
                                                                                                                     
ISC2  CCFP®
The CCFP (Certified Cyber Forensics Professional) credential indicates expertise in forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete and reliable digital evidence admissible to a court of law. It also indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response. In other words, the CCFP is an objective measure of excellence valued by courts and employers alike.  Click to view the ISC2 CCFP®  certification Exam Objectives.

EC-Council C|EH™
The Certified Ethical Hacker certification is a comprehensive Ethical Hacking and Information Systems Security Auditing exam focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures.  Upon passing this certification students will receive this designation.  Click to view the EC-Council C|EH™ certification Exam Objectives.

To locate a testing center for the test that you would like to take, use one of the links listed below:

*Note: Methodist University is not affiliated with any of the certification providers listed above.  Industry standard certifications are encouraged but not a requirement of the Digital Forensics and Cybersecurity minor; be aware that certification providers sponsoring these exams may have additional requirements above passing the industry certification exam in order for the student to be able to obtain certification.

VIEW MORE

Foreign Film Series: "The Last Kiss"

Carlo's life is thrown into a tailspin when his longtime girlfriend Giulia announces she's pregnant. As Carlo faces up to his anxieties about adulthood...

Friends of Music presents Duo Cintemani

Presented by Friends of Music

Comprised of flautist Rachel Taratoot Ciraldo and guitarist Nicholas Ciraldo, Duo Cintemani is a fun pair of...

Homecoming & Parents Weekend

Join the Methodist University family as we celebrate Homecoming and Parents Weekend 2017. For tickets and more information, see our...