0% found this document useful (0 votes)
234 views20 pages

Cybersecurity Career Guide 2020

This document provides an overview of the cybersecurity field. It defines cybersecurity as protecting networks, devices, and programs from cyberattacks. It notes that the demand for cybersecurity professionals is growing rapidly due to increasing cybercrime. The document outlines several common cybersecurity job roles and their average salaries. It also discusses why cybersecurity is important for organizations to invest in, as it builds customer trust and protects sensitive data. Finally, it suggests that the job outlook in cybersecurity is strong, with many opportunities for IT professionals to transition into the field.

Uploaded by

Pakeeza Awan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
234 views20 pages

Cybersecurity Career Guide 2020

This document provides an overview of the cybersecurity field. It defines cybersecurity as protecting networks, devices, and programs from cyberattacks. It notes that the demand for cybersecurity professionals is growing rapidly due to increasing cybercrime. The document outlines several common cybersecurity job roles and their average salaries. It also discusses why cybersecurity is important for organizations to invest in, as it builds customer trust and protects sensitive data. Finally, it suggests that the job outlook in cybersecurity is strong, with many opportunities for IT professionals to transition into the field.

Uploaded by

Pakeeza Awan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CYBERSECURITY

CAREER GUIDE 2020

EC-Council Cyber Research


This paper is from EC-Council’s site. Reposting is not permitted
without express written permission.
Index:
• What is cybersecurity?
• Why cybersecurity matters to organizations

• Working in cybersecurity
• Job outlook
• Job roles
• Average salaries
• The value of transitioning from the IT to the Cybersecurity
industry

• How to get started in cybersecurity


• Questions to consider before pursuing the field
• Is certification necessary?
• Key technologies and skills to learn
• Learning path

• Final Thoughts

Copyright © by EC-Council
02
All Rights Reserved. Reproduction is Strictly Prohibited.
What Is Cybersecurity?
The growth of cybercrime puts businesses and government agencies at the risk of constant threats to their crucial
business data, customer data, financial information, and other trade secrets. Cybersecurity professionals play
an important role in protecting businesses from cybercriminals. The demand for cybersecurity professionals is
constantly increasing and is expected to rise by 28% between 2016 to 2026, as listed by the U.S. Bureau of Labor
Statistics (BLS).

Why Cybersecurity Matters to


Organizations
Cybersecurity is the For businesses that are prioritizing rapid growth,
cybersecurity is now considered an area to continuously
state or process invest in as part of an overarching strategy. Here is how
businesses can win more customers by adopting a proactive
of protecting cybersecurity strategy.

and recovering Security Builds Trust


networks, devices,

When the perception of cybersecurity changes to be more
and programs than just a means of protection, one can see how investment
leads to a return. As customer awareness of data collection
from any type of increases, so does the expectations placed on a business.

cyberattack. Customer priorities and trust signals are always changing,


and security is making its way up the list, with 70% of
consumers saying that they would look elsewhere if a
- Norton business suffers a data breach.

by Symantec. What this means is that having the right policies in place
to protect data is not just about the immediate revenue
hit the company would take if a breach were to occur; it is
about the lasting damage the reputation could take. An IBM
study estimates that every stolen record cost a business
US$148—a figure that is rising every year. On top of the
immediate cost, how many businesses can afford to lose
70% of their customer base, and scare away countless more
potential customers in the future?

Thankfully, businesses are becoming aware of security’s importance where 69% of small- to medium-sized
businesses say that they already realize that data and information security has a significant impact on their business.

Copyright © by EC-Council
03
All Rights Reserved. Reproduction is Strictly Prohibited.
Trust Wins Customers
Securing customer’s data is only the first step to fully realizing the benefits of cybersecurity. Once the company
has sufficiently safeguarded against cyberattacks, it must let its customers know.

Cybersecurity can mean more to the business than just the protection of data. About 89% of businesses say better
information security helps them to win more customers. As a key point of differentiation from competitors, new
customers will use security as one of the many considerations when choosing who to hand their money over to.

Customers Bring Referrals


Data leaks, or questionable handling of public data, can have a catastrophic effect on the perception of a brand.
Just look as far back as last year’s Facebook data scandal to find an example of a big business’s trust rating taking
a significant blow. The social media firm’s value dropped by US$25 billion in the days after the scandal, a clear
example of how bad data handling leads to negative headlines.

Cybersecurity Job Outlook


The job outlook in cybersecurity, as confirmed by BLS, is faster than the average for information security analysts,
which is four times the average. The industry is in dire need of cybersecurity talent, and the employability potential
for well-trained professionals is vast. The cybersecurity job market is expected to grow from $75 billion in 2015 to
$170 billion by 2020. In another forecast by MarketsandMarkekts, the cybersecurity market is expected to grow
from USD 152.71 billion in 2018 to USD 248.6 billion by 2023, at a CAGR of 10.2% from 2018 to 2023. Cybersecurity
Ventures have further predicted that there will be 3.5 million unfilled cybersecurity jobs by 2021.

Cybersecurity Job Roles


JOB TITLE JOB ROLE
Network Security Managing security of the organization’s network, from firewalls to routers to VPNs. Ensuring the
Engineer security of network and systems, endpoints, and devices attached to the network.
Cybersecurity
Responsible for taking care of overall security norms in the organization.
Analyst
Application
Specialized in security coding and protecting applications from threats.
Security Engineer
Ethical Hacker Responsible for defending, hacking, and performing counterattacks.
Assessment of vulnerabilities, performing penetration testing, reporting the vulnerabilities, and
Penetration Tester
suggesting on fixing the issues.
Cyber Forensic Collecting, analyzing, reporting, and storing the evidence that will help in understanding the attack
Analyst and during containment.
Incident Handler Respond and handle the breach, address the threats, and reduce the damage.
Cyber Threat
Analyze and mitigate different types of internal and external threads.
Intelligence Analyst
Chief Information
Lead a security team, define budgeting, frames security policies, manages security issues, and so on.
Security Officer

Copyright © by EC-Council
04
All Rights Reserved. Reproduction is Strictly Prohibited.
Average Cybersecurity The value of transitioning
Salaries from the IT to the
According to [Link], as of Feb 2020, the Cybersecurity industry
average annual salary seen among cybersecurity
professionals in the United States is $112,974 a year, There have been rumors, as well as actual
with some salaries as high as $304,500. figures, that indicate the need for cybersecurity
professionals. The first and foremost reason
for information technology (IT) professionals to
Cyber Security Average by Job switch to the cybersecurity industry is evolving
technology. The dependency on automated
JOBE AVERAGE devices is expected to take over a few technical
jobs. Artificial intelligence is expected to eradicate
Information Security 6% of the jobs in the United States in another five
$72,212 years. In fact, roles such as data entry operators and
Analyst
computer operators are expected to disappear,
Cyber Security Analyst $76,041
and new job roles related to automation will be
Security Engineer $91,090 defined.
Cyber Security
$95,564 Coming from the IT industry to the cybersecurity
Engineer
industry does not mean a complete do-over.
Information Security Cybersecurity is a subsidiary of IT, and therefore,
$117,288
Manager it only adds extra feathers to your career. Here
Security Analyst $68,497 are a few reasons why you should move to the
cybersecurity industry.
Information Security
$97,411
Engineer
a. Easy Transition
Security Consultant.
(Computing / Cybersecurity is a process of defending your
$84,190 IT assets; hence, it demands IT skills. Coming
Networking Information
Technology) from a technical industry, you are already
aware of many technical terms and their
Information
$84,190 functionalities, such as networking, incident
Technology)
management, cloud server, and endpoints,
Information Security which will ease your cybersecurity learning.
$93,596
Officer There are few technical jobs in cybersecurity
Security Architect, IT $125,802 that demand hard-core technical knowledge;
Chief Information roles such as application security engineers,
$169,634 network defenders, and digital forensic
Security Officer
investigators are for professionals with specific
Information Security
$79,341 technical knowledge. Using your IT skills,
Specialist
you can effectively perform these complex
Penetration Tester $83,483 technical job roles.
Senior Security
$113,877
Consultant

Source: [Link]

Copyright © by EC-Council
05
All Rights Reserved. Reproduction is Strictly Prohibited.
b. Opportunities Galore
If you are a jack-of-all-trades and are familiar with many IT concepts, you have the option to either play the role
of a single IT person in a small organization or head the IT security team in a multinational company. With a
background in the IT industry, you can avail of various options to excel in your skills. You can work in any field
and in any industry, including infrastructure, transportation, healthcare, construction, manufacturing, retail,
waste management, logistics, legal, and entertainment.

c. Multitasking
IT professionals can be on both sides of the coin. They can work on the technical end as well as perform
managerial tasks. Security designing involves the knowledge of IT architecture, framing of new mechanisms,
creating new filtering schemes, crafting the source code, designing the user interface, and much more. You
can exploit your technical skills for creating a secured interface that can be easily implemented and executed.

Managerial-level job roles such as chief information security officer (CISO) and lead software security engineer
are aimed at emphasizing both technical and team-leading and other managerial skills.

d. Potential for Growth


Cybersecurity is an ever-changing field that grows with technological advancements. Upcoming innovations in
artificial intelligence, machine learning, and blockchain throw new challenges to cybersecurity and provide a
lot of employment potential. The roles that exist today may split into multiple job roles to obtain the best results
or may be replaced with new ones, thereby making space for growth.

How to Get Started in Cybersecurity


Degree in Cybersecurity
Extensive knowledge of cybersecurity cannot be gained in a short-term learning program. The foundational
concepts can be thoroughly learned only when you opt for a full-fledged cybersecurity degree. By earning a
degree in cybersecurity, students can acquire knowledge and skills in various domains of cybersecurity like
internet security, mobile security, wireless network, ethical hacking, etc. A degree is the first step to becoming
proficient in the subject of your interest and to start your career in cybersecurity. Without acquiring knowledge on
the security domain, one cannot grow to leadership positions in the cybersecurity industry.

Certifications
It is always good to opt for a degree. Simultaneously, it is important to obtain certifications to accelerate the
process of reaching your career goal. A certification will help gain excellent knowledge and skills in a specific
domain. To stay updated on the industry, one should always strive to have certifications on-hand.

Networking
Networking is about the exchange of information as well as nurturing mutually beneficial and long-term relationships
with people through shared business interests. The process of networking helps you remain connected with
security professionals from different parts of the world and exchange opportunities that benefit one and all. To be
a leader, you should be a part of the team first.

Copyright © by EC-Council
06
All Rights Reserved. Reproduction is Strictly Prohibited.
Questions to Consider Before Pursuing the Field
Before you decide to apply for any jobs, ask yourself this:

• What skills do I bring to cybersecurity?


• Based on my skills, what other certifications should I acquire?
• Do I need to acquire any technical education?
• What sort of opportunities does my certification bring?
• What is the certification that I plan to acquire credible and recognized?

Is a Certification Necessary?
Certifications allow learners to obtain workforce-ready skills. In its survey of 2018, Pearson Vue discovered the
impact certifications had on the lives and careers of thousands of respondents across the globe. Take a look at
some of their findings:

Security Certifications: Important or Not?


90% of the candidates who availed certification would recommend to their friends too.

Professionals ambitions
76%
Driving Force in
earning a certification Academic program
24%

Personal Reasons for Certification

66% 23% 5%

Nearly 3/4th of respondents reported that they actively sought out certification on their own.

Copyright © by EC-Council
07
All Rights Reserved. Reproduction is Strictly Prohibited.
Extrinsic (Tangible)
35% identified increase in
salary or wage

Benefits that Intrinsic (Personal)


the respondents 67% reported greater
derived by getting self-confidence
certified
Practical (On-the-job)
55% said that knowledge has been
transferred to real work situations

65% Reported realizing the first benefit within 3-4 months of getting certified.

Preferred Learning in Security

Certification Training Self-study


21.4% 8.5% 15.3%

Key Technologies and Skills to Learn


Cybersecurity is a part of the IT industry, but a candidate does not have to be technically proficient or from a
specific technical background to enter the industry. There are many technology-centric jobs in cybersecurity and
also tasks that require a non-technical background with excellent analytical, leadership, and communication skills.

Copyright © by EC-Council
08
All Rights Reserved. Reproduction is Strictly Prohibited.
Technical Skills
There are specific technical job roles in cybersecurity that require that the candidate possesses a particular skill
set.

Technical Skills Application


The fundamentals of IT, such as web application This basic IT knowledge is required for all types of job
administration, system administration, and so on. roles.
Knowledge of network administration and operating Expertise in system and network administration will
systems help to get various cybersecurity roles.
Coding skills are specific to a few technical job roles,
Coding skills—C, C++, Java, Python, PHP, and so on such as application security engineers, ethical hackers,
and so on. For others, it is not a mandate.
Not mandatory for all the job roles. You must be
Knowledge of database proficient when handling the database if you want to
get an IT-related job role in cybersecurity.

Soft Skills
Soft or non-technical skills define the personal attributes of any individual looking to explore a career in cybersecurity.
These soft skills are mandatory for every cyber expert as they are expected to be dynamic and influential leaders.

Soft Skills Application


This is a must skill for every cybersecurity expert as they should be proficient in
Analytical skills
analyzing things from all aspects.

If you are willing to grow in the cybersecurity industry, leadership skills must be
Leadership developed. You should be able to lead the team and implement security standards
at all levels in the organization.

A cybersecurity staff member has to communicate with everyone in the organization


Communication
for various security reasons. Hence, this skill is a must.

Passionate about Cybersecurity is not a one-time go. You need to continuously learn and acquire new
continuous learning skills to keep yourself updated in the industry.

Many cybersecurity roles demand report writing, where you have to describe the
Writing ability incident, assessments performed, suggestions for improvement, and so on. With
good writing skills, you can create efficiency in work.

Many job roles in cybersecurity test one’s patience as they need to be performed
Determination
with attention, and within a time limit. Determination is the key skill to succeed.

Collaborative and Cybersecurity professionals should be collaborative, supportive, and quickly


approachable approachable to everyone for any security-related query.

Copyright © by EC-Council
09
All Rights Reserved. Reproduction is Strictly Prohibited.
Cybersecurity Path + Courses and Training
EC-Council understands that a single certification is not enough to lead the industry. A combination of training
programs based on different skillsets is required to set a career path that aligns with industry requirements.
To make it easy, EC-Council has drafted and introduced five main career tracks that can help you climb the
cybersecurity career ladder. The sixth career track, as specified by EC-Council, leads to the ultimate C-Suite
certification which is a goal to every career track.

Five cybersecurity career paths from EC-Council and how you can start and pave your career in cybersecurity:

1. Foundation Track

CSCU ECSS ECES


112-12 Computer User Security Specialist 212-81 Encryption Specialis t

Information assets carry the most valuable and crucial data of any business, and therefore, their protection
becomes a high priority. Businesses are mostly online making them prone to a higher risk of cyber breaches. The
primary measure could be defending systems from intrusions and educating the staff on cyber etiquettes for safe
usage of the system.

95% of the cybersecurity breaches are due to human errors - IBM

The foundation tracks of EC-Council educate every individual in the team about the protection of information
assets, enhances security-related skills, and introduces them to the concept of cryptography.

Copyright © by EC-Council
10
All Rights Reserved. Reproduction is Strictly Prohibited.
Program Objective Who can attend? Why is it required?
It educates on the safe
Provide individuals with
Certified Secure handling of internet,
the necessary knowledge Anyone using computer
Computer User system, and end devices
and skills to protect their and internet
(CSCU) so that breaches can be
information assets
avoided

Interested in learning
Enhances skills in
EC-Council Certified • Fundamentals of It ensures a secure
information security,
Security Specialist information security exchange of information in
network security, and
(E|CSS) • Network security the organization
computer forensics
• Computer forensics

Introduction to the Involved in the selection Gives hands-on


EC-Council
foundation of modern and implementation experience on
Certified Encryption
symmetric and key of VPN’s or digital cryptographic algorithms
Specialist (E|CES)
cryptography certificates and stenography

2. Vulnerability Assessment and Penetration Testing

ECSA Security Analyst LPT Licensed Penetration


(Practical) (Practical) (Master) Tester (Master)

CEH ECSA
Hacker (Master) 412-79 Security Analyst

CTIA
312-38 312-85 Intelligence Analyst

The vulnerability assessment and penetration testing (VAPT) track of EC-Council is one of the most recognized
tracks as it encompasses all the major disciplines of cybersecurity that revolve around ethical hacking and
penetration testing. The main features of this VAPT track are:

Copyright © by EC-Council
11
All Rights Reserved. Reproduction is Strictly Prohibited.
• Programs mapped to NICE (National Investigation Cybersecurity Education)

• C|EH is 100% mapped to NICE Framework’s Protect and Defend specialty area

• ECSA version10 maps to NICE Framework’s Analyze and Collect and Operate (CO) specialty area

• C|ND is mapped to NICE Framework

• C|EH is American National Standards Institute accredited

• C|EH serves as a baseline certification on the US Department of Defense Directive 8570

• C|EH (Practical) is the world’s first live proctored exam

• L|PT (Master) is a three-level progressive challenge that is backed by an advanced penetration testing course,
based on the backbone of EC-Council’s Advanced Penetration Testing Cyber Range. Follow the L|PT (Master)
brochure for more information.

Program Objective Who can attend? Why is it required?


To secure the networks,
Detailed understanding • Network the systems attached
and hands-on ability administrator to the network as well
Certified Network
to function in real-life • Network engineer as other digital devices
Defender (C|ND)
situations involving • CND analyst attached to the network
network defense • Security analyst at the primary and
secondary levels

A comprehensive
hands-on program that
masters you on the
methodologies of ethical
hacking and penetration
testing • Security officers
• Auditors
C|EH is the most popular
It includes the five phases • Security
ethical hacking program
Certified Ethical of ethical hacking— professionals
among recruiters
Hacker (C|EH) reconnaissance, gaining • Site administrators
worldwide. It gives a
Master access, enumeration, • And anyone
strong foundation for your
maintaining access, and concerned about
cybersecurity career.
covering your tracks. the integrity of the
IT infrastructure
It is the world’s first
ethical hacking industry
readiness assessment
test that is 100% verified,
online, and live proctored

Copyright © by EC-Council
12
All Rights Reserved. Reproduction is Strictly Prohibited.
• Ethical hackers
A method-driven holistic
• Security practitioners
program that addresses
• Threat hunters
all the stages in the threat
• Incident response
intelligence life cycle.
team members It is the most futuristic
Certified Threat It covers the concepts
• Threat intelligence and realistic program
Intelligence Analyst that are highly essential
analyst that increases your
(C|TIA) from planning the threat
• Digital forensic and employability.
intelligence project
malware analyst
to building a report to
• SOC professionals
disseminating threat
• Anyone interested in
intelligence.
threat intelligence

Real-world hands-on • Aspiring penetration


penetration testing that testers
covers the testing of • Ethical hackers
modern infrastructure, • Firewall It is a recognized
operating system, and administrators program for penetration
EC-Council Certified
application environment • Security testers testing. The credential
Security Analyst
including writing and • Network server recognizes you having
(ECSA)
reporting skills administrators hands-on experience as a
• System penetration tester
The desired credential for administrators and
penetration testing by the risk assessment
employers’ worldwide professionals

• Ethical hackers
12-h rigorous practical • Penetration testers
exam to test your • Security testers
penetration testing skills • Firewall It gives you the value-
EC-Council Certified administrators added benefit of having
Security Analyst World’s first industry • Network server been qualified the
(Practical) readiness assessment administrators credential which is live
that is 100% verified, • System proctored
online, and lives administrators and
proctored risk assessment
professionals

An 18-h long exhaustive


three-level exam that
wants you to demonstrate
mastery of advanced pen Any penetration tester This brings you the
Licensed testing techniques and who want to challenge ultimate credential of been
Penetration Tester tools self-penetration skills a great penetration tester.
(L|PT) and want to gain the Priority will be given in the
It tests your perseverance credential of L|PT Master suitable job prospects
and focuses by serving
you to outdo yourself with
each new challenge

Copyright © by EC-Council
13
All Rights Reserved. Reproduction is Strictly Prohibited.
3. Cyber Forensics Track

CEH CTIA
Hacker (Master) Intelligence Analyst

312-38

Cyber forensics is gaining prominence, thanks to growing cybercrime. The cyber forensics track comprises of two
phases.

*For information on the C|ND, C|EH, and C|EH Practical, please take a look at the VAPT track.

Program Objective Who can attend? Why is it required?


• Penetration testers
• Vulnerability
assessment auditors
• Risk assessment
A method-driven program
administrators
with a holistic approach
• Network
on incident handling
administrators Global incident response
response process to
• Application security market is expected to
recovering organizational
EC-Council Certified engineers grow from $13.38 billion
assets after a security
Incident Handler • Cyber forensic in 2018 to $33.76 billion
incident
(E|CIH) investigators/analyst by 2023 leading to the
and SOC analyst increased requirement of
A most comprehensive
• System skilled human resource
program in incident
administrators/
handling that increases
engineers
your employability
• Firewall
administrators and
network managers/
IT managers

Copyright © by EC-Council
14
All Rights Reserved. Reproduction is Strictly Prohibited.
• Police and other
law enforcement
personnel
• Defense and military
Certifies in the discipline personnel
Bureau of Labor Statistics
of computer forensics • e-Business security
expected a growth of 28%
from a vendor-neutral professionals
Computer in computer forensics,
perspective • System
Hacking Forensic which is extraordinarily
administrators
Investigator (C|HFI) fast and makes an
Provides firm grasp on • Legal professionals
addition of 28,000 jobs to
the domain of digital • Banking, insurance,
the title.
forensics and other
professionals
• Government
agencies
• IT managers

• Police and other


law enforcement
personnel
• Defense and military
Certifies in the discipline personnel
Bureau of Labor Statistics
of computer forensics • e-Business security
expected a growth of 28%
from a vendor-neutral professionals
Computer in computer forensics,
perspective • System
Hacking Forensic which is extraordinarily
administrators
Investigator (C|HFI) fast and makes an
Provides firm grasp on • Legal professionals
addition of 28,000 jobs to
the domain of digital • Banking, insurance,
the title.
forensics and other
professionals
• Government
agencies
• IT managers

Copyright © by EC-Council
15
All Rights Reserved. Reproduction is Strictly Prohibited.
4. Network Defense and Operations Track

312-38

The growing impact of the latest technologies like artificial intelligence, automation, endpoint access, and others
has created a big threat to the security of any network. Network defense and operations track is a simple career
path with three phases.

*For information on the C|ND, please look at the VAPT track, and for E|CIH, the cyber forensic track

Program Objective Who can attend? Why is it


required?
• IT professionals in the BC/
DR or system administration Disaster recovery
domain is considered as
Aimed to educate and
• Business continuity and a lifeboat for the
EC-Council validate the ability
disaster recovery consultants business as 96%
Disaster to plan, strategize,
• Individuals wanting to of companies with
Recovery implement, and
establish themselves in the recovery plan survived
Professional maintain business
field of IT business continuity ransomware attack
(E|DRP) continuity and
and disaster recovery against to 93% without
recovery plan
• IT risk managers and disaster recovery was
consultants out of business.
• CISOs and IT directors

Covers fundamental
areas of fortifying
defenses by A higher level to
Advanced discovering methods • System architects network defense
Network of developing a secure • Firewall administrators security, CAST is
Defense (CAST baseline and how to • System administrators an ultimate career
614) harden enterprise • Windows admin destination to network
architecture from defenders
the most advanced
attacks

Copyright © by EC-Council
16
All Rights Reserved. Reproduction is Strictly Prohibited.
5. Software Security Track

LPT Licensed Penetration


(MASTER) Tester (Master)

ECSA
412-79 Security Analyst
CASE Java Security Engineer
312-96 Java

CASE .Net Security Engineer


312-95 .Net

Despite the increasing number of new applications being created every day, according to the abandoned web
applications—Achilles’ Heel of FT 500 Companies, High-Tech Bridge Security Research—92% of web applications
have security flaws or weaknesses that can be exploited.

*For information on the C|SCU, please look at the foundation track, and for the C|EH, ECSA, and LPT (Master), the
VAPT track.

Program Objective Who can attend? Why is it required?


It provides the critical
security and knowledge
required throughout the Disaster recovery is
software development life • .Net developer considered as a lifeboat
Certified cycle. CASE also applies with two years of for the business as 96% of
Application Security beyond secure coding experience companies with recovery
Engineer (C|ASE)—. and includes secure • Java developer plan survived ransomware
Net and Java requirement gathering, with two years of attack against to 93%
robust application design, experience without disaster recovery
and handling security was out of business.
issues in the post-
deployment phase

Copyright © by EC-Council
17
All Rights Reserved. Reproduction is Strictly Prohibited.
6. Governance Track
The five tracks as defined by EC-Council are the unique and rarest career paths that ensure success in a domain
of cybersecurity. Every track begins with the basics of the cybersecurity career path and helps you in reaching the
higher managerial level in the organization. When someone begins the journey in a cybersecurity career, he/she
determines to reach to the level of C-Suite Certification. EC-Council’s Certified Chief Information Security Officer
(C|CISO) is an industry-leading program that recognizes the real-world experiences which are necessary to reach
the highest executive levels of information security.

C|CISO program covers all the five stages that any C-Suite Information Security certification defines:

• Governance
• Security risk management controls and audit management
• Security program management and operations
• Information security core competencies
• Strategic planning, finance, and vendor management

C|CISO is mapped to NICE’s specialty areas of Securely Provision, Oversee and Govern, CO. The certification
opens your career path from mid-management to an upper, executive managerial role like a chief information
security officer, chief security officer, information security director, and information assurance program manager.
There is a lot of effort that goes to be a CISO including experience, certifications, and master program in
cybersecurity. EC-Council believes in reaching the higher peaks by envisioning today, and therefore, completion
of every career track defined by EC-Council brings you closer to governance track, which is ultimately the highest
grade in cybersecurity, CISO.

Copyright © by EC-Council
18
All Rights Reserved. Reproduction is Strictly Prohibited.
Final Thoughts
The large requirement for cybersecurity professionals means that there will be greater demand for trained
professionals and experienced leaders. If you are prepared to make the most of the opportunity and are craving
for a career where you want to create an impact and gain recognition for your contribution, then cybersecurity
would certainly fit the bill!

References:

• [Link]

• [Link]
[Link]

• [Link]

• [Link]
reaches-75-billion-in-2015%E2%80%8B%E2%80%8B-%E2%80%8Bexpected-to-reach-170-billion-by-
2020/#749f77f530d6

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]
[Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

• [Link]

Copyright © by EC-Council
19
All Rights Reserved. Reproduction is Strictly Prohibited.
EC-Council
[Link]

You might also like