Security Certification Roadmap October 2020 Update

Security Certification Roadmap October 2020 Update

Feature Updates

This year has seen a big rise in popularity of the Security Certification Roadmap. In order to keep the information on there as useful as possible, I have made the following changes:

  • Aligned the columns with (ISC)2 CBK security domains
  • Moved certifications to new domains as applicable
  • Adjusted some certification rankings in response to feedback
  • Added 26 certifications
  • Added Microsoft Edge support
  • Updated scaling of the chart to full-width
  • Added CSS to allow certifications to be cross domain
  • Added the ability to have sub-domains
  • Simplified the code to allow for easier updates
  • Updated tooltip functionality to avoid off-screen clipping

Future Plans

The following features are in the works for this year:

  • Links to more info on all 39 certificate issuing vendors represented in the roadmap
  • Add a dark mode
  • Reintroduce visual rows to indicate Beginner, Associate, Journeyman, or Expert levels
  • Improve tooltip to include more information and be easier to read

The follow features are planned for the future when I learn how to implement them:

  • Javascript version of the roadmap
  • Add form options to re-order chart based on input such as:
    • Highlight certifications from a specific vendor
    • Highlight certifications that are user goals
    • Highlight recommended certifications based on current achievements such as education, certifications, and experience
    • Reorder roadmap based on career paths
    • Reorder roadmap to exclude certifications for which the user has no interest
  • Add certification planning tools such as saving customized charts, tracking milestones, linking to study resources, and comparing to template charts or other customized charts.

Request for Feedback

This roadmap has been 7 years in the making and community input has been the major driving force. In that spirit I want to encourage feedback for any aspect of the chart form formatting to ranking. Please use the form below if you want to contribute directly!

The Art of Deception

The Art of Deception

Synopsis

At the time of my reading, The Art of Deception was 18 years old. It was published in 2001 and covered the career of a hacker that spanned from from the 80’s to the turn of the millennium. As such, much of the information on specific technologies and tactics are painfully out of date. But with that said, the purpose of this book was not to teach people how to write a mainframe code, it is to teach you how to use deception as part of your hacking toolkit. In that regard, this book is timeless.

The book is organized into about 20 anecdotes, each demonstrating a different tactic or imparting a key issue with the way humans hand their information. It shows you that not all hackers sit behind a screen alone using their programming skills to cause havoc. Some cause havoc in person using more analog methods.


My Reaction

While I did enjoy reading about these anecdotes, I feel like these chapters would be better in a blog or a series of social media posts. That said, each one did touch on a very real issue of the time such as phone phreaking, dumpster diving for credentials, and working you way into places you shouldn’t be allowed. The age of the book makes finding those real issues a bit of a drag, but I feel it is worth while to stick with it to the end.


Recommendation

This novel will not teach you how to be a hacker, but it may open your eyes into aspects you previously had not considers. I do count this as mandatory reading for cyber security professionals, but I wouldn’t be upset it if were lower on your list.

[dsm_block_reveal_text block_reveal_text=”Recommended Reading for:” block_reveal_delay=”0.5″ _builder_version=”4.8.1″ _module_preset=”default”][/dsm_block_reveal_text][dsm_star_rating rating=”3″ title=”IT Curious Readers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”3″ title=”All IT Professionals” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”3″ title=”Help Desk Technicians” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”3″ title=”System Administrators” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”3″ title=”Network Administrators” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”2″ title=”Software Developers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”4″ title=”Security Analysts” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”3″ title=”Security Engineers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”Penetration Testers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″ header_font=”|800|||||||”][/dsm_star_rating][dsm_star_rating rating=”3″ title=”CISOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px”][/dsm_star_rating][dsm_star_rating rating=”3″ title=”CIOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px”][/dsm_star_rating][dsm_star_rating rating=”3″ title=”CTOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”3″ title=”CEOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating]
[dsm_star_rating rating=”4″ title=”My Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating]
[dsm_star_rating title=”Amazon Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center”][/dsm_star_rating]
[dsm_star_rating rating=”4″ title=”GoodReads Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center”][/dsm_star_rating]