beads wrote: » Any certification is worth it when you have the appropriate experience to back it up. From what you've written sounds more likely your looking for more money and a better job while doing it and less drive for one discipline over another. You really need to be driven to want to do something in Security really well to want to stick with it otherwise you won't stay in security for long. Seen it many times. Gespenstern is right on the money when it comes to InfoSec more so than any other discipline in IT. We are constantly upgrading our skills to do tomorrows work if not today and more often than not - yesterday's backlog. In reaction to Gespenstern's acclamation that you qualify for the CISSP. Really? If that's the case I would let the ISC(2) make that determination as they seem to believe almost anything, anyway. Personally, I am highly skeptical but that's what I am known. - b/eads
beads wrote: » In reaction to Gespenstern's acclamation that you qualify for the CISSP. Really? If that's the case I would let the ISC(2) make that determination as they seem to believe almost anything, anyway. Personally, I am highly skeptical but that's what I am known. - b/eads
gespenstern wrote: » Working on DVRs fall under "Security Engineering" domain easily as they removed "Physical Security" and now it is a subdomain of "Security Engineering". Specifically it is "Embedded devices and cyber-physical systems vulnerabilities" subdomain and "Physical Security" itself. Also some parts of this type of work are related to different "Security Operations" subdomains. Actually DVRs and stuff is more known as "electronic security", but (ISC)2 puts this into physical security as this area of knowledge is too shallow anyways so it doesn't make much sense to introduce another one as shallow as that, it's easier to add everything non purely information related to physical. Working on DVRs TS is most likely pretty experienced in video acquisition process, cameras, effective camera placements and lighting and some parts of crime prevention through environmental design, using coax, twisted pair and ethernet to pass the video flow from a camera to a DVR or a multiplexor on all stack layers from physical to application, web servers as any IP camera is a web server, video frames, multiplexing, analog to digital conversion, video or frame compression, encryption, storage, databases, retrieving information from databases, hunting for anomalies across large volumes of video data, troubleshooting everything here and underlying operating systems. And programming in Lua and C is self explanatory. TS may need to supplement all of this with tons of other information and review existing knowledge from a security point of view, but if what he says is true I'd say he's eligible.
jivex5k wrote: » Thanks for the responses everyone. I've heard of the OSCP, that it's more respected among hacking circles but not as recognized as the other two when it comes to HR or Managers/CEOs that don't know a lot about IT. It sounds like the most fun though, reminds me of finding an exploit in my school's web server when I was a senior. I have access to some free CISSP training through some military veteran resources I'm going to check out for now.
zesty2016 wrote: » I have seen a lot of people quoting CISSP but I have not had a chance to look into it much. I will do once I have finished my OSCP tho. I keep being sent these security deals from Tecmint.com where they bundle 9 courses for $30 (or something crazy like that), that might also be an avenue that you would like to explore. I think I bought the security one but haven't even downloaded it yet.