	{"id":2758,"date":"2013-07-07T19:24:28","date_gmt":"2013-07-07T12:24:28","guid":{"rendered":"http:\/\/science-technology.vn\/?p=2758"},"modified":"2013-07-07T19:24:28","modified_gmt":"2013-07-07T12:24:28","slug":"dao-tao-ve-an-ninh-thong-tin","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=2758","title":{"rendered":"\u0110\u00e0o t\u1ea1o v\u1ec1 an ninh th\u00f4ng tin"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">T\u00f4i nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t email: \u201cC\u00e1m \u01a1n th\u1ea7y v\u1ec1 b\u00e0i b\u00e1o an ninh C\u00f4ng ngh\u1ec7 th\u00f4ng tin. Th\u1ea7y c\u00f3 th\u1ec3 n\u00f3i th\u00eam cho em v\u1ec1 c\u00e1ch t\u00f4i c\u00f3 th\u1ec3 v\u00e0o l\u0129nh v\u1ef1c n\u00e0y \u0111\u01b0\u1ee3c kh\u00f4ng? Em \u0111\u00e3 l\u00e0 ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m trong 4 n\u0103m v\u00e0 em mu\u1ed1n l\u00e0 chuy\u00ean vi\u00ean v\u1ec1 an ninh.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>\u0110\u00e1p: C\u00f3 nhi\u1ec1u con \u0111\u01b0\u1eddng ngh\u1ec1 nghi\u1ec7p \u0111\u1ec3 \u0111i v\u00e0o khu v\u1ef1c an ninh C\u00f4ng ngh\u1ec7 th\u00f4ng tin, b\u1ea1n c\u00f3 th\u1ec3 tr\u1edf v\u1ec1 tr\u01b0\u1eddng \u0111\u1ec3 l\u1ea5y b\u1eb1ng th\u1ea1c s\u0129 trong C\u00f4ng ngh\u1ec7 th\u00f4ng tin chuy\u00ean ng\u00e0nh An ninh h\u1ec7 th\u1ed1ng hay l\u1ea5y c\u00e1c m\u00f4n h\u1ecdc th\u00eam v\u1ec1 an ninh th\u00f4ng tin r\u1ed3i qua k\u00ec thi \u0111\u1ec3 \u0111\u01b0\u1ee3c ch\u1ee9ng ch\u1ec9 v\u1ec1 an ninh c\u00f4ng ngh\u1ec7 th\u00f4ng tin. M\u1ed9t m\u00f4n ph\u1ed5 bi\u1ebfn nh\u1ea5t l\u00e0 \u201cChuy\u00ean nghi\u1ec7p an ninh h\u1ec7 th\u00f4ng tin c\u00f3 ch\u1ee9ng ch\u1ec9 &#8211; Certified Information Systems Security Professional\u201d\u00a0(CISSP) \u0111\u01b0\u1ee3c Li\u00ean \u0111o\u00e0n ch\u1ee9ng nh\u1eadn an ninh h\u1ec7 th\u00f4ng tin qu\u1ed1c t\u1ebf &#8211; International Information Systems Security Certification Consortium hay ISC\u00b2 qu\u1ea3n l\u00ed. T\u1ed5 ch\u1ee9c n\u00e0y y\u00eau c\u1ea7u r\u1eb1ng c\u00e1c th\u00e0nh vi\u00ean c\u1ee7a h\u1ecd ph\u1ea3i h\u1ed7 tr\u1ee3 v\u00e0 tu\u00e2n theo b\u1ed9 lu\u1eadt \u0111\u1ea1o \u0111\u1ee9c \u0111\u1ec3:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0 B\u1ea3o v\u1ec7 x\u00e3 h\u1ed9i, to\u00e0n th\u1ec3 nh\u00e2n d\u00e2n, v\u00e0 k\u1ebft c\u1ea5u n\u1ec1n.<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0 H\u00e0nh \u0111\u1ed9ng m\u1ed9t c\u00e1ch \u0111\u00e1ng k\u00ednh, trung th\u1ef1c, c\u00f4ng b\u1eb1ng, tr\u00e1ch nhi\u1ec7m, v\u00e0 h\u1ee3p ph\u00e1p.<\/p>\n<p>3)\u00a0\u00a0\u00a0\u00a0 Cung c\u1ea5p d\u1ecbch v\u1ee5 si\u00eang n\u0103ng v\u00e0 c\u00f3 tr\u00ecnh \u0111\u1ed9 cho th\u00e2n ch\u1ee7.<\/p>\n<p>4)\u00a0\u00a0\u00a0\u00a0 Th\u00fac \u0111\u1ea9y v\u00e0 b\u1ea3o v\u1ec7 ngh\u1ec1 chuy\u00ean m\u00f4n.<\/p>\n<p>T\u1ed5 ch\u1ee9c ISC coi r\u1eb1ng ch\u1ee9ng ch\u1ec9 l\u00e0 \u0111\u1eb7c quy\u1ec1n ph\u1ea3i \u0111\u01b0\u1ee3c thu l\u1ea5y v\u00e0 duy tr\u00ec. C\u00e1c th\u00e0nh vi\u00ean c\u00f3 \u00fd \u0111\u1ecbnh hay ch\u1ee7 \u00fd vi ph\u1ea1m b\u1ea5t k\u00ec \u0111i\u1ec1u kho\u1ea3n n\u00e0o c\u1ee7a b\u1ed9 lu\u1eadt n\u00e0y s\u1ebd tu\u1ef3 thu\u1ed9c v\u00e0o h\u00e0nh \u0111\u1ed9ng c\u1ee7a m\u00ecnh m\u00e0 b\u1ecb thu h\u1ed3i ch\u1ee9ng ch\u1ec9.<\/p>\n<p>\u0110\u00e0o t\u1ea1o c\u1ee7a CISSP bao qu\u00e1t m\u01b0\u1eddi khu v\u1ef1c mi\u1ec1n c\u00f3 li\u00ean quan t\u1edbi ch\u1ee7 \u0111\u1ec1 an ninh: Ki\u1ec3m so\u00e1t truy nh\u1eadp; M\u1eadt m\u00e3 ho\u00e1; Ki\u1ebfn tr\u00fac an ninh; Vi\u1ec5n th\u00f4ng v\u00e0 an ninh m\u1ea1ng; Qu\u1ea3n l\u00ed r\u1ee7i ro; Ph\u00e1p l\u00ed, Qui ch\u1ebf v\u00e0 \u0111i\u1ec1u tra; An ninh v\u1eadn h\u00e0nh; Li\u00ean t\u1ee5c nghi\u1ec7p v\u1ee5 v\u00e0 ph\u1ee5c h\u1ed3i th\u1ea3m ho\u1ea1; An ninh \u1ee9ng d\u1ee5ng; v\u00e0 An ninh v\u1eadt l\u00ed;<\/p>\n<p>\u0110\u1ec3 \u0111\u01b0\u1ee3c x\u00e1c nh\u1eadn l\u00e0 CISSP, b\u1ea1n ph\u1ea3i \u0111\u00e1p \u1ee9ng m\u1ed9t s\u1ed1 y\u00eau c\u1ea7u:<\/p>\n<ul>\n<li>C\u00f3 \u00edt nh\u1ea5t n\u0103m n\u0103m kinh nghi\u1ec7m l\u00e0m vi\u1ec7c an ninh tr\u1ef1c ti\u1ebfp trong hai khu v\u1ef1c thu\u1ed9c m\u01b0\u1eddi khu v\u1ef1c mi\u1ec1n n\u00e0y.<\/li>\n<li>C\u00f3 b\u1eb1ng c\u1eed nh\u00e2n v\u00e0 b\u1ed1n n\u0103m kinh nghi\u1ec7m l\u00e0m vi\u1ec7c trong hai khu v\u1ef1c thu\u1ed9c m\u01b0\u1eddi khu v\u1ef1c mi\u1ec1n n\u00e0y.<\/li>\n<li>Qua \u0111\u01b0\u1ee3c k\u00ec thi CISSP v\u1edbi \u0111i\u1ec3m \u0111\u01b0\u1ee3c t\u00ednh theo thang 700 \u0111i\u1ec3m hay l\u1edbn h\u01a1n. K\u00ec thi n\u00e0y l\u00e0 thi \u0111a ch\u1ecdn l\u1ef1a, ch\u1ee9a 250 c\u00e2u h\u1ecfi v\u1edbi b\u1ed1n tu\u1ef3 ch\u1ecdn cho t\u1eebng c\u00e2u, c\u1ea7n \u0111\u01b0\u1ee3c tr\u1ea3 l\u1eddi trong th\u1eddi h\u1ea1n s\u00e1u gi\u1edd.<\/li>\n<li>Ch\u1ee9ng nh\u1eadn l\u00e0 \u0111\u00fang v\u1ec1 c\u00e1c \u0111\u00e1nh gi\u00e1 c\u1ee7a h\u1ecd li\u00ean quan t\u1edbi kinh nghi\u1ec7m chuy\u00ean m\u00f4n v\u00e0 b\u1ed9 lu\u1eadt \u0111\u1ea1o \u0111\u1ee9c c\u1ee7a CISSP.<\/li>\n<li>\u0110\u01b0\u1ee3c x\u00e1c nh\u1eadn b\u1edfi m\u1ed9t CISP kh\u00e1c, ng\u01b0\u1eddi ch\u1ee9ng nh\u1eadn r\u1eb1ng nh\u1eefng kh\u1eb3ng \u0111\u1ecbnh c\u1ee7a \u1ee9ng c\u1eed vi\u00ean li\u00ean quan t\u1edbi kinh nghi\u1ec7m chuy\u00ean m\u00f4n l\u00e0 \u0111\u00fang v\u1edbi hi\u1ec3u bi\u1ebft t\u1ed1t nh\u1ea5t c\u1ee7a h\u1ecd, v\u00e0 r\u1eb1ng \u1ee9ng c\u1eed vi\u00ean n\u00e0y \u0111ang gi\u1eef v\u1ecb tr\u00ed t\u1ed1t trong c\u00f4ng nghi\u1ec7p an ninh th\u00f4ng tin.<\/li>\n<\/ul>\n<p>Ch\u1ee9ng ch\u1ec9 CISSP c\u00f3 hi\u1ec7u l\u1ef1c trong ba n\u0103m, sau \u0111\u00f3 n\u00f3 s\u1ebd ph\u1ea3i \u0111\u01b0\u1ee3c gia h\u1ea1n b\u1eb1ng vi\u1ec7c l\u1ea5y l\u1ea1i c\u00e1c k\u00ec thi hay \u00edt nh\u1ea5t l\u1ea5y 120 t\u00edn ch\u1ec9 gi\u00e1o d\u1ee5c chuy\u00ean nghi\u1ec7p ti\u1ebfp t\u1ee5c &#8211; Continuing Professional Education (CPE) nh\u01b0 h\u1ecdc c\u00e1c l\u1edbp c\u00f4ng ngh\u1ec7 th\u00f4ng tin b\u1ed5 sung, d\u1ef1 c\u00e1c h\u1ed9i ngh\u1ecb v\u00e0 x\u00ea mi na, xu\u1ea5t b\u1ea3n c\u00e1c b\u00e0i b\u00e1o v\u00e0 nghi\u00ean c\u1ee9u trong khu v\u1ef1c an ninh, v.v. B\u1ea1n c\u00f3 th\u1ec3 li\u00ean h\u1ec7 v\u1edbi Li\u00ean \u0111o\u00e0n ch\u1ee9ng nh\u1eadn an ninh h\u1ec7 th\u00f4ng tin qu\u1ed1c t\u1ebf \u0111\u1ec3 bi\u1ebft th\u00f4ng tin chi ti\u1ebft v\u1ec1 \u0111\u00e0o t\u1ea1o v\u00e0 l\u1ea5y ch\u1ee9ng nh\u1eadn t\u1ea1i: \u00a0\u00a0<a href=\"https:\/\/www.isc2.org\/\" target=\"_blank\">https:\/\/www.isc2.org\/<\/a><\/p>\n<p>Theo quan \u0111i\u1ec3m c\u1ee7a t\u00f4i, ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m v\u1edbi tri th\u1ee9c chuy\u00ean gia an ninh \u0111ang c\u00f3 nhu c\u1ea7u cao \u1edf m\u1ecdi n\u01a1i. C\u00f3 thi\u1ebfu h\u1ee5t tr\u1ea7m tr\u1ecdng v\u1ec1 ng\u01b0\u1eddi c\u00f3 k\u0129 n\u0103ng n\u00e0y cho n\u00ean b\u1ea1n c\u00f3 th\u1ec3 mong \u0111\u1ee3i ki\u1ebfm \u0111\u01b0\u1ee3c l\u01b0\u01a1ng r\u1ea5t cao (t\u1eeb $90,000 t\u1edbi $125,000 m\u1ed9t n\u0103m) v\u00e0 n\u00f3 s\u1ebd c\u00f2n l\u00ean cao h\u01a1n n\u1ebfu b\u1ea1n c\u00f3 c\u00e1c k\u0129 n\u0103ng ph\u1ee5 trong ki\u1ebfn tr\u00fac v\u00e0 thi\u1ebft k\u1ebf an ninh hay chuy\u00ean m\u00f4n gi\u1ea3i quy\u1ebft v\u1edbi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng xi be, to\u00e0 \u00e1n m\u00e1y t\u00ednh v\u00e0 qu\u1ea3n l\u00ed t\u1ed5 \u0111\u00e1p \u1ee9ng t\u00ecnh tr\u1ea1ng kh\u1ea9n c\u1ea5p m\u00e1y t\u00ednh. V\u00ec khu v\u1ef1c an ninh y\u00eau c\u1ea7u nhi\u1ec1u kinh nghi\u1ec7m, \u0111i\u1ec1u \u0111\u00f3 th\u00edch h\u1ee3p cho nh\u1eefng ng\u01b0\u1eddi c\u00f3 nhi\u1ec1u n\u0103m l\u00e0m vi\u1ec7c nh\u01b0 ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m nh\u01b0 b\u1ea1n, t\u00f4i \u0111\u1ed9ng vi\u00ean r\u1eb1ng b\u1ea1n c\u00f3 th\u1ec3 l\u1ea5y c\u01a1 h\u1ed9i n\u00e0y \u0111\u1ec3 th\u0103ng ti\u1ebfn ngh\u1ec1 nghi\u1ec7p c\u1ee7a m\u00ecnh.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Information Security Training<\/p>\n<p>I received an email: \u201cThanks for your Information Technology security article. Could you tell me more about how can I get into this field ? I have been a software developer for 4 years and I want to be a security specialist.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Answer: There are several career paths to get into the Information Technology security area, you can return to school to get a Master Degree in Information Technology specialize in System Security or take additional courses in Information security then pass an exam to get certified in Information System Security. The most popular one is the \u201cCertified Information Systems Security Professional\u201d\u00a0(CISSP) which governs by the International Information Systems Security Certification Consortium or ISC\u00b2. This organization requires that their members must support and follow a code of ethics to:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0 Protect society, the commonwealth, and the infrastructure.<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0 Act honorably, honestly, justly, responsibly, and legally.<\/p>\n<p>3)\u00a0\u00a0\u00a0\u00a0 Provide diligent and competent service to principals.<\/p>\n<p>4)\u00a0\u00a0\u00a0\u00a0 Advance and protect the profession.<\/p>\n<p>The ISC organization considered that certification is a privilege that must be both earned and maintained. Members who intentionally or knowingly violate any provision of the Code will be subject to action which result in the revocation of certification.<\/p>\n<p>The current CISSP training covers ten domain areas related to Information Security topics: Access control; Cryptography; Security Architecture; Telecommunication and network security; Risk Management; Legal, regulation and investigation; Operation security; Business continuity and disaster recovery; Application Security; and Physical Security;<\/p>\n<p>To be certified as CISSP, you must meet several requirements:<\/p>\n<ul>\n<li>Have at least five years of direct security work experience in two of the ten domain areas.<\/li>\n<li>Have a Bachelor degree and four years of work experience in two of the ten domain areas.<\/li>\n<li>Pass the CISSP exam with a scaled score of 700 points or greater. The exam is multiple choice, consisting of 250 questions with four options each, to be answered over a period of six hours.<\/li>\n<li>Attest to the truth of their assertions regarding professional experience and accept the CISSP Code of Ethics.<\/li>\n<li>Be endorsed by another CISSP who attests that the candidate&#8217;s assertions regarding professional experience are true to the best of their knowledge, and that the candidate is in good standing within the information security industry.<\/li>\n<\/ul>\n<p>The CISSP certificate is valid for three years, after which it must be renewed by re-taking the exam or taken at least 120 Continuing Professional Education (CPE) credits such as taking additional information technology classes, attending conferences and seminars, publish articles and researches in security areas, etc. You may contact the International Information Systems Security Certification Consortium for more detailed information about trainings and get certify at: \u00a0\u00a0<a href=\"https:\/\/www.isc2.org\/\" target=\"_blank\">https:\/\/www.isc2.org\/<\/a><\/p>\n<p>From my view, software developer with security expertise are in high demand everywhere. There is a critical shortage of people with this skills so you can expected to earn a very high salary (From $90,000 to $125,000 a year) and it will go up higher if you have additional skills in security architecture and design or specialty in dealing with cyber attacks, computer forensic and manage computer emergency response team. Since security area requires a lot of experiences, it is suitable for people who have several years working as software developer like you, I do encourage that you may want to take this opportunity to advance your career.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00f4i nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t email: \u201cC\u00e1m \u01a1n th\u1ea7y v\u1ec1 b\u00e0i b\u00e1o an ninh C\u00f4ng ngh\u1ec7 th\u00f4ng tin. Th\u1ea7y c\u00f3 th\u1ec3 n\u00f3i th\u00eam cho em v\u1ec1 &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,26],"tags":[],"class_list":["post-2758","post","type-post","status-publish","format-standard","hentry","category-loi-khuyen-cho-sinh-vien","category-xu-huong-cong-nghe"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2758"}],"version-history":[{"count":1,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2758\/revisions"}],"predecessor-version":[{"id":2759,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/2758\/revisions\/2759"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}