Access Denied! Many tens of thousands of people have access to systems and data in the organizations that they do not require to perform their jobs. They merely have access because the controls are weak and managers do not think much about it. They are too, too busy to bother with an Information Technology problem that someone else owns. Really! — Ray Newkirk

“Systems Management Institute offers several tracks for each certification level to assist you with mastering your Insider Threat Prevention Cyber Security expertise including:

  • Level 1: Three Tracks 

  • Level 2: Five Tracks

  • Level 3 Three Tracks

  • Level 4: One Track

Each track defines the qualifying certification criteria at each level taken from five evidence-based knowledge areas including:

  1. Academic Education

  2. Professional Experience

  3. Continuing Education from related bodies of knowledge

  4. Consulting experience in Insider Threat Prevention Cyber Security for the Certified License Examination

  5. Self-directed education in the Consulting Business

In the old days, to get certified meant people thought you were not all there. Today if you do not become certified in something, you are not all there.” —RLN

Previous
Previous

ITP Certification

Next
Next

Cert. Knowledge Areas