01.05.2018 Views

Government of Jamaica - ICT Training Catalogue

Government of Jamaica - ICT Training Catalogue

Government of Jamaica - ICT Training Catalogue

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ICT</strong> <strong>Training</strong> <strong>Catalogue</strong><br />

CAP <strong>Training</strong><br />

Description: The Certified Authorization<br />

Pr<strong>of</strong>essional (CAP) training helps to strengthen<br />

skills <strong>of</strong> individuals whose job role involves<br />

authorizing and maintaining information<br />

systems. This training was developed<br />

specifically for individuals who want to pursue<br />

careers in in government agencies or<br />

organizations. This training delivers knowledge<br />

to enhance the skills and abilities that will help<br />

individuals assess the risk associated with IT<br />

security and develop the ability to implement<br />

effective security controls and documentation.<br />

Target Audience: This training will benefit IT<br />

staff with responsibility for information systems<br />

operations such as those in the F02 <strong>ICT</strong> Job<br />

Family. The other <strong>ICT</strong> Job Families focusing on<br />

information, data, cyber, and network security<br />

such as F01, F03, and database management in<br />

the F04 could also benefit from this training.<br />

Requirements and Qualifications: Like many<br />

<strong>of</strong> the other training associated with ISC2, prior<br />

knowledge experience and skills may be required<br />

such as systems development, database<br />

development, information security policy,<br />

systems administration, information risk<br />

management, information assurance, and<br />

general understanding <strong>of</strong> IT security.<br />

SSCP<br />

Description: The Systems Security Certified<br />

Practitioner (SSCP) training was designed for<br />

individuals who wish to develop and validate the<br />

technical knowledge and hands-on experience to<br />

implement an organization’s information<br />

security policies and procedures. Like the other<br />

ISC2 training, it comes highly recognized by<br />

global companies, government agencies, and<br />

other security conscious organizations. The<br />

focus <strong>of</strong> this training is on the technical aspects<br />

<strong>of</strong> information security and on the design,<br />

implementation, and administration <strong>of</strong><br />

information systems in compliance with<br />

established policies and procedures.<br />

Target Audience: This training will be good for<br />

<strong>ICT</strong> staff holding technical and engineering<br />

related information security positions such as<br />

network security engineers, systems security<br />

analysts, security administrators as well as nonsecurity<br />

specific information technology<br />

positions that require an understanding <strong>of</strong><br />

security concepts and <strong>of</strong> best security practices<br />

including systems administrators, application<br />

programmers, database administrators and<br />

systems analysts. The F01, F02, F03, and F07<br />

<strong>ICT</strong> Job Families should benefit tremendously<br />

from this training.<br />

CISSP<br />

Description: This training will help participants<br />

understand and apply the concepts <strong>of</strong> risk<br />

assessment, risk analysis, data classification,<br />

security awareness, and implement risk<br />

management and the principles used to support<br />

IT infrastructures.<br />

Target Audience: This training is more suitable<br />

for pr<strong>of</strong>essionals who have leadership or<br />

operations role in the GoJ such as those in the<br />

F06 Job Family entrusted with governance<br />

responsibilities for <strong>ICT</strong> network, data and<br />

security infrastructures. Some positions and role<br />

include security manager, IT director, IT<br />

manager, security auditor, security architect,<br />

chief information security <strong>of</strong>ficer, security<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!