Government of Jamaica - ICT Training Catalogue
Government of Jamaica - ICT Training Catalogue
Government of Jamaica - ICT Training Catalogue
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>ICT</strong> <strong>Training</strong> <strong>Catalogue</strong><br />
CAP <strong>Training</strong><br />
Description: The Certified Authorization<br />
Pr<strong>of</strong>essional (CAP) training helps to strengthen<br />
skills <strong>of</strong> individuals whose job role involves<br />
authorizing and maintaining information<br />
systems. This training was developed<br />
specifically for individuals who want to pursue<br />
careers in in government agencies or<br />
organizations. This training delivers knowledge<br />
to enhance the skills and abilities that will help<br />
individuals assess the risk associated with IT<br />
security and develop the ability to implement<br />
effective security controls and documentation.<br />
Target Audience: This training will benefit IT<br />
staff with responsibility for information systems<br />
operations such as those in the F02 <strong>ICT</strong> Job<br />
Family. The other <strong>ICT</strong> Job Families focusing on<br />
information, data, cyber, and network security<br />
such as F01, F03, and database management in<br />
the F04 could also benefit from this training.<br />
Requirements and Qualifications: Like many<br />
<strong>of</strong> the other training associated with ISC2, prior<br />
knowledge experience and skills may be required<br />
such as systems development, database<br />
development, information security policy,<br />
systems administration, information risk<br />
management, information assurance, and<br />
general understanding <strong>of</strong> IT security.<br />
SSCP<br />
Description: The Systems Security Certified<br />
Practitioner (SSCP) training was designed for<br />
individuals who wish to develop and validate the<br />
technical knowledge and hands-on experience to<br />
implement an organization’s information<br />
security policies and procedures. Like the other<br />
ISC2 training, it comes highly recognized by<br />
global companies, government agencies, and<br />
other security conscious organizations. The<br />
focus <strong>of</strong> this training is on the technical aspects<br />
<strong>of</strong> information security and on the design,<br />
implementation, and administration <strong>of</strong><br />
information systems in compliance with<br />
established policies and procedures.<br />
Target Audience: This training will be good for<br />
<strong>ICT</strong> staff holding technical and engineering<br />
related information security positions such as<br />
network security engineers, systems security<br />
analysts, security administrators as well as nonsecurity<br />
specific information technology<br />
positions that require an understanding <strong>of</strong><br />
security concepts and <strong>of</strong> best security practices<br />
including systems administrators, application<br />
programmers, database administrators and<br />
systems analysts. The F01, F02, F03, and F07<br />
<strong>ICT</strong> Job Families should benefit tremendously<br />
from this training.<br />
CISSP<br />
Description: This training will help participants<br />
understand and apply the concepts <strong>of</strong> risk<br />
assessment, risk analysis, data classification,<br />
security awareness, and implement risk<br />
management and the principles used to support<br />
IT infrastructures.<br />
Target Audience: This training is more suitable<br />
for pr<strong>of</strong>essionals who have leadership or<br />
operations role in the GoJ such as those in the<br />
F06 Job Family entrusted with governance<br />
responsibilities for <strong>ICT</strong> network, data and<br />
security infrastructures. Some positions and role<br />
include security manager, IT director, IT<br />
manager, security auditor, security architect,<br />
chief information security <strong>of</strong>ficer, security<br />
17