• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

History of Cybersecurity Certifications

History of Cybersecurity Certifications

 History for Cybersecurity Certifications

Cybersecurity is one of the fastest growing career fields in the world. Job seekers, career switchers, and hiring managers alike need a fast but rigorous way to qualify candidates for jobs. Certifications prepare cybersecurity specialists for jobs and help companies determine which candidates are best qualified for their open positions.

How are cybersecurity certifications different from degrees? 

Colleges and universities award academic degrees in cybersecurity or related fields. Typically, students earn an associate, bachelor’s, or master’s degree. An associate degree usually requires 60-75 hours with about 15-30 of those credits in the field. Bachelor’s degrees often require 120-130 hours and may have a major in cybersecurity or a major in computer science with a specialization in cybersecurity. A master’s degree typically requires 30-36 credits and may have extensive admissions requirements.

Certifications, on the other hand, are not awarded at the conclusion of an academic program. Instead, prospects have to pass a rigorous examination to earn their certificates. CompTIA, a private membership and education agency, now offers most of the recognized cybersecurity certificates. Typically, people earn certificates as a way to launch a career in cybersecurity without paying the high price tag and enduring long time frame of a degree. IT degree holders may also seek certification to demonstrate skills in new areas.

Why do cybersecurity certifications exist? 

Cybersecurity certifications move you into the infosec field quickly. An associate degree takes at least two years, a bachelor’s degree requires four years, and a master’s degree requires at least 18 months. That’s full-time study. Certificates, however, may take only a few days or weeks to prepare for the exam.

These certifications focus on granular knowledge and practical achievement. While an academic program may offer a broader and more theoretical foundation, certificates equip holders with immediately actionable knowledge. They are designed to be put into work as soon as possible.

Since experts expect unfilled cybersecurity job openings to top 3.5 million by 2020, certificates make it easier for the field to welcome new specialists. They allow hiring managers and human resource officers to screen applicants for infosec jobs. Plus, they open higher salary options to employees.

What’s the history of cybersecurity as a career field? 

The first hack can be traced back to 1903 when a magician hacked into a secure wireless telegraph. In the late 1930s, Polish and British computer specialists used early forms of hacking to crack the Nazi Enigma code. It wasn’t until 1955, though, that the word “hack” would come to mean tampering with machines. And it was the late 1970s before malicious hacking of computers started to become a problem. From there, hacking accelerated in both sophistication and scope. Cybersecurity soon crystallized as a career field as black hat hacking became a corporate and national security concern.

Timeline of cybersecurity certification history: 

  • 1967 – ISACA, previously known as the Information Systems Audit and Control Association, was founded.
  • 1982 – Association of Better Computer Dealers (ABCD) was founded as a membership organization.
  • 1989 – International Information Security Certification Consortium or (ISC)² was formed with the purpose of standardizing infosec certifications.
  • 1990 – ABCD changes its name to Computing Technology Industry Association (CompTIA).
  • 1992 – CompTIA introduces vendor-neutral IT certifications.
  • 1994 – (ISC)² launches its most popular certification, Certified Information Systems Security Professional (CISSP).
  • 2002 – 10,000th person receives CISSP certification.
  • 2002 – EC Council founded.

Today – International Council of E-Commerce Consultants (EC-Council), now the world’s largest cybersecurity technical certification body, works in 145 countries. They own certificates like Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), EC-Council Certified Security Analyst (ECSA), Certified Chief Information Security Officer (C|CISO), and more. The EC-Council has trained and certified more than 200,000 people.

Who are some notable people in the history of cybersecurity?

As a career field, cybersecurity is home to some of the world’s most intriguing people – good guys and criminals alike. Here are just a few of them:

Robert T. Morris, Jr. – In 1988, this Cornell student created the first computer worm. He received three years of probation, 400 hours of community service, and a fine of $10,050. Morris now serves as a professor at MIT.

Jon Lech Johansen – A Norwegian reverse software engineer, Johansen has worked on numerous projects related to music and DVD licensing. He, too, has faced criminal charges.

Dr. Charlie Miller – A white hat hacker with a Ph.D. in mathematics, Miller may be best known for hacking into a Macbook Air in two minutes. He also hacked a Jeep as it was driving down the highway.

Many of today’s leading cybercrime investigators and cybersecurity specialists hold the CISSP or other certifications.

Can you cheat your way through a cybersecurity certification exam?

It should come as no surprise that some hackers try to cheat their way through cybersecurity certifications. The organizations offering certifications take allegations of cheating seriously. That’s why these companies develop exams that are difficult for test-takers to manipulate. (ISC)² also requires that members and test takers sign their Code of Ethics.

According to Hord Tipton, CISSP-ISSEP, CAP, (ISC)² Executive Director, “There are recent reports of widespread cheating on certification exams in China, South Korea, and a few other countries…I stand with more than 100,000 others worldwide who are certified by (ISC)² and recognize that certification is a privilege that must be legitimately earned and maintained.”

One way to ensure the legitimacy and value of your certification is to take exam training from a legitimate training organization such as Alpine Security.

How did cybersecurity certification testing evolve from paper-based tests to adaptive computer-based tests?

Cheating is just one reason that cybersecurity certification testing evolved from paper-based tests to computer-based tests and now to adaptive computer-based tests. Tipton says, “(ISC)² conducts psychometric and forensic analyses to validate ethical testing practices and exam results. Sophisticated scientific techniques are routinely applied through computer-based testing with controls inapplicable to paper-based exams, in highly secured testing centers with in-depth monitoring of all test subjects.”

Not surprisingly, cybersecurity experts can control testing validity in a computer-based environment more closely than in a paper-based one.

Final thoughts.

The history and evolution of cybersecurity follows a logical path from war-time cryptographers in World War II to today’s ultra-sophisticated white hat hackers who can hack into moving vehicles. Cybersecurity certifications are key to keeping the field open to new professionals and to maintaining high standards of excellence for infosec practitioners.

Related


 

Life of a CISSP “In Progress”


 

9 Practical Tips to Triumph Over the CISSP Exam


 

9 Keys to Choosing the Best CISSP Training


 

CISSP Pass Rates: What You Don’t Know


 

Pass the CISSP Certification Exam without Trying at All – 100% Guaranteed [Not Really]


 

How to Easily Use LinkedIn to Maximize Job Opportunities


 

CISM vs CISSP: How to Decide Which is Best for You


 

CISSP Boot Camps: 5 Things You Should Know


 

3 Little Known Techniques CISSPs Use to Find Jobs


 

5 Costly Misconceptions About CISSP Training

Tags: (ISC)2charlie millerCompTIAcybersecurity careerCybersecurity certificationcybersecurity jobsEC-Councilisacajon johansenrobert morris
Share

You also might be interested in

7 Hardest Cybersecurity Certifications
Difficult path like a videogame for a businessman

7 Hardest Cybersecurity Certifications

Mar 17, 2018

Why Where You Get Your Cybersecurity Training Matters
Cork, Ireland

Why Where You Get Your Cybersecurity Training Matters

Oct 6, 2017

To Cert or Not Cert
Business women touching the certification screen

To Cert or Not Cert

Jan 20, 2018

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company

Prev Next