Skip to main content

AFTER PASSING THE CISSP EXAM

 


After passing the CISSP exam, (ISC)2 will ask CISSP test taker to supply their endorsement documentation supported by an endorser/sponsor.

For the endorsement, the application must be endorsed & digitally signed by an (ISC)2 certified professional.

The (ISC)2 certified professional is anyone who:

ü Is able to attest to test taker professional experience

ü Is an active (ISC)2 credential holder in good standing.

This will proof that the test taker indeed has the type of experience required to obtain this certification.

The endorser/sponsor must sign the test taker endorsement document vouching for the security experience the test taker is submitting.

The endorsed/sponsor will attest that the test taker assertions regarding professional experience are true to the best of the endorser’s/sponsor’s knowledge, & that the test taker are in good standing within the cybersecurity industry.

So, the test taker has to be sure about his/her endorser/sponsor prior to registering for the exam & providing payment.

The test taker will need the endorser’s member/certification number when filling out the online application.

Group of CISSP test takers are selected as sample at random for auditing after passing the CISSP exam.

The audit consists of individuals from (ISC)2 calling on the candidate endorsers/sponsors & contacts to verify the test taker’s related experience.

Once CISSP test taker endorsement application has been approved, the final step in the process is to pay first Annual Maintenance Fee (AMF).

All candidates who pass an (ISC)2 credential examination must complete the endorsement process within a time period of no longer than 9 months.

Comments

Popular posts from this blog

INTRODUCTION TO ETHICAL HACKING

  Technology Brief Information Security Overview Information security ensures the confidentiality, integrity, & availability. An organization without security policies & appropriate security rules are at great risk, & the confidential information & data related to that organization are not secure in the absence of these security policies. An organization along well-defined security policies & procedures helps in protecting the assets of that organization from unauthorized access & disclosures. Essential Terminologies HACK VALUE – This is a value that denotes attractiveness, interest or something that is worthy. ZERO-DAY ATTACK – This refers to threats & vulnerabilities that can exploit the victim before the developer identify or address & release patch for that vulnerability. VULNERABILITY – IT refers to a week point, loophole or a cause in any system, software, or network which can be helpful & utilized by the attackers to go t...

CISM-: INFORMATION SECURITY GOVERNANCE (LESSON ONE PART ONE)

      CERTIFIED INFORMATION SECURITY MANAGER (CISM) CERTIFICATION TRAINING DOMAIN ONE: INFORMATION SECURITY GOVERNANCE LESSON ONE: PART ONE DOMAIN DEFINITION Establish &/or maintain an information security governance framework & supporting processes to ensure that the information security strategy is aligned with organization goals & objectives. LEARNING OBJECTIVES ·         Understand the purpose of information security governance, what it consists of & how to accomplish it ·         Understand the purpose of an information security strategy, its objectives, & the reasons & steps required to develop one ·         Understand the meaning, content, creation & use of policies. Standards, procedures & guidelines & how they relate to each other ·         Develop business cases & gain commitment from ...

CERTIFIED ETHICAL HACKER v10

  C|EHv10 CERTIFICATION DESCRIPTION The Certified Ethical Hacker (C|EHv10) certification program is a trusted & respected ethical hacking certification program that any information security professional will need. Certified Ethical Hacker (C|EH) didn’t gain the reputation & value it has by being easy to attain. It’s challenging examination that tests more than just simple memorization. It’s worth has elevated it as one of the top certifications a technician can attain. This certification actually means something to employers because they know the effort it takes to attain it. C|EH is used as a hiring standard & is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, & a cyber staple in education across many of the most prominent degree programs in top universities around the globe. Hundreds of thousands of InfoSec Professionals as well as career Starter have challenged the exam & for thos...