How Do I Become an Information Security Engineer?
The information security engineer is a newly added exam in the soft exam held by the Ministry of Information Industry and the Ministry of Personnel. The soft exam is called the National Computer Technology and Software Professional and Technical Qualification (level) exam. This newly opened information security engineer belongs to the "Information System" specialty of the exam and is at the intermediate level. It is a new profession added by the Ministry of Information Industry and the Ministry of Personnel in the latest "National Office of the People's Republic of China [2007] 139 [1] " document.
Information Security Engineer
- Information security engineers are mainly engaged in computer information security work.
- 1. Mastery
- Information security graduates are mainly engaged in computer system hardware and software, network, application-related fields engaged in security system design, security product development, product integration, information system security testing and auditing, etc. Service units can be state agencies, enterprises and institutions And scientific research teaching units. For example, system security engineers, network system security software engineers, information security engineers, Linux operating system engineers, etc. are all good choices. Public security bureau information inspection website security virus anti-virus company and all the places involved in information security, such as telecommunications, technical security maintainers of China Netcom, network security monitoring of various important government departments, and so on.
- Training objectives at all levels of the NSACE project
- 1. Primary goal
- At this level, students are trained to take on small network information security tasks. Have a complete understanding of network information security, master computer security, website security, email security, Internet network security deployment, operating system security configuration, malicious code protection, common software security settings, firewall application and other skills.
- 2. Intermediate goals
- At this level, trainees are fully professionally trained to improve and optimize corporate information security systems and processes. Information security work meets specific specifications, can track and verify the implementation of security measures in the system, can establish a three-dimensional, deep security protection system, deploy security monitoring mechanisms, and can provide early warning and tracking of unknown security threats .
- 3 Advanced goals
- At this level, trainees can perform programmatic and periodic evaluations, improvements, and enhancements to security policies, operating procedures, rules and regulations, and security measures, and they can organize and establish their own information security systems. Information security management is able to formulate appropriate management systems and processes in accordance with the specific situation of the unit, and it can put forward the concept of information security management and promote it to specific management activities in the unit. In terms of technical capabilities, the security measures in the unit's system can be checked in general, the vulnerability analysis methods of the protection system can be mastered, and suggestions for improvement of the security protection system can be put forward. Familiar with information security industry standards and product features, familiar with the development trend of information security technology, and able to choose the appropriate security technology and product according to the information security needs of the organization.