The IT Certification Resource Center

Featured Deal

Get CompTIA, Cisco, or Microsoft training courses free for a week.
Learn More ❯

Certification Watch (Vol. 21, No. 42)

In this week's roundup of the latest IT certification news, CompTIA says CASP certification is a winner over CISSP, Training Industry has tips for how to teach old IT dogs new tech tricks, and more.

CompTIA Rates Its Own CASP Credential Better than (ISC)²'s CISSP


CompTIA is taking a swing at CISSP.They say in boxing and other professional sports that you can't become a champion until you beat a champion. Along those lines, there's little doubt that the CISSP certification managed by information security association (ISC)² is the heavyweight title holder of cybersecurity certifications. A new post this week to the IT Career News blog of tech industry association CompTIA, however, takes a swing at the champ, asserting that CompTIA's own expert-level cybersecurity credential, CASP, is more relevant to today's job market. Blogger Patrick Lane rests his case on four key differences between CISSP and CASP, both of which have been recently overhauled to some extent by their respective sponsoring organizations. Lane asserts, for example, that the CASP exam includes performance-based questions that require examinees to successfully navigate real-world security challenges in a simulated environment — a mark of distinction he says is missing from the CISSP exam. Another key distinction, and one that may carry a fair amount of weight with penny-pinching exam candidates: CASP costs $439 per exam attempt, while CISSP is $699. One blog post isn't likely to result in a Douglas-vs.-Tyson-esque dethroning of CISSP, but sometimes you have to change hearts and minds one blog reader at a time.


ISACA Blogger Touts Business Benefits of 'Strong Cybersecurity Culture'


First with the CASP vs. CISSP slugfest, and now this. It must be National Cyber Security Awareness Month (NCSAM), or something. A new post to the ISACA Now Blog of cybersecurity and governance association ISACA makes the case that businesses should adopt a strong cybersecurity culture, to serve and protect their own interests. It's not exactly a revolutionary idea, but guest blogger E. Doug Grndstaff II of the CMMI Institute says that true culture problems often exist far beneath the surface-level screwups that lead to cybersecurity breaches. In other words, you can't fix this sort of thing with a memo about better passwords, or a poster in the breakroom. You can't read Grindstaff's entire post at the ISACA Now Blog, so if you click over there (from here), then be prepared to click away to somewhere else (from there).


Red Hat Seeks Nominations for 2019 Women in Open Source Awards


Female professionals are almost overwhelmingly outnumbered by male professionals in most niches of the greater IT realm, but women's contributions to IT can have a much bigger impact than you might suppose from simply counting heads. Red Hat, one of the tech industry's leading providers of open source technology, celebrates the value of women to the industry with its annual Red Hat Women in Open Source Awards. Now in it is fifth year, the Women in Open Source Awards program has just opened up nominations for its 2019 awards. There are two categories of awards, one for women who are currently students, and a second for women who are working professionals and members of the open source community. Winners will be awarded a cash stipend ($2,500), as well paid travel, lodgings, and attendance at Red Hat Summit 2019 in Boston. Additional information about the awards program, as well as a nomination submission form, are available online.


Privacy Policy Update

We have updated our Privacy Policy to comply with the California Consumer Privacy Act (CCPA)