eSkills training and certification are often hard to compare. They may be very specific and focused on the latest technology of one of the hardware or software suppliers, or more generic and providing overview of a field like architecture, business analysis or information security.One solution for this enigma is comparing learning outcomes with the e-competences defined in the e-Competence Framework e-CF and with the ICT Profiles of the CEN Workshop on ICT Skils. This is the core idea of the Certification Profiles listed below.
A Certification Profile contains the core information about an eSkills related certificate and shows which e-competencies match with obtaining the certificate and compares those with the most relevant ICT-profiles.
|Title||Certified Information Systems Auditor (CISA)|
|Description||The Certified Information Systems Auditor is a professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.|
- professionals with the knowledge, skills, experience and credibility to: leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.
|Corresponding ICT profiles||
- QUALITY ASSURANCE MANAGER
- ICT SECURITY MANAGER
- Adherence to the Code of Professional, Ethics and the Continual Professional Education Program
- Compliance with the Information Systems Auditing Standards
- The Process of Auditing Information Systems: audit services, IT audit standards, protect and control information systems (Job practice)
- Governance and Management of IT: leadership and organizational structures and processes in place (Job practice)
- Information Systems Acquisition, Development and Implementation: assurance that practices meet organization’s strategies and objectives (Job practice)
- Information Systems Operations, Maintenance and Support: assurance that the processes meet the organization’s strategies and objectives (Job practice)
- Protection of Information Assets: security policies, standards, procedures and controls for CIA of information assets (Job practice)
|Competence covered with this certificate||Competence from the ICT Profiles|
|e-CF competency||Level||G/P/S||QUALITY ASSURANCE MANAGER||ICT SECURITY MANAGER|
|A.1 IS and Business Strategy Alignment||4||P|
|A.7 Technology Trend Monitoring||4|
|D.1 Information Security Strategy Development||5||G||5|
|D.2 ICT Quality Strategy Development||5||G||4|
|E.3 Risk Management||3||P||3||3|
|E.5 Process Improvement||3||G||3|
|E.6 ICT Quality Management||4||G||4|
|E.8 Information Security Management||4||G||4|
|E.9 IS Governance||4||G||4|
Back to list
Any mapping to the e-CF will have to deal with cases where the e-competence at hand, e.g. in a learning outcome, does not fit the description in the e-CF to its full extend. Here we used a grading (G/P/S) such that for e-competency:
For each e-competency the G (General), P (Partial) and S (Superficial) indicate the extend the competency is covered by the certificate:
Someone with this certificate will most likely have the competence.
The content of the requirements for the certificate match with the description of the competence but some parts of the competence are missing (e.g. no evidence of some of the practical skills).
The content of the requirements mentions parts of the competence description, but there is no evidence that obtaining the certificate will show possession of this competence.
The methodology behind the Certification Profiles has been developed during the eSkills Quality study for the European Commission. The final report of this study is available here.