e-Competence Certificates
eSkills training and certification are often hard to compare. They may be very specific and focused on the latest technology of one of the hardware or software suppliers, or more generic and providing overview of a field like architecture, business analysis or information security.One solution for this enigma is comparing learning outcomes with the e-competences defined in the e-Competence Framework e-CF and with the ICT Profiles of the CEN Workshop on ICT Skils. This is the core idea of the Certification Profiles listed below.
A Certification Profile contains the core information about an eSkills related certificate and shows which e-competencies match with obtaining the certificate and compares those with the most relevant ICT-profiles.
Title | Advanced Security Practitioner (CASP) |
Provider | CompTIA |
Web source | http://certification.comptia.org/getCertified/certifications/casp.aspx |
Description | The CASP certification proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines. |
Target Group |
- IT professionals with advanced-level security skills and knowledge |
Corresponding ICT profiles |
- ICT SECURITY SPECIALIST - ICT SECURITY MANAGER |
Prerequisites |
- None |
Main subject(s) |
- conceptualize, design, and engineer secure solutions across complex enterprise environments - apply critical thinking and judgment across a broad spectrum of security disciplines - propose and implement solutions that map to enterprise drivers - enterprise security - risk management |
Competence covered with this certificate | Competence from the ICT Profiles | ||||
---|---|---|---|---|---|
e-CF competency | Level | G/P/S | ICT SECURITY SPECIALIST | ICT SECURITY MANAGER | |
A.5 Architecture Design | 4 | P | |||
A.7 Technology Trend Monitoring | 4 | P | 4 | ||
C.2 Change Support | 3 | S | 3 | ||
C.3 Service Delivery | 2 | S | 3 | ||
D.1 Information Security Strategy Development | 5 | G | 5 | ||
D.10 Information and Knowledge Management | 3 | ||||
D.9 Personnel Development | 2 | S | 3 | ||
E.3 Risk Management | 3 | G | 3 | ||
E.8 Information Security Management | 4 | G | 3 | 4 | |
E.9 IS Governance | 4 |
Any mapping to the e-CF will have to deal with cases where the e-competence at hand, e.g. in a learning outcome, does not fit the description in the e-CF to its full extend. Here we used a grading (G/P/S) such that for e-competency:
For each e-competency the G (General), P (Partial) and S (Superficial) indicate the extend the competency is covered by the certificate:
- General
Someone with this certificate will most likely have the competence. - Partial
The content of the requirements for the certificate match with the description of the competence but some parts of the competence are missing (e.g. no evidence of some of the practical skills). - Superficial
The content of the requirements mentions parts of the competence description, but there is no evidence that obtaining the certificate will show possession of this competence.
The methodology behind the Certification Profiles has been developed during the eSkills Quality study for the European Commission. The final report of this study is available here.