Web Security

Web Security

 

CIW Web Security Career Track

The CIW Web Security series consists of one CIW course and corresponding CIW certification exam, plus two more advanced CIW credentials that you can obtain by earning additional certifications from third-party security and networking training providers.

In addition to teaching Web Foundations, this series teaches you how to secure your network from unauthorized activity. You will learn about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.

Whichever level of certified expertise you aim for, you can demonstrate to employers that you have the technical skills and knowledge to manage and protect the security of online data, from a single computer to an entire corporate network.

CIW Web Security Career Track Information

What is a Web security professional?

CIW Web Foundations Associate

Web security professionals perform a variety of security tasks, depending on the job role and level of advancement.

Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and they monitor legitimate access to it. They also perform security risk assessments, prepare for disaster recovery, monitor security control systems to ensure that appropriate security clearances and information access levels are maintained, and work with other departments to maintain secure data and information flow. Security managers may also implement and document the organization's security policies and procedures, provide security training to management and employees, and monitor and recommend advancements in information security technologies.

Security analysts/consultants are responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy the requirements. Security analysts/consultants may lead project teams that perform risk assessment, information security program development and implementation, network security architecture review and design, product reviews, and security solution deployments.

View CoursesView Career Track Courses

Skills and Knowledge

Security managers and analysts/consultants should possess knowledge of:

  • UNIX/Linux
  • Windows servers
  • Firewall technology
  • Virus-scanning software
  • Security management software
  • Security assessment software
  • Intrusion detection systems
  • Virtual Private Networks (VPNs)
  • Project management
  • Consulting
  • Communication

Job Roles

  • Web Security Consultant
  • Web Security Manager
  • Web Security Analyst

Qualifications

  • Good communication skills
  • Organizational skills
  • Ability to work well with others
  • Attention to detail
  • Analytical and critical thinking
  • Operations analysis
  • Deductive reasoning
  • Information organization
  • Complex problem solving
  • Creative thinking
  • Communication with supervisors, peers and/or subordinates
  • Project and task planning and management
  • Data analysis and organization
  • Integrity
  • Self-control
  • Adaptability/flexibility
View Career Track Courses

Responsibilities

  • Encrypt data transmissions and configure firewalls to conceal confidential information during transmission and to filter out tainted digital transfers
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction or disclosure, and to meet emergency data processing needs
  • Review violations of computer security procedures, and discuss procedures with violators to ensure violations are not repeated
  • Monitor use of data files and regulate access to safeguard information in computer files
  • Monitor current reports of computer viruses to determine when to update virus protection systems
  • Modify computer security files to incorporate new software, correct errors or change individual access status
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures
  • Confer with users to discuss issues such as computer data access needs, security violations and programming changes
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency
  • Coordinate implementation of computer system plan with establishment personnel and outside vendors