1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
11

Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?

Computers and Technology
1 answer:
Nat2105 [25]3 years ago
4 0

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
You might be interested in
Question 3 (8 marks): Write a program that takes a string from the user and splits it into a list using a space (" ") as the del
bonufazy [111]

Answer:

In Python:

mystr = input("Sentence: ")

mylist = []

word = ""

for i in range(len(mystr)):

   if not i == len(mystr)-1:

       if not mystr[i] == " ":

           word+=mystr[i]

       else:

           mylist.append(word)

           word = ""

   else:

       word+=mystr[i]

       mylist.append(word)

print(mylist)

Explanation:

Prompt the user for an input sentence

mystr = input("Sentence: ")

Initialize an empty list

mylist = []

Initialize each word to an empty string

word = ""

Iterates through the input sentence

for i in range(len(mystr)):

If index is not the last, the following if condition is executed

   if not i == len(mystr)-1:

If the current character is not space

       if not mystr[i] == " ":

Append the character to word

           word+=mystr[i]

If otherwise

       else:

Append word to the list

           mylist.append(word)

Set word to an empty string

           word = ""

If otherwise; i.e. If index is not the last

   else:

Append the last character to word

       word+=mystr[i]

Append word to the list

       mylist.append(word)

Print the list

print(mylist)

5 0
3 years ago
What was your first experience with listening to kpop?
Verizon [17]

Answer:

My first experience with kpop was when I was six I just danced to it lol I forgot the name of the song but it was funny watching the video of me.

Explanation:

8 0
3 years ago
Read 2 more answers
Witch is a game story device
natulia [17]
A PS4 because there the most popular game out right now
5 0
3 years ago
Which process refers to starting up a computer?<br> is the process of starting a computer.
Dennis_Churaev [7]

Answer: Boot Up or booting

Explanation:

6 0
4 years ago
Read 2 more answers
What combination of keys will autofill highlighted cells to the right?
melomori [17]

Answer:

it is Ctrl+R            

7 0
3 years ago
Other questions:
  • What Is the output of the following: =OR (5 &lt;7, 16*Rand ()&gt;23,FALSE)
    5·1 answer
  • Assume that the type NAME has already been defined. Define a new type, SREC that is a structure consisting of two fields: name (
    5·1 answer
  • What do developers do to support software products
    14·1 answer
  • )duplicate hash code
    15·1 answer
  • Which two men developed the steam engine?
    8·1 answer
  • When the amount of storage data is big, and we need the searching and insertion must be very fast, which kind of data structure
    9·1 answer
  • Which of the following are the benefits of using Responsive Display Ads?
    9·1 answer
  • What percentage of teens say they have witnessed cyberbullying?
    6·2 answers
  • You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The m
    10·1 answer
  • What are the characteristics of the Outlook Rules Wizard? Check all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!