ASIS Certification-Handbook Final
ASIS Certification-Handbook Final
CONTACT INFORMATION
EMAIL: [email protected]
PHONE: +1 703.519.6200
WEBSITE: asisonline.org
ADDRESS:
ASIS International
1625 Prince Street
Alexandria, Virginia
22314-2882, USA
Knowledge of
1. Communication techniques and protocols of
liaison
2. Communication techniques and notification
protocols
Knowledge of
1. Training and exercise techniques
2. Post-incident review techniques
TASK 2: Select, implement, and manage physical TASK 2: Develop policies and procedures to ensure
security strategies to mitigate security risks. information is evaluated and protected against
Knowledge of vulnerabilities and threats.
Knowledge of
1. Fundamentals of security system design
2. Countermeasures (e.g., policies, technology, 1. Principles of information security
procedures) management
3. Budgetary projection development process 2. Information security theory and terminology
(e.g., technology, hardware, labor) 3. Information security industry standards (e.g.,
4. Bid package development and evaluation ISO, PII, PCI)
process 4. Laws and regulations regarding records
5. Vendor qualification and selection process management including collection, retention,
6. Testing procedures and final acceptance legal holds, and disposition practices (e.g.,
(e.g., commissioning, factory acceptance General Data Protection Regulation (GDPR),
test) biometric information)
7. Project management techniques 5. Practices to protect proprietary information
8. Cost-benefit analysis techniques and intellectual property
9. Labor-technology relationship 6. Information protection measures including
security processes, physical access systems,
TASK 3: Assess the effectiveness of physical security and data management
measures by testing and monitoring.
TASK 3: Implement and manage an integrated
Knowledge of
information security program
1. Protection personnel, hardware, technology,
and processes Knowledge of
2. Audit and testing techniques (e.g., operation 1. Information security including confidentiality,
testing) integrity, and availability
3. Predictive, preventive, and corrective 2. Information security systems methodology
maintenance 3. Authentication techniques (e.g., multi-factor,
biometrics)
4. Continuous evaluation and improvement
DOMAIN SIX programs
Information Security (14% -- was 9%) 5. Ethical hacking and penetration testing
techniques and practices
TASK 1: Conduct surveys to evaluate current status 6. Encryption and data masking techniques
of information security programs. (e.g., cryptography)
Knowledge of 7. Systems integration techniques (e.g.,
1. Elements of an information security program, interoperability, licensing, networking)
including physical security; procedural security; 8. Cost-benefit analysis methodology
information systems security; employee 9. Project management techniques
awareness; and information destruction and 10. Budget review process (e.g., system
recovery capabilities. development lifecycle)
2. Survey techniques 11. Vendor evaluation and selection process
3. Quantitative and qualitative risk assessments 12. Final acceptance and testing procedures
13. Protection technology and forensic
4. Risk mitigation strategies (e.g., technology,
personnel, process, facility design) investigations
5. Cost-benefit analysis methods 14. Training and awareness programs to mitigate
6. Protection technology, security threats threats and vulnerabilities (e.g., phishing,
equipment, and procedures (e.g., social engineering, ransomware, insider
interoperability) threats)
7. Information security threats
AND
EDUCATION
“When you have ‘board certified’
A high school diploma or GED equivalent after your name on a business card
*Case Management is defined as the coordination and it’s being passed around,
and direction of an investigation using various
disciplines and resources, the finding of which would whether at a corporate meeting or
be assessed to establish the facts/findings of the with clients, it’s recognized. Those
investigation as a whole; the management process of
investigation. three letters mean something. It
OR shows you have the knowledge and
Hold the APP and have four (4) years of investigations
experience to handle a full range of
experience, including at least two (2) years in case investigative assignments”
management*
Patrick Quillinan, PCI, Senior Security
Investigator, Takeda Pharmaceuticals U.S.A.,
Inc.
DOMAIN THREE
Case Presentation (15%)
TASK 1: Prepare report to substantiate investigative
findings.
Knowledge of
1. Critical elements and format of an investigative
2. report
3. Investigative terminology
4. Logical sequencing of information
OR
PSP: BOARD CERTIFICATION IN
WORK EXPERIENCE
PHYSICAL SECURITY Six years of progressive experience in the physical
The Physical Security Professional (PSP®) credential security* field
provides demonstrable proof of knowledge and
experience in threat assessment and risk analysis; AND
integrated physical security systems; and the EDUCATION
appropriate identification, implementation, and A high school diploma, GED equivalent, or associate
ongoing evaluation of security measures. degree
Earning a PSP demonstrates your expertise in OR
conducting physical security surveys to identify
vulnerabilities and performing cost analysis for the Hold the APP, and five (5) years of progressive
selection of integrated physical security measures. In experience in the physical security* field
addition, it confirms your specialized knowledge in
AND
systems procurement, final acceptance testing, and
implementation procedures. EDUCATION
Knowledge of
1. Installation/maintenance inspection
techniques
2. Systems integration
3. Commissioning
4. Installation problem resolution (punchlists)
5. Systems configuration management
6. Final acceptance testing criteria
7. End-user training requirements
Knowledge of
Knowledge of
Choosing Your Exam (English or Spanish) Due to frequent cancellations and short notification
The CPP, PCI, and PSP exams are administered in rescheduling, Prometric has indicated that there may
English and Spanish. Note that remote proctoring is be inadequate capacity at centers where the ASIS
not currently available for our Spanish-language International examinations are administered.
exams. For the Spanish-language exams, you are also Managing the process of scheduling and rescheduling
given an English translation. During the online appointments is critical to ensure that all candidates
application process, you will choose the language for can obtain a testing appointment on the date and time
your exam (English or Spanish). requested.
Candidate Detail Confirmation – You will have a ◆ The performance of all candidates is monitored
video chat with the agent to confirm your personal and may be analyzed to detect fraud.
information Candidates who violate security measures will
not have their exams scores validated by ASIS.
360 Environmental Check – Using your webcam, you ◆ If you offer or receive help during the exam, you
will show the agent a 360-degree scan of your room will be escorted from the testing center and
and your workstation. You’ll need a medium/large reported to the PCB. Your exam will not be
mirror in the room so Readiness Agent can see your
scored, exam fees will not be refunded, and you
computer. NOTE: DO NOT HAVE YOUR LAPTOP
will be prohibited from taking the exam again.
HOOKED TO A DOCKING STATION.
◆ All exam materials, including all questions and all
Candidate Person Check – Your Readiness Agent will forms of the exam, are copyrighted and the
ask you to stand up to do a scan of your person. This property of ASIS. Any distribution of these
scan will include – but is not limited to – conducting a materials through reproduction or oral or written
sleeve, pocket, and glasses check. Additionally, you
communication is strictly prohibited and
will be asked to turn all pockets inside out. NOTE:
EMPTY YOUR POCKETS BEFOFE STARTING THE CHECK- punishable by law.
IN PROCESS. Sound Distractions Alternatives
Candidates can bring their own small earplugs to the
Check-in ID Requirements center with them. You must present the ear plugs to
You must have the following items, or you will not be the test center proctors for examination before
allowed to take the exam: entering the testing room. Note that candidates may
not bring their own large headphone-style noise
Two forms of identification, one of which must be a
reducers without a special accommodation.
government-issued photo ID (such as a passport,
driver’s license, employee ID card, state ID card). Candidates may opt to use the noise-reducing
Acceptable forms of secondary ID include credit card, headphones available at Prometric sites. These are
check card, ATM card. Both must have the candidate’s large “airport” style headphones and may be
signature. (A Social Security card is not an acceptable uncomfortable when worn for a long period. There
form of identification.) are no small earplug-type noise reducers available at
▪ Only your first and last/surname on your Prometric centers.
approval letter from ASIS and identifications
must match EXACTLY or you may NOT be Eating, drinking, and smoking are not permitted during
permitted to test. This includes abbreviated or the exam. If you bring a jacket or sweater, you will be
hyphenated names. required to wear it at all times in the testing room.
Visitors are not allowed in the test center, and childcare
Prometric Confirmation Email and Number (from the is not provided.
email you get when you schedule your exam).
If you are testing outside your country of citizenship, During the Exam
you must present a valid passport. If you are testing in
Once you have completed the check-in process, you
your country of citizenship, you may present a
will be assigned to a testing station or to a remote
passport, driver’s license, national ID, or military ID.
proctor.
Expired IDs will not be accepted.
At your testing station
If you fail to bring/have the proper identification,
you will not be allowed to take the exam and will ◆ You will be provided with erasable note
forfeit the exam fee. boards and dry erase markers.