Certified Security Operation Manager (CSOM): A Complete Honest Review

Introduction

The Certified Security Operation Manager (CSOM) certification has recently emerged as one of the newest credentials offered by Security Blue Team. While it garners both praise and criticism, this post aims to provide a comprehensive review of the certification, covering its strengths and weaknesses, as well as who might benefit from pursuing it.

Course Structure and Content

One of the first points of contention is the structure and content of the course. Despite being presented as a cybersecurity certification, the course material largely utilizes complex and uncommon language. This can be frustrating, especially for those who might expect straightforward explanations. It often feels as though the content was generated without sufficient consideration for clarity, resembling English literature more than the practical cybersecurity training one would anticipate.

For those with significant experience in the field, much of the information may already be familiar. In fact, individuals with a few years of experience might find the material less challenging than desired. Another notable limitation is the absence of instructional videos, except for lab work, which is deemed not useful. The reliance on written material can lead to information overload, making it more challenging to engage with the content effectively.

Platform Usability

The learning platform used for the certification has notable usability issues. Users have reported numerous bugs, including difficulties in navigating, particularly in dark mode. Additionally, the search functionality is ineffective, often breaking if more than four letters are entered, causing significant disruptions in the learning process. Frustratingly, users are also restricted from copying material, which can hinder retaining information. Upon course completion, access to the content is typically revoked, which raises concerns about the long-term value of the knowledge acquired.

Certification Process and Experience

After completing the certification, candidates typically expect to receive their physical certificate. However, delays in this process can lead to frustration, with reports of candidates waiting months without satisfactory updates. This lack of communication can create a perception of unprofessionalism, contributing to a negative experience overall.

The examination process itself is somewhat mixed. While theoretical assessments align well with the required learning outcomes, the practical exam appears misaligned with the role of a manager. The focus on incident response and investigative tasks may not necessarily represent the skills needed to effectively manage a security team.

Potential Benefits of the Certification

Despite the identified flaws, there are notable benefits to the CSOM certification. It presents an opportunity for individuals transitioning into management roles or those new to cybersecurity management. It can offer valuable insights into team dynamics, reporting structures, and the nuances of manage cybersecurity operations.

Moreover, the certification is competitively priced relative to similar credentials in the market. However, it’s important to assess whether the investment is justifiable based on the knowledge gained compared to more affordable options.

Conclusion

In conclusion, the CSOM certification offers valuable insights for new managers or those transitioning from other areas of IT into cybersecurity. However, experienced professionals may find limited value given the repetitive nature of the material. The course’s complex language, usability issues, and practical examination problems highlight areas that need significant improvement.

Ultimately, if prospective candidates are seeking a foundational understanding of cybersecurity management and are willing to navigate the course’s challenges, this certification may be a worthwhile investment. However, individuals with substantial experience in the field are advised to explore other certifications that align better with their advanced knowledge and expertise.

This article is written by Fady Azzi 

Fady Azzi is a Cyber Security expert, based in Sydney, Australia. Through quick and short videos full of interesting and trusted information, Fady’s channel aims to inform and educate people of all ages about cyber security, hacking, technology and many interesting topics.

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *