What avenues should an aspiring information security professional use in acquiring professional credentials?