In the computer security or Information security fields, there are a number of tracks a professional can take to demonstrate qualifications. [Notes 1] Four sources categorizing these, and many other credentials, licenses, and certifications, are:
Quality and acceptance vary worldwide for IT security credentials, from well-known and high-quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser-known credentials and organizations.
In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry-sponsored competitions, including team competitions and contests.
Issuing Organization | Credential abbreviation | Certification Title | Focus | Validity duration | Number issued |
---|---|---|---|---|---|
Altered Security | CRTP | Certified Red Team Professional | Red Teaming | 3 years | N/A |
CRTE | Certified Red Team Expert | ||||
CRTM | Certified Red Team Master | ||||
CARTP | Certified Azure Red Team Professional | ||||
CAWASP | Certified Azure Web Application Security Professional | Application Security | |||
SECO-Institute | S-ITSF | IT-Security Foundation | General Cyber Security | 3 years | N/A |
S-ITSP | IT-Security Practitioner | ||||
S-ITSE | IT-Security Expert | ||||
S-CITSO | Certified IT-Security Officer | ||||
S-DPF | Data Protection Foundation | Privacy | No expiration [1] | ||
S-DPP | Data Protection Practitioner | 1 year [2] | |||
S-CDPO | Certified Data Protection Officer | 3 years | |||
S-EHF | Ethical Hacking Foundation | Penetration Testing | 3 years | ||
S-EHP | Ethical Hacking Practitioner | ||||
S-SPF | Secure Programming Foundation | Software Development | |||
S-DWF | Dark Web Foundation | Threat Intelligence | |||
ISC2 | CC | Certified in CyberSecurity | General Cyber Security | 3 years (continuously) | |
CISSP | Certified Information Systems Security Professional | Management | 127,734 [3] | ||
ISSAP | Information Systems Security Architecture Professional | Security Architecture | 1,952 [4] | ||
ISSEP | Information Systems Security Engineering Professional | IT-Administration | 1,147 [4] | ||
ISSMP | Information Systems Security Management Professional | Management | 1,196 [4] | ||
SSCP | Systems Security Certified Practitioner | IT-Administration | 4,319 [4] | ||
CCSP | Certified Cloud Security Professional | Cloud Security | 3,549 [4] | ||
CGRC | Certified in Governance, Risk and Compliance | Auditing | 2,671 [4] | ||
CSSLP | Certified Secure Software Lifecycle Professional | Software Development | 2,214 [4] | ||
CompTIA | Security+ | CompTIA Security+ [5] | IT-Administration | 3 years [6] | N/A |
CySA+ | CompTIA Cyber Security Analyst | Security Analysis | |||
PenTest+ | CompTIA Pentest+ | Penetration Testing | |||
CASP+ | CompTIA Advanced Security Practitioner | General Cyber Security | |||
ISACA | CISA | Certified Information Systems Auditor | Auditing | 3 years | 115,000 [7] |
CISM | Certified Information Security Manager | Management | 27,000 [7] | ||
CRISC | Certified In Risk and Information Systems Control | Risk Management | 18,000 [7] | ||
CGEIT | Certified in the Governance of Enterprise IT | Management | 6,000 [7] | ||
CSX-F | Cyber Security Fundamentals | General Cyber Security | N/A | ||
CSX-T | Cyber Security Technical Foundations | ||||
CSX-P | Cyber Security Practitioner | ||||
CSX-A | Cyber Security Audit | Auditing | |||
CDPSE | CERTIFIED DATA PRIVACY SOLUTIONS ENGINEER | Data Privacy | |||
GIAC | GSE | Security Expert | General Cyber Security | 4 years [8] | N/A |
GSEC | Security Essentials | ||||
GCIA | Certified Intrusion Analyst | Security Analysis | |||
GISF | GIAC Information Security Fundamentals | General Cyber Security | |||
GCED | Certified Enterprise Defender | Cyber Defense | |||
GCWN | Certified Windows Security Administrator | IT-Administration | |||
GMON | Continuous Monitoring Certification | Threat Intelligence | |||
GCCC | Critical Controls Certification | Cyber Defense | |||
GCLD | Cloud Security Essentials | ||||
GDSA | Defensible Security Architecture | Security Architecture | |||
GCDA | Certified Detection Analyst | Threat Intelligence | |||
GDAT | Defending Advanced Threats | Cyber Defense | |||
GCIH | Certified Incident Handler | Incident Response | |||
GPEN | Penetration Tester | Penetration Testing | |||
GWAPT | Web Application Penetration Tester | ||||
GXPN | Exploit Researcher and Advanced Penetration Tester | ||||
GMOB | Mobile Device Security Analyst | Security Analysis | |||
GAWN | Assessing and Auditing Wireless Networks | Wireless Security | |||
GPYC | Python Coder | Software Development | |||
GCFA | Certified Forensic Analyst | Forensics | |||
GCFE | Certified Forensic Examiner | ||||
GREM | Reverse Engineering Malware | Malware Analysis | |||
GNFA | Network Forensic Analyst | Forensics | |||
GCTI | Cyber Threat Intelligence | Threat Intelligence | |||
GASF | Advanced Smartphone Forensics | Forensics | |||
GSLC | Security Leadership | Management | |||
GSNA | Systems and Network Auditor | Auditing | |||
GISP | Information Security Professional | General Cyber Security | |||
GLEG | Law of Data Security & Investigations | Forensics | |||
GCPM | Certified Project Manager | Management | |||
GSTRT | Strategic Planning, Policy, and Leadership | ||||
GWEB | Certified Web Application Defender | Software Development | |||
GICSP | Global Industrial Cyber Security Professional | Critical Infrastructure Security | |||
GRID | Response and Industrial Defense | ||||
GCIP | Critical Infrastructure Protection | ||||
GOSI | Open Source Intelligence | Threat Intelligence | |||
GBFA | Battlefield Forensics and Acquisition | Forensics | |||
GCSA | Cloud Security Automation | Cloud Security | |||
GFCT | Foundational Cybersecurity Technologies | ||||
GSOC | Security Operations Certified | Security Operations | |||
GPCS | Public Cloud Security | Cloud Security | |||
CyberDefenders | CCD | Certified CyberDefender | Cyber Defense | No expiration [9] | N/A |
EC-Council | CSCU | EC-Council Certified Secure Computer User | Security Awareness | ||
CND | EC-Council Certified Network Defender | Network Security | 3 years [10] | N/A | |
CEH | EC-Council Certified Ethical Hacker | Penetration Testing | N/A | ||
CEH-Practical (Master) | EC-Council Certified Ethical Hacker Practical (Master) | ||||
ECSA | EC-Council Certified Security Analyst | ||||
ECSA-Master (Practical) | EC-Council Certified Security Analyst (Practical) | ||||
LPT-Master (Practical) | EC-Council Licensed Penetration Tester (Master) | 1 year [Notes 3] [11] | N/A | ||
E|ISM | EC-Council Information Security Manager | Management | 3 years [10] | N/A | |
CCISO | EC-Council Certified Chief Information Security Officer | 1 year [12] | N/A | ||
ECIH | EC-Council Certified Incident Handler | Incident Response | 3 years [10] | N/A | |
CHFI | EC-Council Computer Hacking Forensic Investigator | Forensics | |||
EDRP | EC-Council Disaster Recovery Professional | Disaster Recovery | |||
ECES | EC-Council Certified Encryption Specialist | Encryption | |||
CASE Java | EC-Council Certified Application Security Engineer Java | Software Development | |||
CASE .Net | EC-Council Certified Application Security Engineer .Net | ||||
CTIA | EC-Council Certified Threat Intelligence Analyst | Threat Intelligence | |||
CSA | EC-Council Certified SOC Analyst | Security Analysis | |||
ECSS | EC-Council Certified Security Specialist | General Cyber Security | |||
CCSE | EC-Council Cloud Security Engineer | Cloud Security | |||
OffSec | OSCP | OffSec Certified Professional | Penetration Testing | No expiration [13] | N/A |
OSWP | OffSec Wireless Professional | ||||
OSWA | OffSec Web Assessor | ||||
OSEP | OffSec Experienced Penetration Tester | ||||
OSED | OffSec Security Exploit Developer | Exploit Development | |||
OSWE | OffSec Web Expert | Penetration Testing | |||
OSCE3 | OffSec Certified Expert3 | ||||
OSEE | OffSec Exploitation Expert | Exploit Development | |||
OSDA | OffSec Defensive Analyst | Security Operations | |||
OSMR | OffSec macOS Researcher | Exploit Development | |||
OSIR | OffSec Incident Responder | Incident Response | Starting with certifications new to the market in 2024, OffSec certifications will expire after 3 years. | ||
OSMR | OffSec Threat Hunter | Threat Hunting | |||
EITCI | EITCA/IS | EITCA Information Technologies Security Academy | General Cyber Security | No expiration | N/A |
CSA | CCSK | CSA Certificate of Cloud Security Knowledge | Cloud Security | ||
Cloud Credential Council | PCSM | CCC Professional Cloud Security Manager | |||
IAPP | CIPP | Certified Information Privacy Professional | Privacy | 2 years | 50,000 Total |
CIPM | Certified Information Privacy Manager | ||||
CIPT | Certified Information Privacy Technologist | ||||
INE Security | eJPT | eLearnSecurity Certified Junior Penetration Tester | Penetration Testing | No expiration | N/A |
eWPT | eLearnSecurity Web Application Penetration Tester | ||||
eWPTX | eLearnSecurity Web Application Penetration Tester eXtreme | ||||
eMAPT | eLearnSecurity Mobile Application Penetration Tester | ||||
eCPT | eLearnSecurity Certified Penetration Tester | ||||
eCIR | eLearnSecurity Certified Incident Response Professional | Incident Response | |||
eCTHP | eLearnSecurity Certified Threat Hunting Professional | Threat Hunting | |||
eCDFP | eLearnSecurity Certified Digital Forensics Professional | Digital Forensics | |||
CREST | CPSA | CREST Practitioner Security Analyst | Penetration Testing | 3 Years | N/A |
CRT | CREST Registered Penetration Tester | ||||
CCT App | CREST Certified Web Application Tester | ||||
CCT Inf | CREST Certified Infrastructure Tester | ||||
CCSAS | CREST Certified Simulated Attack Specialist | Attack Simulation | |||
CCSAM | CREST Certified Simulated Attack Manager | ||||
CCWS | CREST Certified Wireless Specialist | Wireless security | |||
CPTIA | CREST Practitioner Threat Intelligence Analyst | Threat Intelligence | |||
CRTIA | CREST Registered Threat Intelligence Analyst | ||||
CCTIM | CREST Certified Threat Intelligence Manager | ||||
CPIA | CREST Practitioner Intrusion Analyst | Security Analysis | |||
CRIA | CREST Registered Intrusion Analyst | ||||
CCNIA | CREST Certified Network Intrusion Analyst | ||||
CCHIA | CREST Certified Host Intrusion Analyst | ||||
CCMRE | CREST Certified Malware Reverse Engineer | Malware Analysis | |||
CCIM | CREST Certified Incident Manager | Incident Response | |||
CRTSA | CREST Registered Technical Security Architect | Security Architecture | |||
InfoSec Institute | CCFE | Certified Computer Forensics Examiner | Forensics | 4 years | N/A |
CCTHP | Certified Cyber Threat Hunting Professional | Threat Hunting | |||
CDRP | Certified Data Recovery Professional | Disaster Recovery | |||
CEPT | Certified Expert Penetration Tester | Penetration Testing | |||
CEREA | Certified Expert Reverse Engineering Analyst | Malware Analysis | |||
CMWAPT | Certified Mobile and Web Application Penetration Tester | Penetration Testing | |||
CMFE | Certified Mobile Forensics Examiner | Forensics | |||
CPT | Certified Penetration Tester | Penetration Testing | |||
CRTOP | Certified Red Team Operations Professional | Red Teaming | |||
CREA | Certified Reverse Engineering Analyst | Malware Analysis | |||
CSSA | Certified SCADA Security Architect | Critical Infrastructure Security | |||
CSAP | Certified Security Awareness Practitioner | Security Awareness | |||
Cyber Struggle[ notability? ] | CSAE | Cyber Struggle Aegis | Security Analysis | No expiration | N/A |
CSR | Cyber Struggle Ranger | Red Teaming | |||
CSTPO | Cyber Struggle Tactical Pistol Operator | Tactical fire gun shooting | |||
Linux Professional Institute (LPI) | SecE | Linux Professional Institute Security Essentials | General Cyber Security | No expiration [14] | N/A |
LPIC-3 Security | Linux Professional Institute LPIC-3 Security | IT-Administration | 5 years [15] | N/A | |
Mile2 | C)SA1 | Certified Security Awareness 1 | Security Awareness | 3 Years | N/A |
C)SA2 | Certified Security Awareness 2 | ||||
C)SP | Certified Security Principles | General Cyber Security | |||
C)ISSO | Certified Information Systems Security Officer | Management | |||
IS20 | Information Security 20 Security Controls | General Cyber Security | |||
C)SLO | Certified Security Leadership Officer | Management | |||
C)VA | Certified Vulnerability Assessor | Vulnerability Management | |||
C)PEH | Certified Professional Ethical Hacker | Penetration Testing | |||
C)PTE | Certified Penetration Tester | ||||
C)PTC | Certified Penetration Testing Consultant | ||||
C)PSH | Certified PowerShell Hacker | Scripting | |||
C)IHE | Certified Incident Handling Engineer | Incident Response | |||
C)DFE | Certified Digital Forensic Examiner | Forensics | |||
C)VFE | Certified Virtualization Forensics Engineer | ||||
C)NFE | Certified Network Forensics Examiner | ||||
C)DRE | Certified Disaster Recovery Engineer | Disaster Recovery | |||
C)HISSP | Certified Healthcare Information Systems Security Professional | Healthcare | |||
C)ISMS-LA | Certified Information Security Management Systems Lead Auditor | Auditing | |||
C)ISMS-LI | Certified Information Security Management Systems Lead Implementer | Risk Management | |||
C)ISSA | Certified Information Security Systems Auditor | Auditing | |||
C)SWAE | Certified Secure Web Application Engineer | Application Security | |||
C)VCP | Certified Virtualization Principles | Virtualization | |||
C)VE | Certified Virtualization Engineer | ||||
C)CSO | Certified Cloud Security Officer | Cloud Security | |||
C)VSE | Certified Virtualization Systems Engineer | Virtualization | |||
C)CSSM | Certified Cybersecurity Systems Manager | Management | |||
C)ISRM | Certified Information Systems Risk Manager | Risk Management | |||
ISCAP | Information Systems Certification & Accreditation Professional | Auditing | |||
C)SWAE | Certified Secure Web Application Engineer | Web Security | |||
C)ISS | Certified IPv6 Security Specialist | Network Security | |||
C)CSA | Certified Cybersecurity Analyst | Security Analysis | |||
C)CTA | Certified Cyber Threat Analyst | ||||
C)CTIA | Certified Cyber Threat Intelligence Analyst | Threat Intelligence | |||
ASIS International | CPP | Certified Protection Professional | Management | 3 Years | N/A |
APP | Associate Protection Professional | ||||
PCI | Professional Certified Investigator | Forensics | |||
PSP | Physical Security Professional | Physical Security | |||
SABSA | SABSA-SCF | SABSA Chartered Security Architect – Foundation Certificate | Security Architecture | 3 Years | N/A |
SABSA-SCP | SABSA Chartered Security Architect – Practitioner Certificate | ||||
SABSA-SCM | SABSA Chartered Security Architect – Master Certificate | ||||
APMG International | ISO/IEC 27001-F | ISO/IEC 27001 Foundation | Standards | No expiration | N/A |
ISO/IEC 27001-P ISO | ISO/IEC 27001 Practitioner - Information Security Officer | ||||
NCSP-F | NIST Cyber Security Professional Foundation | ||||
NCSP-P | NIST Cyber Security Professional Practiioner | ||||
EXIN | PDP-E | EXIN Privacy & Data Protection Essentials | Privacy | No expiration | N/A |
PDP-F | EXIN Privacy & Data Protection Foundation | ||||
PDP-P | EXIN Privacy and Data Protection Practitioner | ||||
CIT-F | EXIN Cyber & IT Security Foundation | General Cyber Security | |||
CEF | EXIN Ethical Hacking Foundation | Penetration Testing | |||
ISO/IEC 27001-F | EXIN Information Security Management ISO27001 Foundation | Standards | |||
ISO/IEC 27001-P | EXIN Information Security Management ISO27001 Professional | ||||
ISO/IEC 27001-E | EXIN Information Security Management ISO27001 Expert | ||||
SP-F | EXIN Secure Programming Foundation | Software Development | |||
IBITGQ | EU GDPR F | Certified EU General Data Protection Regulation Foundation | Standards | No expiration | N/A |
EU GDPR P | Certified EU General Data Protection Regulation Practitioner | ||||
C-DPO | Certified Data Protection Officer | Privacy | No expiration | N/A | |
C BS PIMS LI | Certified BS 10012 PIMS Lead Implementer | Standards | |||
CCPA F | California Consumer Privacy Act Foundation | Privacy | |||
C IDP F | Certified Introduction to Data Protection | ||||
CIS F | Certified ISO 27001 ISMS Foundation | Standards | |||
CIS LI | Certified ISO 27001 ISMS Lead Implementer | ||||
CIS LA | Certified ISO 27001 ISMS Lead Auditor | ||||
CIS IA | Certified ISO 27001 ISMS Internal Auditor | ||||
CISRM | Certified ISO 27005 ISMS Risk Management | ||||
PCI IM | PCI DSS Implementation | ||||
CCRMP | Managing Cyber Security Risk | Management | |||
CIRM F | Cyber Incident Response Management Foundation | Incident Response | |||
C CR P | Certified Cyber Resilience Practitioner | Management | |||
CITGP | Implementing IT Governance – Foundation & Principles | ||||
C CS F | Certified Cyber Security Foundation | General Cyber Security | |||
CertNexus | CFR | CyberSec First Responder | Incident Response | 3 Years | N/A |
CIOTSP | Certified IoT Security Practitioner (CIoTSP) | IoT | |||
IRBIZ | Incident Response for Business Professionals | Incident Response | |||
CSC | Cyber Secure Coder | Software Development | |||
CYBERSAFE | CyberSAFE | End user security | 1 Year | N/A | |
Lunarline | CEHT | Certified Expert Hunt Team | Threat Hunting | 3 Years | |
CECS | Certified Expert Cloud Security | Cloud Security | |||
CEIA | Certified Expert Independent Assessor | Auditing | |||
CEPM | Certified Expert Program Manager | Management | |||
CERP | Certified Expert RMF Professional | ||||
CESA | Certified Expert Security Analyst | Security Analysis | |||
McAfee Institute | CECI | Certified Expert in Cyber Investigations | Forensics | 2 Years | N/A |
CCII | Certified Cyber Intelligence Investigator | Threat Intelligence | |||
CCIP | Certified Cyber Intelligence Professional | ||||
CSMIE | Certified Social Media Intelligence Expert | ||||
SMIA | Certified Social Media Intelligence Analyst | ||||
CCTA | Certified Counterintelligence Threat Analyst | ||||
CPCI | Certified Professional Criminal Investigator | Forensics | |||
CORCI | Certified Organized Retail Crime Investigator | ||||
CEL | Certified Executive Leader | Management | |||
CHTI | Certified Human Trafficking Investigator | Forensics | |||
CCFI | Certified Cryptocurrency Forensic Investigator | ||||
WVTS | Certified Workplace violence and threat specialist | ||||
C|OSINT | Certified in Open Source Intelligence | Threat Intelligence | 2 Years | N/A | |
The IIA | CIA | Certified Internal Auditor | Auditing | 160,000+ | |
CRMA | Certification in Risk Management Assurance | Risk Management | N/A | ||
QIAL | Qualification in Internal Audit Leadership | Auditing | |||
GAQM | CSST | Certified Software Security Tester | Software Development | No expiration | N/A |
CASST | Certified Advanced Software Security Tester | ||||
CISP | Certified Information Security Professional | General Cyber Security | 5 Years | ||
CISSM | Certified Information Systems Security Manager | Management | |||
CISST | Certified Information Systems Security Tester | Security Testing | No expiration | ||
CPT | Certified Penetration Tester | Penetration Tester | |||
CFA | Certified Forensic Analyst | Forensics | |||
CPEH | Certified Professional Ethical Hacker | Penetration Tester | |||
ISO/IEC 27001-CIA | ISO 27001 ISMS Certified Internal Auditor | Auditing | |||
ISO/IEC 27001-27002-LA | ISO 27001-27002 Lead Auditor | ||||
ISO/IEC 27001-LA | ISO 27001:2013 ISMS Certified Lead Auditor | ||||
ISO/IEC 27001-F | ISO 27001:2013 ISMS Foundation | Standards | |||
ISO/IEC 27002-F | ISO 27002 Foundation | ||||
ISO/IEC 27002-LI | ISO 27002 Lead Implementer | 4 Years | |||
ISO/IEC 31000-LRM | ISO 31000 Certified Lead Risk Manager | No expiration | |||
ISECOM | OPSA | OSSTMM Professional Security Analyst | Security Analysis | No expiration | N/A |
OPST | OSSTMM Professional Security Tester | Penetration Tester | |||
OPSE | OSSTMM Professional Security Expert | General Cyber Security | |||
OWSE | OSSTMM Wireless Security Expert | Penetration Tester | |||
CTA | OSSTMM Certified Trust Analyst | Trust Management | |||
SAI | Certified Security Awareness Instructor | Cyber Security Trainer | |||
CHA | Certified Hacker Analyst | Penetration Tester | |||
CHAT | Certified Hacker Analyst Trainer | Cyber Security Trainer | |||
HISPI | HISP | Holistic Information Security Practitioner | General Cyber Security | 3 Years | N/A |
Blockchain Training Alliance | CBSP | Certified Blockchain Security Professional | Blockchain | 2 Years | N/A |
Crypto Consortium | CCSSA | CryptoCurrency Security Standard Auditor | No expiration | ||
The Open Group | OG0-041 | Open FAIR Foundation | Risk Management | ||
TOGAF9-F | TOGAF 9 Foundation | Security Architecture | |||
TOGAF9-C | TOGAF 9 Certified | ||||
TCM Security | PJPT | Practical Junior Penetration Tester | Penetration Tester | No expiration | N/A |
PNPT | Practical Network Penetration Tester | ||||
PCRP | Practical Career-Ready Professional | ||||
PMPR | Practical Malware Research Professional | Malware Analysis | |||
PORP | Practical OSINT Research Professional | Open-Source Intelligence | |||
PIPA | Practical IoT Pentest Associate | Penetration Tester | |||
PSAA | Practical SOC Analyst Associate | SOC Analysis | |||
PMPA | Practical Mobile Pentest Associate | Penetration Tester | |||
PWPA | Practical Web Pentest Associate | ||||
PWPP | Practical Web Pentest Professional | ||||
Star Certification | SCSU | Star Cyber Secure User | Security Awareness | 3 years [16] | N/A |
EHE | Star Certified Ethical Hacking Expert | Penetration Testing | |||
SESS | Star Expert Security Specialist | ||||
SMFAS | Star Mobile Forensic and Advance Security | Forensics | |||
SPTE | Star Penetration Tester Experts [17] | Penetration Testing | |||
SSCA | Star Secure Cyber Analytics | ||||
SFICH-007 | Star Forensic investigator in Computer Hacking-007 | Forensics | |||
SSPE.Net | Star Secure Programmer Expert- .Net | Software Development | |||
SSPE-Java | Star Secure Programmer Expert- Java | ||||
SSPE-Android | Star Secure Programmer Expert- Android | ||||
SSPE-PHP | Star Secure Programmer Expert- PHP | ||||
Zero-Point Security | CRTO | Certified Red Team Operator | Red Teaming | No expiration | N/A |
CRTL | Certified Red Team Lead | ||||
EC First | CCSA | Certified Cyber Security Architect | Security Architecture | 3 years | |
CSCS | Certified Security Compliance Specialist | Risk/Compliance | |||
CMMP | Certified CMMC Professional | Standards | |||
8kSec | OMSE | Certified Offensive Mobile Security Expert | Vulnerability Research | No expiration [18] | |
CMSE | Certified Mobile Security Engineer | Application Security | |||
CISR | Certified iOS Security Researcher | Vulnerability Research | |||
CASR | Certified Android Security Researcher | Vulnerability Research | |||
CWNP | CWS | Certified Wireless Specialist | Wireless Security | ||
Hack The Box (HTB) | CBBH | Certified Bug Bounty Hunter | Bug Hunting | No expiration | |
CPTS | Certified Penetration Testing Specialist | Penetration Testing | |||
CDSA | Certified Defensive Security Analyst | Security Analyst | |||
CWEE | Certified Web Exploitation Expert | Penetration Testing | |||
CAPE | Certified Active Directory Pentesting Expert | ||||
TryHackMe | SAL1 | Security Analyst Level 1 | Security Analysis | 3 years | N/A |
Issuing Organization | Credential Abbreviation | Certification Title | Focus | Validity duration | Number issued |
---|---|---|---|---|---|
Cisco | CCNA Security | Cisco Certified Network Associate - Security | Network Security | 3 years [19] | |
CCNA CyberOps | Cisco Certified Network Associate - CyberOps | ||||
CCNP Security | Cisco Certified Network Professional - Security | ||||
CCIE Security | Cisco Certified Internetwork Expert - Security | 2062 [20] | |||
Check Point | CCSA | Check Point Certified Security Administrator | |||
CCSE | Check Point Certified Security Expert | ||||
Kali | KLCP | Kali Linux Certified Professional | Penetration Testing | No expiration | N/A |
IBM | - | IBM Certified Deployment Professional - Security Access Manager V9.0 | Access Control | ||
- | IBM Certified Associate Administrator - Security Guardium Data Protection V10.1.2 | Data Protection | |||
- | IBM Certified Administrator - Security Guardium V10.0 | ||||
- | IBM Certified Deployment Professional - Identity Governance and Intelligence V5.2 | Access Control | |||
- | IBM Certified Analyst - i2 Analysts Notebook V9 | Threat Intelligence | |||
- | IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2 | ||||
- | IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2 | ||||
- | IBM Certified Associate Administrator - IBM QRadar SIEM V7.3.2 | ||||
- | IBM Certified Deployment Professional - IBM QRadar SIEM V7.3.2 | ||||
- | IBM Certified Deployment Professional - Security Identity Governance and Intelligence V5.2.5 | Access Control | |||
Microsoft | AZ-500 | Microsoft Certified: Azure Security Engineer Associate | Cloud Security | 1 year * [21] | |
MS-500 | Microsoft 365 Certified: Security Administrator Associate | ||||
SC-100 | Microsoft Certified: Cybersecurity Architect Expert | Security Architect | |||
SC-200 | Microsoft Certified: Security Operations Analyst Associate | SIEM | |||
SC-300 | Microsoft Certified: Identity and Access Administrator Associate | IAM | |||
SC-400 | Microsoft Information Protection Administrator | Risk/Compliance | |||
SC-900 | Microsoft Certified: Security, Compliance, and Identity Fundamentals | Fundamentals | No expiration [22] | ||
AWS | - | AWS Certified Security - Specialty | Cloud Security | ||
- | Google Professional Cloud Security Engineer | ||||
Jamf | JCESA | Jamf Certified Endpoint Security Admin | macOS Security | ||
Alibaba | ACA | ACA Cloud Security Certification | Cloud Security | ||
ACP | ACP Cloud Security Certification | ||||
ACE | ACE Cloud Security Expert | ||||
Red hat | EX415 | Red Hat Certified Specialist in Security: Linux | IT-Administration | ||
EX425 | Red Hat Certified Specialist in Security: Containers and OpenShift Container | ||||
OpenText | EnCE | EnCase Certified Examiner | Forensics | ||
EnCEP | EnCase Certified eDiscovery Practitioner | ||||
CFSR | EnCase Certified Forensic Security Responder | ||||
Fortinet | NSE 1/2/3 | Network Security Professional Associate | vendor-specific products | 2 years [23] | |
NSE 4 | Network Security Professional | Firewalls | |||
NSE 5 | Network Security Analyst | administration | |||
NSE 6 | Network Security Specialist | vendor-specific products | |||
NSE 7 | Network Security Architect | Firewalls | |||
NSE 8 | Network Security Expert | ||||
Juniper | JNCIA-SEC | Juniper Networks Certified Associate | Network Security | 3 years | |
JNCIS-SEC | Juniper Networks Certified Specialist | ||||
JNCIP-SEC | Juniper Networks Certified Professional | ||||
JNCIE-SEC | Juniper Networks Certified Expert | ||||
JNCDS-SEC | Juniper Networks Certified Design Specialist Security | ||||
Palo Alto | PCNSA | Palo Alto Networks Certified Network Security Administrator | |||
PCNSE | Palo Alto Networks Certified Network Security Engineer | ||||
PCCET | Palo Alto Networks Certified Cybersecurity Entry-level Technician | General Cyber Security | |||
PCDRA | Palo Alto Networks Certified Detection and Remediation Analyst | Network Security | |||
PCCSE | Palo Alto Networks Prisma Certified Cloud Security Engineer | Cloud Security | |||
PCSAE | Palo Alto Networks Certified Security Automation Engineer | Threat Intelligence | |||
Symantec, (since 2015 NortonLifeLock ) | 250-215 | Administration of Symantec Messaging Gateway 10.6 | Network Security | ||
250-420 | Administration of Symantec VIP (March 2017) | ||||
250-426 | Administration of Symantec Data Center Security - Server Advanced 6.7 | ||||
250-428 | Administration of Symantec Endpoint Protection 14 | ||||
250-430 | Administration of Blue Coat ProxySG 6.6 | ||||
250-433 | Administration of Blue Coat Security Analytics 7.2 | ||||
250-438 | Administration of Symantec Data Loss Prevention 15* | ||||
250-440 | Administration of Symantec PacketShaper 11.9.1* | ||||
250-441 | Administration of Symantec Advanced Threat Protection 3.0* | ||||
251/250-443 | Administration of Symantec CloudSOC - R2* | ||||
250-444 | Administration of Symantec Secure Sockets Layer Visibility 5.0* | ||||
250-445 | Administration of Symantec Email Security.cloud - v1* | ||||
251/250-446 | Administration of Symantec Web Security Service (WSS) - R1* | ||||
251/250-447 | Administration of Symantec Client Management Suite 8.5* | ||||
251/250-551 | Administration of Symantec Endpoint Detection and Response 4.1* | ||||
250-556 | Administration of Symantec ProxySG 6.7* |
Microsoft 1 year *: you have to do a free refresh exam within 180 days before expiration. if not done, the certificate expire otherwise it extends by 1 year.