List Of Computer Security Certifications
   HOME

TheInfoList



OR:

In the
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
or
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
fields, there are a number of tracks a professional can take to demonstrate qualifications. Four sources categorizing these, and many other credentials, licenses, and certifications, are: # Schools and universities # Vendor-sponsored credentials (e.g. Microsoft, Cisco) # Association- and organization-sponsored credentials # Governmental (or quasi-governmental) licenses, certifications, and credentials Quality and acceptance vary worldwide for IT security credentials, from well-known and high-quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser-known credentials and organizations. In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry-sponsored competitions, including team competitions and contests. Scope note: This article is about the certification and credentialing of individuals. It does not include certification of organizations or classified computer systems by authorizing, accrediting, and approval bodies and authorities as meeting a prescribed set of safeguards.


Certifying organizations


Vendor-neutral

* ASIS International * APMG International * Blockchain Council * Blockchain Training Alliance * CCC * CertificationPoint (SAC) * CertNexus *
CompTIA The Computing Technology Industry Association (CompTIA) is an American non-profit trade association that issues professional certifications for the information technology (IT) industry. It is considered one of the IT industry's top trade associ ...
* CREST * Crypto Consortium * Cloud Security Alliance (CSA) * Cyber Struggle * EC Council * EITCA/IS * eLearnSecurity * EXIN * GAQM * GIAC * HISPI * IACRB * IBITGQ * TCM Security * The IIA * IAPP *
ISACA ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.
* ISECOM *
ISC2 #REDIRECT ISC #REDIRECT ISC {{redirect category shell, {{R from other capitalisation{{R from ambiguous page ...
{{redirect category shell, {{R from other capitalisation{{R from ambiguous page ...
* Lunarline *
McAfee Institute McAfee Institute is a professional training website focused on the intelligence and investigative sectors. It was founded in 2010 by Joshua McAfee. The online service advertises instruction related to topics such as cryptocurrency investigations ...
* Mile2 *
Offensive Security Offensive Security is an American international company working in information security, penetration testing and digital forensics. Operating from around 2007, the company created open source projects, advanced security courses, the ExploitDB v ...
*
The Open Group The Open Group is a global consortium that seeks to "enable the achievement of business objectives" by developing "open, vendor-neutral technology standards and certifications." It has over 840 member organizations and provides a number of servi ...
* Pentester Academy * SECO-Institute * SABSA * Star Certification * Zero-Point Security * EC First


Vendor-specific

*
Alibaba Ali Baba (character), Ali Baba is a character from the folk tale ''Ali Baba and the Forty Thieves''. Ali Baba or Alibaba may also refer to: Films * Ali Baba and the Forty Thieves (1902 film), ''Ali Baba and the Forty Thieves'' (1902 film), a F ...
(Cloud) * AWS *
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
* Check Point *
Fortinet Fortinet is an American multinational corporation headquartered in Sunnyvale, California. The company develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint secur ...
*
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
* IBM *
Jamf Jamf is a software company best known for developing Jamf Pro (formerly The Casper Suite), a mobile device management system. History Minneapolis-based Jamf Software was founded in Eau Claire, Wisconsin, by Zach Halmstad, Christopher Thon and ...
*
Juniper Junipers are coniferous trees and shrubs in the genus ''Juniperus'' () of the cypress family Cupressaceae. Depending on the taxonomy, between 50 and 67 species of junipers are widely distributed throughout the Northern Hemisphere, from the Arcti ...
*
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
*
Kali Kali (; sa, काली, ), also referred to as Mahakali, Bhadrakali, and Kalika ( sa, कालिका), is a Hinduism, Hindu goddess who is considered to be the goddess of ultimate power, time, destruction and change in Shaktism. In t ...
*
OpenText OpenText Corporation (also written ''opentext'') is a Canadian company that develops and sells enterprise information management (EIM) software. OpenText, headquartered in Waterloo, Ontario, Canada, is Canada's fourth-largest software company ...
*
Palo Alto Palo Alto (; Spanish for "tall stick") is a charter city in the northwestern corner of Santa Clara County, California, United States, in the San Francisco Bay Area, named after a coastal redwood tree known as El Palo Alto. The city was estab ...
* Redhat * Symantec, (since 2015
NortonLifeLock Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock) is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 50 ...
)


List of certifications


Vendor-neutral


Vendor-specificIn this chart, colors are used to help group certifications from the same issuer together and have no other significance.


See also

*
Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
*
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...


Notes


References


External links

{{Computer Security Certifications 01 computer security certifications computer security certifications computer security certifications