In the
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
or
Information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
fields, there are a number of tracks a professional can take to demonstrate qualifications.
[This article is about the certification and credentialing of individuals. It does not include certification of organizations or classified computer systems by authorizing, accrediting, and approval bodies and authorities as meeting a prescribed set of safeguards.] Four sources categorizing these, and many other credentials, licenses, and
certifications, are:
# Schools and universities
# Vendor-sponsored credentials (e.g. Microsoft, Cisco)
# Association- and organization-sponsored credentials
# Governmental (or quasi-governmental) licenses, certifications, and credentials
Quality and acceptance vary worldwide for IT security credentials, from well-known and high-quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser-known credentials and organizations.
In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry-sponsored competitions, including team competitions and contests.
Certifying organizations
Vendor-neutral
* Altered Security
* ASIS International
* APMG International
* Blockchain Council
* Blockchain Training Alliance
* Cloud Credential Council (CCC)
* CertNexus
* CERTCOP
*
CompTIA
* CREST
* Crypto Consortium
* Cloud Security Alliance (CSA)
* CWNP
* CyberDefenders
* Cyber Struggle
*
EC Council
*
EITCA/IS
* INE Security
*
EXIN
* GAQM
*
GIAC
* HISPI
*
InfoSec Institute
* IBITGQ
* TCM Security
*
The IIA
*
IAPP
*
ISACA
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.
* ISECOM
*
ISC2
International Information System Security Certification Consortium, or ISC2, is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the “world's largest IT secur ...
* Linux Professional Institute (LPI)
* Lunarline
*
McAfee Institute
*
Mile2
*
Offensive Security
* PECB
*
The Open Group
The Open Group is a global consortium that seeks to "enable the achievement of business objectives" by developing " open, vendor-neutral technology standards and certifications." It has 900+ member organizations and provides a number of services ...
* The SecOps Group
* SECO-Institute
*
SABSA
* Star Certification
* Zero-Point Security
* EC First
* 8kSec
* Hack The Box (HTB)
* TryHackMe (THM)
* CyberWarfareLabs (CWL)
*
CNITSEC
Vendor-specific
*
Alibaba (Cloud)
*
AWS
*
Cisco
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, s ...
*
Check Point
*
Fortinet
*
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
*
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
*
Jamf
*
Juniper
Junipers are coniferous trees and shrubs in the genus ''Juniperus'' ( ) of the cypress family Cupressaceae. Depending on the taxonomy, between 50 and 67 species of junipers are widely distributed throughout the Northern Hemisphere as far south ...
*
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
*
Kali
Kali (; , ), also called Kalika, is a major goddess in Hinduism, primarily associated with time, death and destruction. Kali is also connected with transcendental knowledge and is the first of the ten Mahavidyas, a group of goddesses who p ...
*
OpenText
*
Palo Alto
Palo Alto ( ; Spanish language, Spanish for ) is a charter city in northwestern Santa Clara County, California, United States, in the San Francisco Bay Area, named after a Sequoia sempervirens, coastal redwood tree known as El Palo Alto.
Th ...
*
Red Hat
Red Hat, Inc. (formerly Red Hat Software, Inc.) is an American software company that provides open source software products to enterprises and is a subsidiary of IBM. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North ...
* Symantec (since 2012
NortonLifeLock
Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock Inc.) is a multinational software company co-headquartered in both Prague, Czech Republic (European Union, EU) and Tempe, Arizona (United States, USA). The company provides comp ...
)
List of certifications
Vendor-neutral
Vendor-specific
[In this chart, colors are used to help group certifications from the same issuer together and have no other significance.]
Microsoft 1 year *: you have to do a free refresh exam within 180 days before expiration. if not done, the certificate expire otherwise it extends by 1 year.
See also
*
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
*
Information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
*
Tech ed
Notes
References
{{Computer security
01
computer security certifications
computer security certifications
computer security certifications