In the
computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
or
Information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthori ...
fields, there are a number of tracks a professional can take to demonstrate qualifications. Four sources categorizing these, and many other credentials, licenses, and certifications, are:
# Schools and universities
# Vendor-sponsored credentials (e.g. Microsoft, Cisco)
# Association- and organization-sponsored credentials
# Governmental (or quasi-governmental) licenses, certifications, and credentials
Quality and acceptance vary worldwide for IT security credentials, from well-known and high-quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser-known credentials and organizations.
In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry-sponsored competitions, including team competitions and contests.
Scope note: This article is about the certification and credentialing of individuals. It does not include certification of organizations or classified computer systems by authorizing, accrediting, and approval bodies and authorities as meeting a prescribed set of safeguards.
Certifying organizations
Vendor-neutral
* ASIS International
* APMG International
* Blockchain Council
* Blockchain Training Alliance
* CCC
* CertificationPoint (SAC)
* CertNexus
*
CompTIA
* CREST
* Crypto Consortium
* Cloud Security Alliance (CSA)
* Cyber Struggle
* EC Council
*
EITCA/IS
*
eLearnSecurity
*
EXIN
* GAQM
*
GIAC
* HISPI
* IACRB
* IBITGQ
* TCM Security
*
The IIA
*
IAPP
*
ISACA
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.
* ISECOM
*
ISC2 #REDIRECT ISC
{{redirect category shell, {{R from other capitalisation{{R from ambiguous page ...
* Lunarline
*
McAfee Institute
McAfee Institute is a professional training website focused on the intelligence and investigative sectors. It was founded in 2010 by Joshua McAfee.
The online service advertises instruction related to topics such as cryptocurrency investigations ...
*
Mile2
*
Offensive Security
Offensive Security is an American international company working in information security, penetration testing and digital forensics. Operating from around 2007, the company created open source projects, advanced security courses, the ExploitDB ...
*
The Open Group
The Open Group is a global consortium that seeks to "enable the achievement of business objectives" by developing "open, vendor-neutral technology standards and certifications." It has over 840 member organizations and provides a number of servi ...
* Pentester Academy
* SECO-Institute
*
SABSA
* Star Certification
* Zero-Point Security
* EC First
Vendor-specific
*
Alibaba
Ali Baba is a character from the folk tale ''Ali Baba and the Forty Thieves''.
Ali Baba or Alibaba may also refer to:
Films
* ''Ali Baba and the Forty Thieves'' (1902 film), a French film directed by Ferdinand Zecca
* ''Ali Baba'' (1940 film ...
(Cloud)
*
AWS
Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis. These cloud computing web services provide di ...
*
Cisco
Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
*
Check Point
Check Point is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security ma ...
*
Fortinet
Fortinet is an American multinational corporation headquartered in Sunnyvale, California. The company develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint secu ...
*
Google
Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
*
IBM
*
Jamf
Jamf is a software company best known for developing Jamf Pro (formerly The Casper Suite), a mobile device management system.
History
Minneapolis-based Jamf Software was founded in Eau Claire, Wisconsin, by Zach Halmstad, Christopher Thon an ...
*
Juniper
Junipers are coniferous trees and shrubs in the genus ''Juniperus'' () of the cypress family Cupressaceae. Depending on the taxonomy, between 50 and 67 species of junipers are widely distributed throughout the Northern Hemisphere, from the Arcti ...
*
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
*
Kali
Kali (; sa, काली, ), also referred to as Mahakali, Bhadrakali, and Kalika ( sa, कालिका), is a Hindu goddess who is considered to be the goddess of ultimate power, time, destruction and change in Shaktism. In this trad ...
*
OpenText
OpenText Corporation (also written ''opentext'') is a Canadian company that develops and sells enterprise information management (EIM) software.
OpenText, headquartered in Waterloo, Ontario, Canada, is Canada's fourth-largest software company ...
*
Palo Alto
Palo Alto (; Spanish for "tall stick") is a charter city in the northwestern corner of Santa Clara County, California, United States, in the San Francisco Bay Area, named after a coastal redwood tree known as El Palo Alto.
The city was es ...
*
Redhat
* Symantec, (since 2015
NortonLifeLock
Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock) is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 50 ...
)
List of certifications
Vendor-neutral
Vendor-specific[In this chart, colors are used to help group certifications from the same issuer together and have no other significance.]
See also
*
Computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
*
Information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthori ...
Notes
References
External links
{{Computer Security Certifications
01
computer security certifications
computer security certifications
computer security certifications