Certifications

High-Level Certifications

(ISC)2

www.isc2.org

About (ISC)2

Headquartered in the United States

offices in

London

Hong Kong

Tokyo

compendium

Associate of (ISC)2

This designation was created for individuals who do not meet the experience requirements to obtain any of the other certifications with (ISC)2

employer that the associates have the knowledge to obtain the certifications, even if they don’t have the experience

SSCP [(ISC)2]

Access Controls

Analysis and Monitoring

Cryptography SSCP

Malicious Code

Networks and Telecommunications

Risk, Response, and Recovery

Security Operations and Administration

Certification and Accreditation Professional (CAP)

Understanding the Purpose of Certification

Initiation of the System Authorization Process

Certification Phase

Accreditation Phase

Continuous Monitoring Phase

Certified Secure Software Lifecycle Professional (CSSLP) [(ISC)2]

Secure Software Concepts

Secure Software Requirements

Secure Software Design

Secure Software Implementation/Coding

Secure Software Testing

Software Acceptance

Software Deployment, Operations, Maintenance, and Disposal

CISSP [(ISC)2]

Access Control

Application Security

Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

Cryptography

Information Security and Risk Management

Legal, Regulations, Compliance, and Investigations

Operations Security

Physical (Environmental) Security

Security Architecture and Design

Telecommunications and Network Security

CISSP-ISSAP [(ISC)2]

Access Control Systems and Methodology

Cryptography

Physical Security Integration

Requirements Analysis and Security Standards, Guidelines and Criteria

Technology-Related BCP and DRP

Telecommunications and Network Security

CISSP-ISSEP [(ISC)2]

C&A

Systems Security Engineering

Technical Management

U.S. Government Information Assurance Regulations

CISSP-ISSMP [(ISC)2]

BCP and DRP and Continuity of Operations Planning

Enterprise Security Management Practices

Enterprise-wide System Development Security

Law, Investigations, Forensics, and Ethics

Overseeing Compliance of Operations Security

Information Systems Audit and Control Association

Certified Information Systems Auditor

Certified Information Security Manager

Global Information Assurance Certification

GIAC Security Leadership Certification

GIAC Security Expert

CompTIA

Security +

Network security

Compliance and operational security

Threats and vulnerabilities

Application, data, and host security

Access control and identity management

Cryptography

Project Management Institute

Project Management Professional (PMP)

Initiation

Planning

Executing

Monitoring and Controlling

Closing

Dynamic Systems Development Method Consortium

Skill- and Vendor-Specific Certifications

Cisco

Cisco Certified Network Associate Security

Cisco Certified Network Professional Security

Cisco Certified Internetwork Expert

Global Information Assurance Certification

GIAC Information Security Fundamentals

GIAC Security Essentials Certification

GIAC Web Application Penetration Tester (GWAPT)

GIAC Certified Enterprise Defender (GCED)

GIAC Certified Firewall Analyst (GCFW)

GIAC Certified Intrusion Analyst (GCIA)

GIAC Certified Incident Handler (GCIH)

GIAC Certified Windows Security Administrator (GCWN)

GIAC Certified UNIX Security Administrator (GCUX)

GIAC Certified Forensics Analyst (GCFA)

GIAC Certified Penetration Tester (GPEN

Check Point

Check Point Certified Security Administrator

Check Point Certified Security Expert

Check Point Certified Managed Security Expert

Check Point Certified Master Architect (CCMA)

Juniper Networks

JNCIA-Junos (Juniper Networks)

Juniper systems certifications JNCIS-SEC

JNCIE-SEC

Oracle

results matching ""

    No results matching ""