Certifications
High-Level Certifications
(ISC)2
www.isc2.org
About (ISC)2
Headquartered in the United States
offices in
London
Hong Kong
Tokyo
compendium
Associate of (ISC)2
This designation was created for individuals who do not meet the experience requirements to obtain any of the other certifications with (ISC)2
employer that the associates have the knowledge to obtain the certifications, even if they don’t have the experience
SSCP [(ISC)2]
Access Controls
Analysis and Monitoring
Cryptography SSCP
Malicious Code
Networks and Telecommunications
Risk, Response, and Recovery
Security Operations and Administration
Certification and Accreditation Professional (CAP)
Understanding the Purpose of Certification
Initiation of the System Authorization Process
Certification Phase
Accreditation Phase
Continuous Monitoring Phase
Certified Secure Software Lifecycle Professional (CSSLP) [(ISC)2]
Secure Software Concepts
Secure Software Requirements
Secure Software Design
Secure Software Implementation/Coding
Secure Software Testing
Software Acceptance
Software Deployment, Operations, Maintenance, and Disposal
CISSP [(ISC)2]
Access Control
Application Security
Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
Cryptography
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Operations Security
Physical (Environmental) Security
Security Architecture and Design
Telecommunications and Network Security
CISSP-ISSAP [(ISC)2]
Access Control Systems and Methodology
Cryptography
Physical Security Integration
Requirements Analysis and Security Standards, Guidelines and Criteria
Technology-Related BCP and DRP
Telecommunications and Network Security
CISSP-ISSEP [(ISC)2]
C&A
Systems Security Engineering
Technical Management
U.S. Government Information Assurance Regulations
CISSP-ISSMP [(ISC)2]
BCP and DRP and Continuity of Operations Planning
Enterprise Security Management Practices
Enterprise-wide System Development Security
Law, Investigations, Forensics, and Ethics
Overseeing Compliance of Operations Security
Information Systems Audit and Control Association
Certified Information Systems Auditor
Certified Information Security Manager
Global Information Assurance Certification
GIAC Security Leadership Certification
GIAC Security Expert
CompTIA
Security +
Network security
Compliance and operational security
Threats and vulnerabilities
Application, data, and host security
Access control and identity management
Cryptography
Project Management Institute
Project Management Professional (PMP)
Initiation
Planning
Executing
Monitoring and Controlling
Closing
Dynamic Systems Development Method Consortium
Skill- and Vendor-Specific Certifications
Cisco
Cisco Certified Network Associate Security
Cisco Certified Network Professional Security
Cisco Certified Internetwork Expert
Global Information Assurance Certification
GIAC Information Security Fundamentals
GIAC Security Essentials Certification
GIAC Web Application Penetration Tester (GWAPT)
GIAC Certified Enterprise Defender (GCED)
GIAC Certified Firewall Analyst (GCFW)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Windows Security Administrator (GCWN)
GIAC Certified UNIX Security Administrator (GCUX)
GIAC Certified Forensics Analyst (GCFA)
GIAC Certified Penetration Tester (GPEN
Check Point
Check Point Certified Security Administrator
Check Point Certified Security Expert
Check Point Certified Managed Security Expert
Check Point Certified Master Architect (CCMA)
Juniper Networks
JNCIA-Junos (Juniper Networks)
Juniper systems certifications JNCIS-SEC
JNCIE-SEC