List of Computer Security Certifications

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Lua error in package.lua at line 80: module 'strict' not found. Lua error in package.lua at line 80: module 'strict' not found.

Credentialing is the process of establishing the qualifications of licensed professionals, organizational members or organizations, and assessing their background and legitimacy.

In the Computer security or Information security fields, there are a number of tracks a professional can take to demonstrate qualifications. Four sources categorizing these, and many other credentials, licenses and certifications, are: 1. Schools and Universities; 2. "Vendor" sponsored credentials (e.g. Microsoft, Cisco); 3. Association and Organization sponsored credentials; 4. Governmental (or quasi governmental) body sponsored licenses, certifications and credentials.

Quality and acceptance vary worldwide for IT security credentials, from well-known and high quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser known credentials and organizations.

In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry sponsored competitions, including team competitions and contests.

Scope note: This article is about the certification and credentialing of individuals. It does not include certification of organizations or classified computer systems by authorizing, accrediting and approval bodies and authorities as meeting a prescribed set of safeguards.

Tables

Credential Abbreviation Full Name Issuing Body Link
CISSP Certified Information Systems Security Professional (ISC)² *Official website
SSCP Systems Security Certified Practitioner (ISC)² *Official website
CAP Certified Authorization Professional (ISC)² *Official website
CSSLP Certified Secure Software Lifecycle Professional (ISC)² *Official website
CCFP Certified Cyber Forensics Professional (ISC)² *Official website
CCSP Certified Cloud Security Professional (ISC)² *Official website
HCISSP HealthCare Information Security and Privacy Practitioner (ISC)² *Official website
CHSE Certified HIPAA Security Expert Supremus Group *Official website
CHPSE Certified HIPAA Privacy Security Expert Supremus Group *Official website
CASP CompTIA Advanced Security Practitioner CompTIA *Official website
Security+ CompTIA Security+ CompTIA *Official website
CISA Certified Information Systems Auditor ISACA *Official website
CISM Certified Information Security Manager ISACA *Official website
CRISC Certified In Risk and Information Systems Control ISACA *Official website
GISF GIAC Information Security Fundamentals GIAC *Official website
GSEC GIAC Security Essentials Certification GIAC *Official website
GISP GIAC Information Security Professional GIAC *Official website
GCFE GIAC Certified Forensics Examiner GIAC *Official website
GPPA GIAC Certified Perimeter Protection Analyst GIAC *Official website
GCIA GIAC Certified Intrusion Analyst GIAC *Official website
GCIH GIAC Certified Incident Handler GIAC *Official website
GCUX GIAC Certified Unix Security Administrator GIAC *Official website
GCWN GIAC Certified Windows Security Administrator GIAC *Official website
GCED GIAC Certified Enterprise Defender GIAC *Official website
GPEN GIAC Certified Penetration Tester GIAC *Official website
GWAPT GIAC Certified Web Application Penetration Tester GIAC *Official website
GSLC GIAC Security Leadership GIAC *Official website
GCPM GIAC Certified Project Manager GIAC *Official website
GSSP-NET GIAC Secure Software Programmer - .NET GIAC *Official website
GSSP-JAVA GIAC Secure Software Programmer - Java GIAC *Official website
GSNA GIAC Systems and Network Auditor GIAC *Official website
GCFA GIAC Certified Forensic Analyst GIAC *Official website
GLEG GIAC Law of Data Security & Investigations GIAC *Official website
GAWN GIAC Assessing Wireless Networks GIAC *Official website
GXPN GIAC Exploit Researcher and Advanced Penetration Tester GIAC *Official website
GREM GIAC Reverse Engineering Malware GIAC *Official website
GSE GIAC Security Expert GIAC *Official website
C)PTE Certified Penetration Testing Engineer Mile2 *Official website
OSCP Offensive Security Certified Professional Offensive Security *Official website
OSWP Offensive Security Wireless Professional Offensive Security *Official website
OSCE Offensive Security Certified Expert Offensive Security *Official website
OSEE Offensive Security Exploitation Expert Offensive Security *Official website
OSWE Offensive Security Web Expert Offensive Security *Official website
CEH Certified Ethical Hacker EC-Council *Official website
ECSA EC-Council’s Certified Security Analyst EC-Council *Official website
LPT Licensed Penetration Tester EC-Council *Official website
CHFI Certified Hacking Forensic Investigator EC-Council *Official website
ECIH EC-Council Certified Incident Handler EC-Council *Official website
ENSA EC-Council Network Security Administrator EC-Council *Official website
CCISO Certified Chief Information Security Officer EC-Council *Official website
EDRP EC-Council Disaster Recovery Professional EC-Council *Official website
ECVP EC-Council Certified VoIP Professional EC-Council *Official website
ECES EC-Council Certified Encryption Specialist EC-Council *Official website
ECCSP EC-Council Certified Secure Programmer EC-Council *Official website
EITCA/IS EITCA Information Technogies Security Academy EITCI *Official website

See also

References

External links