mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 02:43:02 +00:00
Merge pull request #186 from gds-domingues/master
Cybersecurity Certifications
This commit is contained in:
commit
c40c505f8f
1 changed files with 355 additions and 0 deletions
355
certifications/cybersec_certifications.md
Normal file
355
certifications/cybersec_certifications.md
Normal file
|
@ -0,0 +1,355 @@
|
||||||
|
|Company|Abbreviation|Title|Focus|Validity duration|
|
||||||
|
|---|---|---|---|---|
|
||||||
|
|[**Altered Security**](https://www.alteredsecurity.com/)|[**CRTE**](https://www.alteredsecurity.com/redteamlab)|Certified Red Team Expert|Red Teaming|3 years|
|
||||||
|
|'|[**CRTM**](https://www.alteredsecurity.com/gcb)|Certified Red Team Master|Red Teaming|3 years|
|
||||||
|
|'|[**CARTP**](https://www.alteredsecurity.com/azureadlab)|Certified Azure Red Team Professional|Red Teaming|3 years|
|
||||||
|
|'|[**CAWASP**](https://www.alteredsecurity.com/azureappsec)|Certified Azure Web Application Security Professional|Application Security|3 years|
|
||||||
|
|[**SECO**](https://www.seco-institute.org/)|[**S-ITSF**](https://www.seco-institute.org/certifications/it-security-track/foundation/)|IT-Security Foundation|General Cyber Security|3 years|
|
||||||
|
|'|[**S-ITSP**](https://www.seco-institute.org/certifications/it-security-certification-track/it-security-practitioner-certification/)|IT-Security Practitioner|General Cyber Security|3 years|
|
||||||
|
|'|[**S-ITSE**](https://www.seco-institute.org/certifications/it-security-track/)|IT-Security Expert|General Cyber Security|3 years|
|
||||||
|
|'|[**S-CITSO**](https://www.seco-institute.org/certifications/it-security-track/certified-officer/)|Certified IT-Security Officer|General Cyber Security|3 years|
|
||||||
|
|'|[**S-DPF**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-foundation-certification/)|Data Protection Foundation|Privacy|_No expiration_|
|
||||||
|
|'|[**S-DPP**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-practitioner-certification/)|Data Protection Practitioner|Privacy|1 year|
|
||||||
|
|'|[**S-CDPO**](https://www.seco-institute.org/certifications/certified-data-proctection-officer-cdpo/)|Certified Data Protection Officer|Privacy|3 years|
|
||||||
|
|'|[**S-EHF**](https://www.seco-institute.org/certifications/ethical-hacking-certification-track/ethical-hacking-foundation-certification/)|Ethical Hacking Foundation|Penetration Testing|3 years|
|
||||||
|
|'|[**S-EHP**](https://www.seco-institute.org/certifications/ethical-hacking-track/practitioner/)|Ethical Hacking Practitioner|Penetration Testing|3 years|
|
||||||
|
|'|[**S-SPF**](https://www.seco-institute.org/certifications/secure-software-certification-track/secure-programming-foundation-certification/)|Secure Programming Foundation|Software Development|3 years|
|
||||||
|
|'|[**S-DWF**](https://www.seco-institute.org/certifications/dark-web-foundation-certification/)|Dark Web Foundation|Threat Intelligence|3 years|
|
||||||
|
|[(ISC)2](https://www.isc2.org/)|[**CC**](https://www.isc2.org/certifications/cc)|Certified in CyberSecurity|IT-Administration|3 years|
|
||||||
|
|'|[**CISSP**](https://www.isc2.org/certifications/cissp)|Certified Information Systems Security Professional|Management|3 years|
|
||||||
|
|'|[**CISSP-ISSAP**](https://www.isc2.org/certifications/issap)|Information Systems Security Architecture Professional|Security Architecture|3 years|
|
||||||
|
|'|[**CISSP-ISSEP**](https://www.isc2.org/certifications/issep)|Information Systems Security Engineering Professional|IT-Administration|3 years)|
|
||||||
|
|'|[**CISSP-ISSMP**](https://www.isc2.org/certifications/issmp)|Information Systems Security Management Professional|Management|3 years)|
|
||||||
|
|'|[**SSCP**](https://www.isc2.org/certifications/sscp)|Systems Security Certified Practitioner|IT-Administration|3 years|
|
||||||
|
|'|[**CCSP**](https://www.isc2.org/certifications/ccsp)|Certified Cloud Security Professional|Cloud Security|3 years|
|
||||||
|
|'|[**CAP**](https://www.isc2.org/certifications/cgrc)|Certified Authorization Professional|Auditing|3 years|
|
||||||
|
|'|[**CSSLP**](https://www.isc2.org/certifications/csslp)|Certified Secure Software Lifecycle Professional|Software Development|3 years|
|
||||||
|
|[CompTIA](https://www.comptia.org/)|[**Security+**](https://www.comptia.org/certifications/security)|CompTIA Security+|IT-Administration|3 years|
|
||||||
|
|'|[**CySA+**](https://www.comptia.org/certifications/cybersecurity-analyst)|CompTIA Cyber Security Analyst|Security Analysis|3 years|
|
||||||
|
|'|[**PenTest+**](https://www.comptia.org/certifications/pentest)|CompTIA Pentest+|Penetration Testing|3 years|
|
||||||
|
|'|[**CASP+**](https://www.comptia.org/certifications/comptia-advanced-security-practitioner)|CompTIA Advanced Security Practitioner|General Cyber Security|3 years|
|
||||||
|
|[ISACA](https://www.isaca.org/)|[**CISA**](https://www.isaca.org/credentialing/cisa)|Certified Information Systems Auditor|Auditing|3 years|
|
||||||
|
|'|[**CISM**](https://www.isaca.org/credentialing/cism)|Certified Information Security Manager|Management|3 years|
|
||||||
|
|'|[**CRISC**](https://www.isaca.org/credentialing/crisc)|Certified In Risk and Information Systems Control|Risk Management|3 years|
|
||||||
|
|'|[**CGEIT**](https://www.isaca.org/credentialing/cgeit)|Certified in the Governance of Enterprise IT|Management|3 years|
|
||||||
|
|'|[**CSX-F**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Fundamentals|General Cyber Security|3 years|
|
||||||
|
|'|[**CSX-T**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Technical Foundations|General Cyber Security|3 years|
|
||||||
|
|'|[**CSX-P**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Practitioner|General Cyber Security|3 years|
|
||||||
|
|'|[**CSX-A**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Audit|Auditing|3 years|
|
||||||
|
|'|[**CDPSE**](https://www.isaca.org/credentialing/cdpse)|Certified Data Privacy Solutions Engineer|Data Priavcy|3 years|
|
||||||
|
|[**GIAC**](https://www.giac.org/)|[**GSE**](https://www.giac.org/get-certified/giac-portfolio-certifications/?msc=main-nav)|Security Expert|General Cyber Security|4 years|
|
||||||
|
|'|[**GSEC**](https://www.giac.org/certifications/security-essentials-gsec/)|Security Essentials|General Cyber Security|4 years|
|
||||||
|
|'|[**GCIA**](https://www.giac.org/certifications/certified-intrusion-analyst-gcia/)|Certified Intrusion Analyst|Security Analysis|4 years|
|
||||||
|
|'|[**GISF**](https://www.giac.org/certifications/information-security-fundamentals-gisf)|GIAC Information Security Fundamentals|General Cyber Security|4 years|
|
||||||
|
|'|[**GCED**](https://www.giac.org/certifications/certified-enterprise-defender-gced)|Certified Enterprise Defender|Cyber Defense|4 years|
|
||||||
|
|'|[**GCWN**](https://www.giac.org/certifications/certified-windows-security-administrator-gcwn)|Certified Windows Security Administrator|IT-Administration|4 years|
|
||||||
|
|'|[**GPPA**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-perimeter-protection-analyst-gppa-re)|Certified Perimeter Protection Analyst|Firewalls|4 years|
|
||||||
|
|'|[**GMON**](https://www.giac.org/certifications/continuous-monitoring-certification-gmon)|Continuous Monitoring Certification|Threat Intelligence|4 years|
|
||||||
|
|'|[**GCCC**](https://www.giac.org/certifications/critical-controls-certification-gccc)|Critical Controls Certification|Cyber Defense|4 years|
|
||||||
|
|'|[**GDSA**](https://www.giac.org/certifications/defensible-security-architecture-gdsa)|Defensible Security Architecture|Security Architecture|4 years|
|
||||||
|
|'|[**GCUX**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-unix-security-administrator-gcux-ret)|Certified UNIX Security Administrator|IT-Administration|4 years|
|
||||||
|
|'|[**GCDA**](https://www.giac.org/certifications/certified-detection-analyst-gcda)|Certified Detection Analyst|Threat Intelligence|4 years|
|
||||||
|
|'|[**GDAT**](https://www.giac.org/certifications/defending-advanced-threats-gdat)|Defending Advanced Threats|Cyber Defense|4 years|
|
||||||
|
|'|[**GCIH**](https://www.giac.org/certifications/certified-incident-handler-gcih)|Certified Incident Handler|Incident Response|4 years|
|
||||||
|
|'|[**GPEN**](https://www.giac.org/certifications/penetration-tester-gpen)|Penetration Tester|Penetration Testing|4 years|
|
||||||
|
|'|[**GWAPT**](https://www.giac.org/certifications/web-application-penetration-tester-gwapt)|Web Application Penetration Tester|Penetration Testing|4 years|
|
||||||
|
|'|[**GXPN**](https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn)|Exploit Researcher and Advanced Penetration Tester|Penetration Testing|4 years|
|
||||||
|
|'|[**GMOB**](https://www.giac.org/certifications/mobile-device-security-analyst-gmob)|Mobile Device Security Analyst|Security Analysis|4 years|
|
||||||
|
|'|[**GAWN**](https://www.giac.org/certifications/assessing-auditing-wireless-networks-gawn)|Assessing and Auditing Wireless Networks|Wireless Security|4 years|
|
||||||
|
|'|[**GPYC**](https://www.giac.org/certifications/python-coder-gpyc)|Python Coder|Software Development|4 years|
|
||||||
|
|'|[**GCFA**](https://www.giac.org/certifications/certified-forensic-analyst-gcfa)|Certified Forensic Analyst|Forensics|4 years|
|
||||||
|
|'|[**GCFE**](https://www.giac.org/certifications/certified-forensic-examiner-gcfe)|Certified Forensic Examiner|Forensics|4 years|
|
||||||
|
|'|[**GREM**](https://www.giac.org/certifications/reverse-engineering-malware-grem)|Reverse Engineering Malware|Malware Analysis|4 years|
|
||||||
|
|'|[**GNFA**](https://www.giac.org/certifications/network-forensic-analyst-gnfa)|Network Forensic Analyst|Forensics|4 years|
|
||||||
|
|'|[**GCTI**](https://www.giac.org/certifications/cyber-threat-intelligence-gcti)|Cyber Threat Intelligence|Threat Intelligence|4 years|
|
||||||
|
|'|[**GASF**](https://www.giac.org/certifications/advanced-smartphone-forensics-gasf)|Advanced Smartphone Forensics|Forensics|4 years|
|
||||||
|
|'|[**GSLC**](https://www.giac.org/certifications/security-leadership-gslc)|Security Leadership|Management|4 years|
|
||||||
|
|'|[**GSNA**](https://www.giac.org/certifications/systems-network-auditor-gsna)|Systems and Network Auditor|Auditing|4 years|
|
||||||
|
|'|[**GISP**](https://www.giac.org/certifications/information-security-professional-gisp)|Information Security Professional|General Cyber Security|4 years|
|
||||||
|
|'|[**GLEG**](https://www.giac.org/certifications/law-data-security-investigations-gleg)|Law of Data Security & Investigations|Forensics|4 years|
|
||||||
|
|'|[**GCPM**](https://www.giac.org/certifications/certified-project-manager-gcpm)|Certified Project Manager|Management|4 years|
|
||||||
|
|'|[**GSTRT**](https://www.giac.org/certifications/strategic-planning-policy-leadership-gstrt)|Strategic Planning, Policy, and Leadership|Management|4 years|
|
||||||
|
|'|[**GSSP-JAVA**](https://www.sscsrl.com/giac-secure-software-programmer-java-gssp-java/)|Secure Software Programmer-Java|Software Development|4 years|
|
||||||
|
|'|[**GSSP-.NET**](https://www.sscsrl.com/giac-secure-software-programmer-net-gssp-net/)|Secure Software Programmer- .NET|Software Development|4 years|
|
||||||
|
|'|[**GWEB**](https://www.sscsrl.com/giac-certified-web-application-defender-gweb/)|Certified Web Application Defender|Software Development|4 years|
|
||||||
|
|'|[**GICSP**](https://www.giac.org/certifications/global-industrial-cyber-security-professional-gicsp)|Global Industrial Cyber Security Professional|Critical Infrastructure Security|4 years|
|
||||||
|
|'|[**GRID**](https://www.giac.org/certifications/response-industrial-defense-grid)|Response and Industrial Defense|Critical Infrastructure Security|4 years|
|
||||||
|
|'|[**GCIP**](https://www.giac.org/certifications/critical-infrastructure-protection-gcip)|Critical Infrastructure Protection|Critical Infrastructure Security|4 years|
|
||||||
|
|'|[**GEVA**](https://www.giac.org/certifications/enterprise-vulnerability-assessor-geva)|Enterprise Vulnerability Assessor|Vulnerability Management|4 years|
|
||||||
|
|'|[**GOSI**](https://www.giac.org/)|Open Source Intelligence|Threat Intelligence|4 years|
|
||||||
|
|'|[**GBFA**](https://www.giac.org/certifications/open-source-intelligence-gosi)|Battlefield Forensics and Acquisition|Forensics|4 years|
|
||||||
|
|'|[**GCSA**](https://www.sscsrl.com/giac-cloud-security-automation-gcsa/)|Cloud Security Automation|Cloud Security|4 years|
|
||||||
|
|'|[**GFCT**](https://www.giac.org/certifications/foundational-cybersecurity-technologies-gfact/)|Foundational Cybersecurity Technologies|Cyber Security|4 years|
|
||||||
|
|'|[**GSOC**](https://www.giac.org/certifications/security-operations-certified-gsoc)|Security Operations Certified|Security Operations|4 years|
|
||||||
|
|'|[**GPCS**](https://www.giac.org/certifications/public-cloud-security-gpcs)|Public Cloud Security|Cloud Security|4 years|
|
||||||
|
|[**CyberDefenders**](https://cyberdefenders.org/)|[**CCD**](https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/)|Certified CyberDefender|CyberDefense / BlueTeam|_No expiration_|
|
||||||
|
|[**EC-Council**](https://en.wikipedia.org/wiki/EC-Council)|[**CSCU**](https://www.eccouncil.org/train-certify/certified-secure-computer-user-cscu/)|EC-Council Certified Secure Computer User|Security Awareness|_No expiration_|
|
||||||
|
|'|[**CND**](https://www.eccouncil.org/train-certify/certified-network-security-course/)|EC-Council Certified Network Defender|Network Security|3 years|
|
||||||
|
|'|[**CEH**](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/)|EC-Council Certified Ethical Hacker|Penetration Testing|3 years|
|
||||||
|
|'|[**CEH-Practical (Master)**](https://www.eccouncil.org/train-certify/ceh-master/)|EC-Council Certified Ethical Hacker Practical (Master)|Penetration Testing|3 years|
|
||||||
|
|'|[**ECSA**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst|Penetration Testing|3 years|
|
||||||
|
|'|[**ECSA-Master (Practical)**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst (Practical)|Penetration Testing|3 years|
|
||||||
|
|'|[**LPT-Master (Practical)**](https://cert.eccouncil.org/licensed-penetration-tester.html)|EC-Council Licensed Penetration Tester (Master)|Penetration Testing|1 year|
|
||||||
|
|'|[**E\|ISM**](https://codered.eccouncil.org/course/iso-iec-27001-information-security-management?logged=false)|EC-Council Information Security Manager|Management|3 years|
|
||||||
|
|'|[**CCISO**](https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/)|EC-Council Certified Chief Information Security Officer|Management|1 year|
|
||||||
|
|'|[**ECIH**](https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/)|EC-Council Certified Incident Handler|Incident Response|3 years|
|
||||||
|
|'|[**CHFI**](https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/)|EC-Council Computer Hacking Forensic Investigator|Forensics|3 years|
|
||||||
|
|'|[**EDRP**](https://cert.eccouncil.org/ec-council-disaster-recovery-professional.html)|EC-Council Disaster Recovery Professional|Disaster Recovery|3 years|
|
||||||
|
|'|[**ECES**](https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/)|EC-Council Certified Encryption Specialist|Encryption|3 years|
|
||||||
|
|'|[**CASE Java**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/)|EC-Council Certified Application Security Engineer Java|Software Development|3 years|
|
||||||
|
|'|[**CASE .Net**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/)|EC-Council Certified Application Security Engineer .Net|Software Development|3 years|
|
||||||
|
|'|[**CTIA**](https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/)|EC-Council Certified Threat Intelligence Analyst|Threat Intelligence|3 years|
|
||||||
|
|'|[**CSA**](https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/)|EC-Council Certified SOC Analyst|Security Analysis|3 years|
|
||||||
|
|'|[**ECSS**](https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/)|EC-Council Certified Security Specialist|General Cyber Security|3 years|
|
||||||
|
|'|[**CCSE**](https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/)|EC-Council Cloud Security Engineer|Cloud Security|3 years|
|
||||||
|
|[**OffSec**](https://www.offsec.com/)|[**OSCP**](https://www.offsec.com/courses/pen-200/)|OffSec Certified Professional|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**OSWP**](https://www.offsec.com/courses/pen-210/)|OffSec Wireless Professional|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**OSWA**](https://www.offsec.com/courses/web-200/)|OffSec Web Assessor|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**OSEP**](https://www.offsec.com/courses/pen-300/)|OffSec Experienced Penetration Tester|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**OSED**](https://www.offsec.com/courses/exp-301/)|OffSec Security Exploit Developer|Exploit Development|_No expiration_|
|
||||||
|
|'|[**OSWE**](https://www.offsec.com/courses/web-300/)|OffSec Web Expert|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**OSCE3**](https://www.offsec.com/offsec/osce3-certification/)|OffSec Certified Expert3|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**OSEE**](https://www.offsec.com/courses/exp-401/)|OffSec Exploitation Expert|Exploit Development|_No expiration_|
|
||||||
|
|'|[**OSDA**](https://www.offsec.com/courses/soc-200/)|OffSec Defensive Analyst|Security Operations|_No expiration_|
|
||||||
|
|'|[**OSMR**](https://www.offsec.com/courses/exp-312/)|OffSec macOS Researcher|Exploit Development|_No expiration_|
|
||||||
|
|[**EITCI**](https://eitci.org/)|[**EITCA/IS**](https://eitci.org/eitca-programme)|EITCA Information Technologies Security Academy|General Cyber Security|_No expiration_|
|
||||||
|
|[**CSA**](https://cloudsecurityalliance.org/)|[**CCSK**](https://cloudsecurityalliance.org/education/ccsk/)|CSA Certificate of Cloud Security Knowledge|Cloud Security|_No expiration_|
|
||||||
|
|[**Cloud Credential Council**](https://www.cloudcredential.org/)|[**PCSM**](https://www.cloudcredential.org/certifications/cloud/pcsm/)|CCC Professional Cloud Security Manager|Cloud Security|_No expiration_|
|
||||||
|
|[**IAPP**](https://iapp.org/)|[**CIPP**](https://iapp.org/certify/cipp/)|Certified Information Privacy Professional|Privacy|2 years|
|
||||||
|
|'|[**CIPM**](https://iapp.org/certify/cipm/)|Certified Information Privacy Manager|Privacy|2 years|
|
||||||
|
|'|[**CIPT**](https://iapp.org/certify/cipt/)|Certified Information Privacy Technologist|Privacy|2 years|
|
||||||
|
|[**INE Security**](https://security.ine.com/)|[**eJPT**](https://security.ine.com/certifications/ejpt-certification/)|eLearnSecurity Certified Junior Penetration Tester|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**eCPPT**](https://security.ine.com/certifications/ecppt-certification/)|eLearnSecurity Certified Professional Penetration Tester|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**eWPT**](https://security.ine.com/certifications/ewpt-certification/)|eLearnSecurity Web Application Penetration Tester|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**eMAPT**](https://security.ine.com/certifications/emapt-certification/)|eLearnSecurity Mobile Application Penetration Tester|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**eCPTX**](https://security.ine.com/certifications/ewptx-certification/)|eLearnSecurity Certified Penetration Tester eXtreme|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**eCIR**](https://security.ine.com/certifications/ecir-certification/)|eLearnSecurity Certified Incident Response Professional|Incident Response|_No expiration_|
|
||||||
|
|'|[**eCXD**](https://ine.com/learning/certifications/internal/offensive-security-exploit-developer)|eLearnSecurity Exploit Development|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**eNDP**](https://ine.com/learning/courses/network-defense-network-security)|eLearnSecurity Network Defense Professional|Network Security|_No expiration_|
|
||||||
|
|'|[**eCRE**](https://ine.com/learning/paths/reverse-engineering-professional)|eLearnSecurity Certified Reverse Engineer|Malware Analysis|_No expiration_|
|
||||||
|
|'|[**eCTHP**](https://security.ine.com/certifications/ecthp-certification/)|eLearnSecurity Certified Threat Hunting Professional|Threat Hunting|_No expiration_|
|
||||||
|
|'|[**eCMAP**](https://my.ine.com/CyberSecurity/learning-paths/e831d3ee-18b5-4b46-b1a7-9f7b3d65feae/malware-analysis-professional)|eLearnSecurity Certified Malware Analysis Professional|Malware Analysis|_No expiration_|
|
||||||
|
|'|[**eWDP**](https://my.ine.com/CyberSecurity/learning-paths/1d6ff88f-8d17-4156-91fb-5af9cfb71a37/web-defense-professional)|eLearnSecurity Web Defense Professional|Web Defense|_No expiration_|
|
||||||
|
|'|[**eCDFP**](https://ine.com/learning/certifications/external/elearnsecurity-certified-digital-forensics-professional)|eLearnSecurity Certified Digital Forensics Professional|Digital Forensics|_No expiration_|
|
||||||
|
|[**CREST**](https://www.crest-approved.org/)|[**CPSA**](https://www.crest-approved.org/skills-certifications-careers/crest-practitioner-security-analyst/)|CREST Practitioner Security Analyst|Penetration Testing|3 Years|
|
||||||
|
|'|[**CRT**](https://www.crest-approved.org/skills-certifications-careers/crest-registered-penetration-tester/)|CREST Registered Penetration Tester|Penetration Testing|3 Years|
|
||||||
|
|'|[**CCT App**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-web-application-tester/)|CREST Certified Web Application Tester|Penetration Testing|3 Years|
|
||||||
|
|'|[**CCT Inf**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-infrastructure-tester/)|CREST Certified Infrastructure Tester|Penetration Testing|3 Years|
|
||||||
|
|'|[**CCSAS**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-specialist/)|CREST Certified Simulated Attack Specialist|Attack Simulation|3 Years|
|
||||||
|
|'|[**CCSAM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-manager/)|CREST Certified Simulated Attack Manager|Attack Simulation|3 Years|
|
||||||
|
|'|[**CCWS**](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/)|CREST Certified Wireless Specialist|Wireless security|3 Years|
|
||||||
|
|'|[**CPTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-threat-intelligence-analyst/)|CREST Practitioner Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||||
|
|'|[**CRTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-threat-intelligence-analyst/)|CREST Registered Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||||
|
|'|[**CCTIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-threat-intelligence-manager/)|CREST Certified Threat Intelligence Manager|Threat Intelligence|3 Years|
|
||||||
|
|'|[**CPIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-intrusion-analyst/)|CREST Practitioner Intrusion Analyst|Security Analysis|3 Years|
|
||||||
|
|'|[**CRIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-intrusion-analyst/)|CREST Registered Intrusion Analyst|Security Analysis|3 Years|
|
||||||
|
|'|[**CCNIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-network-intrusion-analyst/)|CREST Certified Network Intrusion Analyst|Security Analysis|3 Years|
|
||||||
|
|'|[**CCHIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-host-intrusion-analyst/)|CREST Certified Host Intrusion Analyst|Security Analysis|3 Years|
|
||||||
|
|'|[**CCMRE**](https://firebrand.training/en/courses/crest/certified-malware-reverse-engineer-certification)|CREST Certified Malware Reverse Engineer|Malware Analysis|3 Years|
|
||||||
|
|'|[**CCIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-incident-manager/)|CREST Certified Incident Manager|Incident Response|3 Years|
|
||||||
|
|'|[**CRTSA**](https://www.crest-approved.org/wp-content/uploads/2022/04/CRTSA-Guide-v3.0.pdf)|CREST Registered Technical Security Architect|Security Architecture|3 Years|
|
||||||
|
|[**InfoSec Institute**](https://www.infosecinstitute.com)|[**CCFE**](https://www.infosecinstitute.com/skills/learning-paths/certified-computer-forensics-examiner-ccfe/)|Certified Computer Forensics Examiner|Forensics|4 years|
|
||||||
|
|'|[**CCTHP**](https://www.infosecinstitute.com/skills/learning-paths/cyber-threat-hunting/)|Certified Cyber Threat Hunting Professional|Threat Hunting|4 years|
|
||||||
|
|'|[**CDRP**](https://www.infosecinstitute.com/courses/data-recovery-boot-camp/)|Certified Data Recovery Professional|Disaster Recovery|4 years|
|
||||||
|
|'|[**CEPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-expert-penetration-tester-cept/)|Certified Expert Penetration Tester|Penetration Testing|4 years|
|
||||||
|
|'|[**CEREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Expert Reverse Engineering Analyst|Malware Analysis|4 years|
|
||||||
|
|'|[**CMWAPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-mobile-and-web-app-penetration-tester-cmwapt/)|Certified Mobile and Web Application Penetration Tester|Penetration Testing|4 years|
|
||||||
|
|'|[**CMFE**](https://www.infosecinstitute.com/courses/mobile-forensics-training-boot-camp/)|Certified Mobile Forensics Examiner|Forensics|4 years|
|
||||||
|
|'|[**CPT**](https://www.infosecinstitute.com/skills/roles/penetration-tester/)|Certified Penetration Tester|Penetration Testing|4 years|
|
||||||
|
|'|[**CRTOP**](https://www.infosecinstitute.com/courses/red-team-operations/)|Certified Red Team Operations Professional|Red Teaming|4 years|
|
||||||
|
|'|[**CREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Reverse Engineering Analyst|Malware Analysis|4 years|
|
||||||
|
|'|[**CSSA**](https://www.infosecinstitute.com/skills/courses/introduction-to-scada-security/)|Certified SCADA Security Architect|Critical Infrastructure Security|4 years|
|
||||||
|
|'|[**CSAP**](https://www.infosecinstitute.com/skills/learning-paths/certified-security-awareness-practitioner/)|Certified Security Awareness Practitioner|Security Awareness|4 years|
|
||||||
|
|[**Cyber Struggle**](https://cyberstruggle.org)|[**CSAE**](https://cyberstruggle.org/aegis-certification/)|Cyber Struggle Aegis|Security Analysis|N/A|
|
||||||
|
|'|[**CSR**](https://cyberstruggle.org/ranger-certification/)|Cyber Struggle Ranger|Red Teaming|N/A|
|
||||||
|
|'|[**CSTPO**](https://cyberstruggle.org/cyberstruggle-tactical-pistol-operator/)|Cyber Struggle Tactical Pistol Operator|Tactical fire gun shooting|N/A|
|
||||||
|
|[**Linux Professional Institute (LPI)**](https://www.lpi.org/)|[**SecE**](https://www.lpi.org/our-certifications/security-essentials-overview/)|[Linux Professional Institute Security Essentials]|General Cyber Security|_No expiration_|
|
||||||
|
|'|[**LPIC-3 Security**](https://www.lpi.org/pt-br/our-certifications/lpic-3-303-overview/)|Linux Professional Institute LPIC-3 Security|IT-Administration|5 years|
|
||||||
|
|[**Mile2**](https://mile2.com)|[**C)SA1**](https://mile2.com/csa1-outline/)|Certified Security Awareness 1|Security Awareness|3 Years|
|
||||||
|
|'|[**C)SA2**](https://mile2.com/csa1-outline/)|Certified Security Awareness 2|Security Awareness|3 Years|
|
||||||
|
|'|[**C)SP**](https://mile2.com/csp_outline/)|Certified Security Principles|General Cyber Security|3 Years|
|
||||||
|
|'|[**C)ISSO**](https://mile2.com/cisso_outline/)|Certified Information Systems Security Officer|Management|3 Years|
|
||||||
|
|'|[**IS20**](https://mile2.com/is18_outline/)|Information Security 20 Security Controls|General Cyber Security|3 Years|
|
||||||
|
|'|[**C)SLO**](https://mile2.com/cslo_outline/)|Certified Security Leadership Officer|Management|3 Years|
|
||||||
|
|'|[**C)VA**](https://mile2.com/vulnerability-assessor-outline/)|Certified Vulnerability Assessor|Vulnerability Management|3 Years|
|
||||||
|
|'|[**C)PEH**](https://mile2.com/professional-ethical-hacker/)|Certified Professional Ethical Hacker|Penetration Testing|3 Years|
|
||||||
|
|'|[**C)PTE**](https://mile2.com/penetration-testing-engineer-outline/)|Certified Penetration Tester|Penetration Testing|3 Years|
|
||||||
|
|'|[**C)PTC**](https://mile2.com/cptc_outline/)|Certified Penetration Testing Consultant|Penetration Testing|3 Years|
|
||||||
|
|'|[**C)PSH**](https://mile2.com/cpSH_outline/)|Certified PowerShell Hacker|Scripting|3 Years|
|
||||||
|
|'|[**C)IHE**](https://mile2.com/cihe_outline/)|Certified Incident Handling Engineer|Incident Response|3 Years|
|
||||||
|
|'|[**C)DFE**](https://mile2.com/cdfe_outline/)|Certified Digital Forensic Examiner|Forensics|3 Years|
|
||||||
|
|'|[**C)VFE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Forensics Engineer|Forensics|3 Years|
|
||||||
|
|'|[**C)NFE**](https://mile2.com/network-forensics-examiner-outline/)|Certified Network Forensics Examiner|Forensics|3 Years|
|
||||||
|
|'|[**C)DRE**](https://mile2.com/cdre_outline/)|Certified Disaster Recovery Engineer|Disaster Recovery|3 Years|
|
||||||
|
|'|[**C)HISSP**](https://mile2.com/chissp_outline/)|Certified Healthcare Information Systems Security Professional|Healthcare|3 Years|
|
||||||
|
|'|[**C)ISMS-LA**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Auditor|Auditing|3 Years|
|
||||||
|
|'|[**C)ISMS-LI**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Implementer|Risk Management|3 Years|
|
||||||
|
|'|[**C)ISSA**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Security Systems Auditor|Auditing|3 Years|
|
||||||
|
|'|[**C)SWAE**](https://mile2.com/role-based-certification-roadmap/)|Certified Secure Web Application Engineer|Application Security|3 Years|
|
||||||
|
|'|[**C)VCP**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Principles|Virtualization|3 Years|
|
||||||
|
|'|[**C)VE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Engineer|Virtualization|3 Years|
|
||||||
|
|'|[**C)CSO**](https://mile2.com/ccso_outline/)|Certified Cloud Security Officer|Cloud Security|3 Years|
|
||||||
|
|'|[**C)VSE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Systems Engineer|Virtualization|3 Years|
|
||||||
|
|'|[**C)ISSM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Security Manager|Management|3 Years|
|
||||||
|
|'|[**C)ISRM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Risk Manager|Risk Management|3 Years|
|
||||||
|
|'|[**ISCAP**](https://mile2.com/role-based-certification-roadmap/)|Information Systems Certification & Accreditation Professional|Auditing|3 Years|
|
||||||
|
|'|[**C)SWAE**](https://mile2.com/cswae_outline/)|Certified Secure Web Application Engineer|Web Security|3 Years|
|
||||||
|
|'|[**C)ISS**](https://mile2.com/role-based-certification-roadmap/)|Certified IPv6 Security Specialist|Network Security|3 Years|
|
||||||
|
|'|[**C)CSA**](https://mile2.com/ccsa_outline/)|Certified Cybersecurity Analyst|Security Analysis|3 Years|
|
||||||
|
|'|[**C)CTA**](https://mile2.com/role-based-certification-roadmap/)|Certified Cyber Threat Analyst|Security Analysis|3 Years|
|
||||||
|
|'|[**C)CTIA**](https://mile2.com/threat-analyst/)|Certified Cyber Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||||
|
|[**ASIS International**](https://www.asisonline.org)|[**CPP**](https://www.asisonline.org/certification/certified-protection-professional-cpp/)|Certified Protection Professional|Management|3 Years|
|
||||||
|
|'|[**APP**](https://www.asisonline.org/certification/associate-protection-professional-app/)|Associate Protection Professional|Management|3 Years|
|
||||||
|
|'|[**PCI**](https://www.asisonline.org/certification/professional-certified-investigator-pci/)|Professional Certified Investigator|Forensics|3 Years|
|
||||||
|
|'|[**PSP**](https://www.asisonline.org/certification/physical-security-professional/)|Physical Security Professional|Physical Security|3 Years|
|
||||||
|
|[**SABSA**](https://sabsa.org/)|[**SABSA-SCF**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Foundation Certificate|Security Architecture|3 Years|
|
||||||
|
|'|[**SABSA-SCP**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Practitioner Certificate|Security Architecture|3 Years|
|
||||||
|
|'|[**SABSA-SCM**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Master Certificate|Security Architecture|3 Years|
|
||||||
|
|[**APMG International**](https://apmg-international.com/)|[**ISO/IEC 27001-F**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Foundation|Standards|_No expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-P ISO**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Practitioner - Information Security Officer|Standards|_No expiration_|
|
||||||
|
|'|[**NCSP-F**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Foundation|Standards|_No expiration_|
|
||||||
|
|'|[**NCSP-P**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Practiioner|Standards|_No expiration_|
|
||||||
|
|[**EXIN**](https://www.exin.com/)|[**PDP-E**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Essentials|Privacy|_No expiration_|
|
||||||
|
|'|[**PDP-F**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Foundation|Privacy|_No expiration_|
|
||||||
|
|'|[**PDP-P**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy and Data Protection Practitioner|Privacy|_No expiration_|
|
||||||
|
|'|[**CIT-F**](https://www.exin.com/pt-br/data-protection-security/exin-cyber-and-it-security/exin-cyber-and-it-security-foundation/)|EXIN Cyber & IT Security Foundation|General Cyber Security|_No expiration_|
|
||||||
|
|'|[**CEF**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-information-security-officer/)|EXIN Ethical Hacking Foundation|Penetration Testing|_No expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-F**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Foundation|Standards|_No expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-P**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Professional|Standards|_No expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-E**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Expert|Standards|_No expiration_|
|
||||||
|
|'|[**SP-F**](https://www.exin.com/)|EXIN Secure Programming Foundation|Software Development|_No expiration_|
|
||||||
|
|[**IBITGQ**](https://www.ibitgq.org/)|[**EU GDPR F**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Foundation|Standards|_No expiration_|
|
||||||
|
|'|[**EU GDPR P**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Practitioner|Standards|_No expiration_|
|
||||||
|
|'|[**C-DPO**](https://www.ibitgq.org/exams)|Certified Data Protection Officer|Privacy|_No expiration_|
|
||||||
|
|'|[**C BS PIMS LI**](https://www.ibitgq.org/exams)|Certified BS 10012 PIMS Lead Implementer|Standards|_No expiration_|
|
||||||
|
|'|[**CCPA F**](https://www.ibitgq.org/exams)|California Consumer Privacy Act Foundation|Privacy|_No expiration_|
|
||||||
|
|'|[**C IDP F**](https://www.ibitgq.org/exams)|Certified Introduction to Data Protection|Privacy|_No expiration_|
|
||||||
|
|'|[**CIS F**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Foundation|Standards|_No expiration_|
|
||||||
|
|'|[**CIS LI**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Implementer|Standards|_No expiration_|
|
||||||
|
|'|[**CIS LA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Auditor|Standards|_No expiration_|
|
||||||
|
|'|[**CIS IA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Internal Auditor|Standards|_No expiration_|
|
||||||
|
|'|[**CISRM**](https://www.ibitgq.org/exams)|Certified ISO 27005 ISMS Risk Management|Standards|_No expiration_|
|
||||||
|
|'|[**PCI IM**](https://www.ibitgq.org/exams)|PCI DSS Implementation|Standards|_No expiration_|
|
||||||
|
|'|[**CCRMP**](https://www.ibitgq.org/exams)|Managing Cyber Security Risk|Management|_No expiration_|
|
||||||
|
|'|[**CIRM F**](https://www.ibitgq.org/exams)|Cyber Incident Response Management Foundation|Incident Response|_No expiration_|
|
||||||
|
|'|[**C CR P**](https://www.ibitgq.org/exams)|Certified Cyber Resilience Practitioner|Management|_No expiration_|
|
||||||
|
|'|[**CITGP**](https://www.ibitgq.org/exams)|Implementing IT Governance – Foundation & Principles|Management|_No expiration_|
|
||||||
|
|'|[**C CS F**](https://www.ibitgq.org/exams)|Certified Cyber Security Foundation|General Cyber Security|_No expiration_|
|
||||||
|
|[**CertNexus**](https://certnexus.com/)|[**CFR**](https://certnexus.com/cybersec-first-responder-cfr/)|CyberSec First Responder|Incident Response|3 Years|
|
||||||
|
|'|[**CIOTSP**](https://certnexus.com/certified-iot-security-practitioner-ciotsp/)|Certified IoT Security Practitioner (CIoTSP)|IoT|3 Years|
|
||||||
|
|'|[**IRBIZ**](https://certnexus.com/irbiz/)|Incident Response for Business Professionals|Incident Response|3 Years|
|
||||||
|
|'|[**CSC**](https://certnexus.com/cyber-secure-coder/)|Cyber Secure Coder|Software Development|3 Years|
|
||||||
|
|'|[**CYBERSAFE**](https://certnexus.com/cybersafe/)|CyberSAFE|End user security|1 Year|
|
||||||
|
|[**Lunarline**](https://lunarline.com/)|[**CEHT**](https://lunarline.com/)|Certified Expert Hunt Team|Threat Hunting|3 Years|
|
||||||
|
|'|[**CECS**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/cloud-fedramp-consulting-and-training/)|Certified Expert Cloud Security|Cloud Security|3 Years|
|
||||||
|
|'|[**CEIA**](https://lunarline.com/)|Certified Expert Independent Assessor|Auditing|3 Years|
|
||||||
|
|'|[**CEPM**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert Program Manager|Management|3 Years|
|
||||||
|
|'|[**CERP**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert RMF Professional|Management|3 Years|
|
||||||
|
|'|[**CESA**](https://lunarline.com/)|Certified Expert Security Analyst|Security Analysis|3 Years|
|
||||||
|
|[**McAfee Institute**](https://www.mcafeeinstitute.com/)|[**CECI**](https://www.mcafeeinstitute.com/products/certified-expert-in-cyber-investigations-ceci)|Certified Expert in Cyber Investigations|Forensics|2 Years|
|
||||||
|
|'|[**CCII**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-investigator-ccii)|Certified Cyber Intelligence Investigator|Threat Intelligence|2 Years|
|
||||||
|
|'|[**CCIP**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-professional-ccip)|Certified Cyber Intelligence Professional|Threat Intelligence|2 Years|
|
||||||
|
|'|[**CSMIE**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-expert-csmie)|Certified Social Media Intelligence Expert|Threat Intelligence|2 Years|
|
||||||
|
|'|[**SMIA**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-analyst-smia)|Certified Social Media Intelligence Analyst|Threat Intelligence|2 Years|
|
||||||
|
|'|[**CCTA**](https://www.mcafeeinstitute.com/products/certified-counterintelligence-threat-analyst-ccta)|Certified Counterintelligence Threat Analyst|Threat Intelligence|2 Years|
|
||||||
|
|'|[**CPCI**](https://www.mcafeeinstitute.com/products/certified-professional-criminal-investigator-cpci)|Certified Professional Criminal Investigator|Forensics|2 Years|
|
||||||
|
|'|[**CORCI**](https://www.mcafeeinstitute.com/products/certified-organized-retail-crime-investigator-corci)|Certified Organized Retail Crime Investigator|Forensics|2 Years|
|
||||||
|
|'|[**CEL**](https://www.mcafeeinstitute.com/products/certified-executive-leader-cel)|Certified Executive Leader|Management|2 Years|
|
||||||
|
|'|[**CHTI**](https://www.mcafeeinstitute.com/products/certified-human-trafficking-investigator-chti)|Certified Human Trafficking Investigator|Forensics|2 Years|
|
||||||
|
|'|[**CCFI**](https://www.mcafeeinstitute.com/products/certified-cryptocurrency-forensic-investigator-ccfi)|Certified Cryptocurrency Forensic Investigator|Forensics|2 Years|
|
||||||
|
|'|[**WVTS**](https://www.mcafeeinstitute.com/products/certified-workplace-violence-and-threat-specialist-wvts)|Certified Workplace violence and threat specialist|Forensics|2 Years|
|
||||||
|
|'|[**C\|OSINT**](https://www.mcafeeinstitute.com/products/certified-osint)|Certified in Open Source Intelligence|Threat Intelligence|2 Years|
|
||||||
|
|[**The IIA**](https://www.theiia.org/en/)|[**CIA**](https://www.theiia.org/en/certifications/cia/)|Certified Internal Auditor|Auditing|1 year|
|
||||||
|
|'|[**CRMA**](https://www.theiia.org/en/certifications/crma/)|Certification in Risk Management Assurance|Risk Management|1 year|
|
||||||
|
|'|[**QIAL**](https://www.theiia.org/en/certifications/qial/)|Qualification in Internal Audit Leadership|Auditing|1 year|
|
||||||
|
|[**GAQM**](https://gaqm.org)|[**CSST**](https://gaqm.org/certifications/software_security_testing/csst)|Certified Software Security Tester|Software Development|_No Expiration_|
|
||||||
|
|'|[**CASST**](https://gaqm.org/certifications/software_security_testing/casst)|Certified Advanced Software Security Tester|Software Development|_No Expiration_|
|
||||||
|
|'|[**CISP**](https://gaqm.org/certifications/information_systems_security/cisp)|Certified Information Security Professional|General Cyber Security|5 Years|
|
||||||
|
|'|[**CISSM**](https://gaqm.org/certifications/information_systems_security/cissm)|Certified Information Systems Security Manager|Management|5 Years|
|
||||||
|
|'|[**CISST**](https://gaqm.org/certifications/information_systems_security/cisst)|Certified Information Systems Security Tester|Security Testing|_No Expiration_|
|
||||||
|
|'|[**CPT**](https://gaqm.org/certifications/information_systems_security/certified_penetration_tester_cpt)|Certified Penetration Tester|Penetration Tester|_No Expiration_|
|
||||||
|
|'|[**CFA**](https://gaqm.org/certifications/information_systems_security/cfa)|Certified Forensic Analyst|Forensics|_No Expiration_|
|
||||||
|
|'|[**CPEH**](https://gaqm.org/certifications/information_systems_security/cpeh)|Certified Professional Ethical Hacker|Penetration Tester|_No Expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-CIA**](https://gaqm.org/certifications/iso_certifications/iso-27001-isms-certified-internal-auditor)|ISO 27001 ISMS Certified Internal Auditor|Auditing|_No Expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-27002-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001-27002 Lead Auditor|Auditing|_No Expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001:2013 ISMS Certified Lead Auditor|Auditing|_No Expiration_|
|
||||||
|
|'|[**ISO/IEC 27001-F**](https://gaqm.org/certifications/iso_certifications/iso_isms_fnd)|ISO 27001:2013 ISMS Foundation|Standards|_No Expiration_|
|
||||||
|
|'|[**ISO/IEC 27002-F**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-fnd)|ISO 27002 Foundation|Standards|_No Expiration_|
|
||||||
|
|'|[**ISO/IEC 27002-LI**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-li)|ISO 27002 Lead Implementer|Standards|4 Years|
|
||||||
|
|'|[**ISO/IEC 31000-LRM**](https://gaqm.org/certifications/iso_certifications/iso-31000-cla)|ISO 31000 Certified Lead Risk Manager|Standards|_No Expiration_|
|
||||||
|
|[**ISECOM**](https://www.isecom.org)|[**OPSA**](https://www.isecom.org/opsa.pdf)|OSSTMM Professional Security Analyst|Security Analyst|_No Expiration_|
|
||||||
|
|'|[**OPST**](https://www.isecom.org/opst.pdf)|OSSTMM Professional Security Tester|Penetration Tester|_No Expiration_|
|
||||||
|
|'|[**OPSE**](https://www.isecom.org/opse.pdf)|OSSTMM Professional Security Expert|General Cyber Security|_No Expiration_|
|
||||||
|
|'|[**OWSE**](https://www.isecom.org/opse.pdf)|OSSTMM Wireless Security Expert|Penetration Tester|_No Expiration_|
|
||||||
|
|'|[**CTA**](https://www.isecom.org/cta.pdf)|OSSTMM Certified Trust Analyst|Trust Management|_No Expiration_|
|
||||||
|
|'|[**SAI**](https://www.isecom.org/sai.pdf)|Certified Security Awareness Instructor|Cyber Security Trainer|_No Expiration_|
|
||||||
|
|'|[**CHA**](https://www.isecom.org/cha.pdf)|Certified Hacker Analyst|Penetration Tester|_No Expiration_|
|
||||||
|
|'|[**CHAT**](https://www.isecom.org/chat.pdf)|Certified Hacker Analyst Trainer|Cyber Security Trainer|_No Expiration_|
|
||||||
|
|[**HISPI**](https://www.hispi.org/)|[**HISP**](https://www.hispi.org/certification.php)|Holistic Information Security Practitioner|General Cyber Security|_3 Years_|
|
||||||
|
|[**Blockchain Training Alliance**](https://blockchaintrainingalliance.com/)|[**CBSP**](https://blockchaintrainingalliance.com/collections/certifications/products/cbsp)|Certified Blockchain Security Professional|Blockchain|2 Years|
|
||||||
|
|[**Crypto Consortium**](https://cryptoconsortium.org/)|[**CCSSA**](https://cryptoconsortium.org/certifications/ccssa/)|CryptoCurrency Security Standard Auditor|Blockchain|2 years|
|
||||||
|
|[**The Open Group**](https://www.opengroup.org/)|[**OG0-041**](https://www.opengroup.org/certifications)|Open FAIR Foundation|Risk Management|_No espiration_|
|
||||||
|
|'|[**TOGAF9-F**](https://www.opengroup.org/certifications)|TOGAF 9 Foundation|Security Architecture|_No espiration_|
|
||||||
|
|'|[**TOGAF9-C**](https://www.opengroup.org/certifications)|TOGAF 9 Certified|Security Architecture|_No espiration_|
|
||||||
|
|[**TCM Security**](https://certifications.tcm-sec.com/)|[**PNPT**](https://certifications.tcm-sec.com/pnpt/)|Practical Network Penetration Tester|Penetration Tester|No Expiration|
|
||||||
|
|'|[**PCRP**](https://certifications.tcm-sec.com/pcrp)|Practical Career-Ready Professional|Penetration Tester|3 years|
|
||||||
|
|'|[**PJMR**](https://certifications.tcm-sec.com/pjmr)|Practical Junior Malware Researcher|Malware Analysis|No Expiration|
|
||||||
|
|[**Star Certification**](https://starcertification.org/)|[**SCSU**](https://starcertification.org/Certifications/Certificate/su)|Star Cyber Secure User|Security Awareness|3 years|
|
||||||
|
|'|[**EHE**](https://starcertification.org/Certifications/Certificate/Ethical-Hacking-Expert)|Star Certified Ethical Hacking Expert|Penetration Testing|3 years|
|
||||||
|
|'|[**SESS**](https://starcertification.org/Certifications/Certificate/expertsecurity)|Star Expert Security Specialist|Penetration Testing|3 years|
|
||||||
|
|'|[**SMFAS**](https://starcertification.org/Certifications/Certificate/mobile)|Star Mobile Forensic and Advance Security|Forensics|3 years|
|
||||||
|
|'|[**SSCA**](https://starcertification.org/Certifications/Certificate/securityanalytics)|Star Secure Cyber Analytics|Penetration Testing|3 years|
|
||||||
|
|'|[**SFICH-007**](https://starcertification.org/Certifications/Certificate/forensic)|Star Forensic investigator in Computer Hacking-007|Forensics|3 years|
|
||||||
|
|'|[**SSPE.Net**](https://starcertification.org/Certifications/Certificate/securedotnet)|Star Secure Programmer Expert- .Net|Software Development|3 years|
|
||||||
|
|'|[**SSPE-Java**](https://starcertification.org/Certifications/Certificate/securejava)|Star Secure Programmer Expert- Java|Software Development|3 years|
|
||||||
|
|'|[**SSPE-Android**](https://starcertification.org/Certifications/Certificate/secureandroid)|Star Secure Programmer Expert- Android|Software Development|3 years|
|
||||||
|
|'|[**SSPE-PHP**](https://starcertification.org/Certifications/Certificate/securephp)|Star Secure Programmer Expert- PHP|Software Development|3 years|
|
||||||
|
|[Zero-Point Security](https://training.zeropointsecurity.co.uk/)|[**CRTO**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-exam)|Certified Red Team Operator|Red Teaming|N/A|
|
||||||
|
|'|[**CRTL**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-ii-exam)|Certified Red Team Lead|Red Teaming|N/A|
|
||||||
|
|[EC First](https://ecfirst.com/)|[**CCSA**](https://ecfirst.com/ccsa/)|Certified Cyber Security Architect|Security Architecture|3 years|
|
||||||
|
|'|[**CSCS**](https://ecfirst.com/cscs/)|Certified Security Compliance Specialist|Risk/Compliance|3 years|
|
||||||
|
|'|[**CMMP**](https://ecfirst.com/ccp/)|Certified CMMC Professional|Standards|3 years|
|
||||||
|
|[CWNP](https://www.cwnp.com/)|[**CWS**](https://www.cwnp.com/certifications/cwsp)|Certified Wireless Specialist|Wireless Security|3 years|
|
||||||
|
|[8kSec](https://8ksec.io/)|[**OMSE**](https://8ksec.io/omse/)|Offensive Mobile Security Expert|Red Teaming|_No expiration_|
|
||||||
|
|[Cisco](https://www.cisco.com/site/us/en/index.html)|[CCNA Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html)|Cisco Certified Network Associate - Security|Network Security|3 years|
|
||||||
|
|'|[CCNP Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/professional/ccnp-security-v2.html)|Cisco Certified Network Professional - Security|Network Security|3 years|
|
||||||
|
|'|[CCIE Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/expert/ccie-security-v2.html)|Cisco Certified Internetwork Expert - Security|Network Security|3 years|
|
||||||
|
|'|[CCNA CyberOps](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/cyberops-associate.html)|Cisco Certified Network Associate - CyberOps|Network Security|3 years|
|
||||||
|
|[Check Point](https://www.checkpoint.com/)|[CCSA](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Administrator|Network Security|3 years|
|
||||||
|
|'|[CCSE](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Expert|Network Security|3 years|
|
||||||
|
|[Kali](https://www.kali.org/)|[KLCP](https://www.kali.org/blog/introducing-kali-linux-certified-professional/)|Kali Linux Certified Professional|Penetration Testing|No expiration|
|
||||||
|
|[Microsoft](https://www.microsoft.com/)|[AZ-500](https://learn.microsoft.com/en-us/credentials/certifications/exams/az-500/)|Microsoft Certified: Azure Security Engineer Associate|Cloud Security|1 year|
|
||||||
|
|'|[MS-500](https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/ms-500)|Microsoft 365 Certified: Security Administrator Associate|Cloud Security|1 year|
|
||||||
|
|'|[SC-100](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-100/)|Microsoft Certified: Cybersecurity Architect Expert|Security Architect|1 year |
|
||||||
|
|'|[SC-200](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-200/)|Microsoft Certified: Security Operations Analyst Associate|SIEM|1 year |
|
||||||
|
|'|[SC-300](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-300/)|Microsoft Certified: Identity and Access Administrator Associate|IAM|1 year |
|
||||||
|
|'|[SC-400](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-400/)|Microsoft Information Protection Administrator|Risk/Compliance|1 year |
|
||||||
|
|'|[SC-900](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/)|Microsoft Certified: Security, Compliance, and Identity Fundamentals|Fundamentals|1 year|
|
||||||
|
|[AWS](https://aws.amazon.com/?nc2=h_lg)|[-](https://aws.amazon.com/certification/certified-security-specialty/?gclid=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB&trk=0c2b5279-1e50-459b-b9b5-6b0861ac160e&sc_channel=ps&ef_id=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB:G:s&s_kwcid=AL!4422!3!653411798076!e!!g!!aws%20certified%20security%20specialty!19919601960!149404863724)|AWS Certified Security - Specialty|Cloud Security|3 years|
|
||||||
|
|[Google](https://cloud.google.com/?hl=en)|[-](https://cloud.google.com/learn/certification/cloud-security-engineer)|Google Professional Cloud Security Engineer|Cloud Security|2 years|
|
||||||
|
|[Jamf](https://www.jamf.com/)|[JCESA](https://www.jamf.com/products/)|Jamf Certified Endpoint Security Admin|macOS Security|3 years|
|
||||||
|
|[Alibaba](https://www.alibabacloud.com/)|[ACA](https://edu.alibabacloud.com/certification/aca_cloudsecurity)|ACA Cloud Security Certification|Cloud Security|2 years|
|
||||||
|
|'|[ACP](https://edu.alibabacloud.com/certification/acp_security)|ACP Cloud Security Certification|Cloud Security|2 years|
|
||||||
|
|'|[ACE](https://edu.alibabacloud.com/certification/ace_cloudcomputing)|ACE Cloud Security Expert|Cloud Security|2 years|
|
||||||
|
|[Redhat](https://www.redhat.com/en)|[EX415](https://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam)|Red Hat Certified Specialist in Security: Linux|IT-Administration|3 years|
|
||||||
|
|'|[EX425](https://www.redhat.com/en/services/training/ex425-retired-red-hat-certified-specialist-security-containers-and-openshift-container-platform-exam)|Red Hat Certified Specialist in Security: Containers and OpenShift Container|IT-Administration|3 years|
|
||||||
|
|[OpenText](https://www.opentext.com/)|[EnCE](https://www.opentext.es/products-and-solutions/services/training-and-learning-services/encase-training/examiner-certification)|EnCase Certified Examiner|Forensics|3 years|
|
||||||
|
|'|[EnCEP](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/ediscovery-practitioner-program)|EnCase Certified eDiscovery Practitioner|Forensics|3 years|
|
||||||
|
|'|[CFSR](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/forensic-security-responder-certification)|EnCase Certified Forensic Security Responder|Forensics|3 years|
|
||||||
|
|[Fortinet](https://www.fortinet.com/)|[NSE 1/2/3](https://training.fortinet.com/local/staticpage/view.php?page=fca_cybersecurity)|Network Security Professional Associate|vendor-specific products|2 years|
|
||||||
|
|'|[NSE 4](https://www.fortinet.com/br/training-certification)|Network Security Professional|firewalls|2 years|
|
||||||
|
|'|[NSE 5](https://www.fortinet.com/br/training-certification)|Network Security Analyst|administration|2 years|
|
||||||
|
|'|[NSE 6](https://www.fortinet.com/br/training-certification)|Network Security Specialist|vendor-specific products|2 years|
|
||||||
|
|'|[NSE 7](https://www.fortinet.com/br/training-certification)|Network Security Architect|firewalls|2 years|
|
||||||
|
|'|[NSE 8](https://training.fortinet.com/local/staticpage/view.php?page=fcx_cybersecurity)|Network Security Expert|firewalls|2 years|
|
||||||
|
|[Juniper](https://learningportal.juniper.net/juniper/default.aspx)|[JNCIA-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncia-sec.html)|Juniper Networks Certified Associate|Network Security|3 years|
|
||||||
|
|'|[JNCIS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=702)|Juniper Networks Certified Specialist|Network Security|3 years|
|
||||||
|
|'|[JNCIP-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncip-sec.html)|Juniper Networks Certified Professional|Network Security|3 years|
|
||||||
|
|'|[JNCIE-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=11065)|Juniper Networks Certified Expert|Network Security|3 years|
|
||||||
|
|'|[JNCDS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=JUNIPER-LEARNING-PATHS-HOME)|Juniper Networks Certified Design Specialist Security|Network Security|3 years|
|
||||||
|
|[Palo Alto](https://www.paloaltonetworks.com/)|[PCNSA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-administrator)|Palo Alto Networks Certified Network Security Administrator|Network Security|2 years|
|
||||||
|
|'|[PCNSE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-engineer)|Palo Alto Networks Certified Network Security Engineer|Network Security|2 years|
|
||||||
|
|'|[PCCET](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-cybersecurity-entry-level-technician)|Palo Alto Networks Certified Cybersecurity Entry-level Technician|General Cyber Security|2 years|
|
||||||
|
|'|[PCDRA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-detection-and-remediation-analyst)|Palo Alto Networks Certified Detection and Remediation Analyst|Network Security|2 years|
|
||||||
|
|'|[PCCSE](https://www.paloaltonetworks.com/services/education/prisma-certified-cloud-security-engineer)|Palo Alto Networks Prisma Certified Cloud Security Engineer|Cloud Security|2 years|
|
||||||
|
|'|[PCSAE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-security-automation-engineer)|Palo Alto Networks Certified Security Automation Engineer|Threat Intelligence|2 years|
|
Loading…
Reference in a new issue