mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-24 11:53:02 +00:00
Add files via upload
Adding a table with almost all cybersecurity certifications
This commit is contained in:
parent
8469fe4706
commit
dfce11ef10
1 changed files with 319 additions and 330 deletions
|
@ -1,366 +1,355 @@
|
|||
|Company|Abbreviation|Title|Focus|Validity duration|
|
||||
|---|---|---|---|---|
|
||||
|[**Altered Security**](https://www.alteredsecurity.com/)|[**CRTE**](https://www.alteredsecurity.com/redteamlab)|Certified Red Team Expert|Red Teaming|3 years|
|
||||
||[**CRTM**](https://www.alteredsecurity.com/gcb)|Certified Red Team Master|Red Teaming|3 years|
|
||||
||[**CARTP**](https://www.alteredsecurity.com/azureadlab)|Certified Azure Red Team Professional|Red Teaming|3 years|
|
||||
||[**CAWASP**](https://www.alteredsecurity.com/azureappsec)|Certified Azure Web Application Security Professional|Application Security|3 years|
|
||||
|'|[**CRTM**](https://www.alteredsecurity.com/gcb)|Certified Red Team Master|Red Teaming|3 years|
|
||||
|'|[**CARTP**](https://www.alteredsecurity.com/azureadlab)|Certified Azure Red Team Professional|Red Teaming|3 years|
|
||||
|'|[**CAWASP**](https://www.alteredsecurity.com/azureappsec)|Certified Azure Web Application Security Professional|Application Security|3 years|
|
||||
|[**SECO**](https://www.seco-institute.org/)|[**S-ITSF**](https://www.seco-institute.org/certifications/it-security-track/foundation/)|IT-Security Foundation|General Cyber Security|3 years|
|
||||
||[**S-ITSP**](https://www.seco-institute.org/certifications/it-security-certification-track/it-security-practitioner-certification/)|IT-Security Practitioner|General Cyber Security|3 years|
|
||||
||[**S-ITSE**](https://www.seco-institute.org/certifications/it-security-track/)|IT-Security Expert|General Cyber Security|3 years|
|
||||
||[**S-CITSO**](https://www.seco-institute.org/certifications/it-security-track/certified-officer/)|Certified IT-Security Officer|General Cyber Security|3 years|
|
||||
||[**S-DPF**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-foundation-certification/)|Data Protection Foundation|Privacy|_No expiration_|
|
||||
||[**S-DPP**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-practitioner-certification/)|Data Protection Practitioner|Privacy|1 year|
|
||||
||[**S-CDPO**](https://www.seco-institute.org/certifications/certified-data-proctection-officer-cdpo/)|Certified Data Protection Officer|Privacy|3 years|
|
||||
||[**S-EHF**](https://www.seco-institute.org/certifications/ethical-hacking-certification-track/ethical-hacking-foundation-certification/)|Ethical Hacking Foundation|Penetration Testing|3 years|
|
||||
||[**S-EHP**](https://www.seco-institute.org/certifications/ethical-hacking-track/practitioner/)|Ethical Hacking Practitioner|Penetration Testing|3 years|
|
||||
||[**S-SPF**](https://www.seco-institute.org/certifications/secure-software-certification-track/secure-programming-foundation-certification/)|Secure Programming Foundation|Software Development|3 years|
|
||||
||[**S-DWF**](https://www.seco-institute.org/certifications/dark-web-foundation-certification/)|Dark Web Foundation|Threat Intelligence|3 years|
|
||||
|[(ISC)2](https://www.isc2.org/)|[**CC**](https://www.isc2.org/certifications/cc)|Certified in CyberSecurity|IT-Administration|3 years (continuously)|
|
||||
||[**CISSP**](https://www.isc2.org/certifications/cissp)|Certified Information Systems Security Professional|Management|3 years (continuously)|
|
||||
||[**CISSP-ISSAP**](https://www.isc2.org/certifications/issap)|Information Systems Security Architecture Professional|Security Architecture|3 years (continuously)|
|
||||
||[**CISSP-ISSEP**](https://www.isc2.org/certifications/issep)|Information Systems Security Engineering Professional|IT-Administration|3 years (continuously)|
|
||||
||[**CISSP-ISSMP**](https://www.isc2.org/certifications/issmp)|Information Systems Security Management Professional|Management|3 years (continuously)|
|
||||
||[**SSCP**](https://www.isc2.org/certifications/sscp)|Systems Security Certified Practitioner|IT-Administration|3 years (continuously)|
|
||||
||[**CCSP**](https://www.isc2.org/certifications/ccsp)|Certified Cloud Security Professional|Cloud Security|3 years (continuously)|
|
||||
||[**CAP**](https://www.isc2.org/certifications/cgrc)|Certified Authorization Professional|Auditing|3 years (continuously)|
|
||||
||[**CSSLP**](https://www.isc2.org/certifications/csslp)|Certified Secure Software Lifecycle Professional|Software Development|3 years (continuously)|
|
||||
|'|[**S-ITSP**](https://www.seco-institute.org/certifications/it-security-certification-track/it-security-practitioner-certification/)|IT-Security Practitioner|General Cyber Security|3 years|
|
||||
|'|[**S-ITSE**](https://www.seco-institute.org/certifications/it-security-track/)|IT-Security Expert|General Cyber Security|3 years|
|
||||
|'|[**S-CITSO**](https://www.seco-institute.org/certifications/it-security-track/certified-officer/)|Certified IT-Security Officer|General Cyber Security|3 years|
|
||||
|'|[**S-DPF**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-foundation-certification/)|Data Protection Foundation|Privacy|_No expiration_|
|
||||
|'|[**S-DPP**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-practitioner-certification/)|Data Protection Practitioner|Privacy|1 year|
|
||||
|'|[**S-CDPO**](https://www.seco-institute.org/certifications/certified-data-proctection-officer-cdpo/)|Certified Data Protection Officer|Privacy|3 years|
|
||||
|'|[**S-EHF**](https://www.seco-institute.org/certifications/ethical-hacking-certification-track/ethical-hacking-foundation-certification/)|Ethical Hacking Foundation|Penetration Testing|3 years|
|
||||
|'|[**S-EHP**](https://www.seco-institute.org/certifications/ethical-hacking-track/practitioner/)|Ethical Hacking Practitioner|Penetration Testing|3 years|
|
||||
|'|[**S-SPF**](https://www.seco-institute.org/certifications/secure-software-certification-track/secure-programming-foundation-certification/)|Secure Programming Foundation|Software Development|3 years|
|
||||
|'|[**S-DWF**](https://www.seco-institute.org/certifications/dark-web-foundation-certification/)|Dark Web Foundation|Threat Intelligence|3 years|
|
||||
|[(ISC)2](https://www.isc2.org/)|[**CC**](https://www.isc2.org/certifications/cc)|Certified in CyberSecurity|IT-Administration|3 years|
|
||||
|'|[**CISSP**](https://www.isc2.org/certifications/cissp)|Certified Information Systems Security Professional|Management|3 years|
|
||||
|'|[**CISSP-ISSAP**](https://www.isc2.org/certifications/issap)|Information Systems Security Architecture Professional|Security Architecture|3 years|
|
||||
|'|[**CISSP-ISSEP**](https://www.isc2.org/certifications/issep)|Information Systems Security Engineering Professional|IT-Administration|3 years)|
|
||||
|'|[**CISSP-ISSMP**](https://www.isc2.org/certifications/issmp)|Information Systems Security Management Professional|Management|3 years)|
|
||||
|'|[**SSCP**](https://www.isc2.org/certifications/sscp)|Systems Security Certified Practitioner|IT-Administration|3 years|
|
||||
|'|[**CCSP**](https://www.isc2.org/certifications/ccsp)|Certified Cloud Security Professional|Cloud Security|3 years|
|
||||
|'|[**CAP**](https://www.isc2.org/certifications/cgrc)|Certified Authorization Professional|Auditing|3 years|
|
||||
|'|[**CSSLP**](https://www.isc2.org/certifications/csslp)|Certified Secure Software Lifecycle Professional|Software Development|3 years|
|
||||
|[CompTIA](https://www.comptia.org/)|[**Security+**](https://www.comptia.org/certifications/security)|CompTIA Security+|IT-Administration|3 years|
|
||||
||[**CySA+**](https://www.comptia.org/certifications/cybersecurity-analyst)|CompTIA Cyber Security Analyst|Security Analysis|3 years|
|
||||
||[**PenTest+**](https://www.comptia.org/certifications/pentest)|CompTIA Pentest+|Penetration Testing|3 years|
|
||||
||[**CASP+**](https://www.comptia.org/certifications/comptia-advanced-security-practitioner)|CompTIA Advanced Security Practitioner|General Cyber Security|3 years|
|
||||
|'|[**CySA+**](https://www.comptia.org/certifications/cybersecurity-analyst)|CompTIA Cyber Security Analyst|Security Analysis|3 years|
|
||||
|'|[**PenTest+**](https://www.comptia.org/certifications/pentest)|CompTIA Pentest+|Penetration Testing|3 years|
|
||||
|'|[**CASP+**](https://www.comptia.org/certifications/comptia-advanced-security-practitioner)|CompTIA Advanced Security Practitioner|General Cyber Security|3 years|
|
||||
|[ISACA](https://www.isaca.org/)|[**CISA**](https://www.isaca.org/credentialing/cisa)|Certified Information Systems Auditor|Auditing|3 years|
|
||||
||[**CISM**](https://www.isaca.org/credentialing/cism)|Certified Information Security Manager|Management|3 years|
|
||||
||[**CRISC**](https://www.isaca.org/credentialing/crisc)|Certified In Risk and Information Systems Control|Risk Management|3 years|
|
||||
||[**CGEIT**](https://www.isaca.org/credentialing/cgeit)|Certified in the Governance of Enterprise IT|Management|3 years|
|
||||
||[**CSX-F**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Fundamentals|General Cyber Security|3 years|
|
||||
||[**CSX-T**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Technical Foundations|General Cyber Security|3 years|
|
||||
||[**CSX-P**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Practitioner|General Cyber Security|3 years|
|
||||
||[**CSX-A**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Audit|Auditing|3 years|
|
||||
||[**CDPSE**](https://www.isaca.org/credentialing/cdpse)|Certified Data Privacy Solutions Engineer|Data Priavcy|3 years|
|
||||
|GIAC|[**GSE**](https://www.giac.org/get-certified/giac-portfolio-certifications/?msc=main-nav)|Security Expert|General Cyber Security|4 years|
|
||||
||[**GSEC**](https://www.giac.org/certifications/security-essentials-gsec/)|Security Essentials|General Cyber Security|4 years|
|
||||
||[**GCIA**](https://www.giac.org/certifications/certified-intrusion-analyst-gcia/)|Certified Intrusion Analyst|Security Analysis|4 years|
|
||||
||[**GISF**](https://www.giac.org/certifications/information-security-fundamentals-gisf)|GIAC Information Security Fundamentals|General Cyber Security|4 years|
|
||||
||[**GCED**](https://www.giac.org/certifications/certified-enterprise-defender-gced)|Certified Enterprise Defender|Cyber Defense|4 years|
|
||||
||[**GCWN**](https://www.giac.org/certifications/certified-windows-security-administrator-gcwn)|Certified Windows Security Administrator|IT-Administration|4 years|
|
||||
||[**GPPA**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-perimeter-protection-analyst-gppa-re)|Certified Perimeter Protection Analyst|Firewalls|4 years|
|
||||
||[**GMON**](https://www.giac.org/certifications/continuous-monitoring-certification-gmon)|Continuous Monitoring Certification|Threat Intelligence|4 years|
|
||||
||[**GCCC**](https://www.giac.org/certifications/critical-controls-certification-gccc)|Critical Controls Certification|Cyber Defense|4 years|
|
||||
||[**GDSA**](https://www.giac.org/certifications/defensible-security-architecture-gdsa)|Defensible Security Architecture|Security Architecture|4 years|
|
||||
||[**GCUX**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-unix-security-administrator-gcux-ret)|Certified UNIX Security Administrator|IT-Administration|4 years|
|
||||
||[**GCDA**](https://www.giac.org/certifications/certified-detection-analyst-gcda)|Certified Detection Analyst|Threat Intelligence|4 years|
|
||||
||[**GDAT**](https://www.giac.org/certifications/defending-advanced-threats-gdat)|Defending Advanced Threats|Cyber Defense|4 years|
|
||||
||[**GCIH**](https://www.giac.org/certifications/certified-incident-handler-gcih)|Certified Incident Handler|Incident Response|4 years|
|
||||
||[**GPEN**](https://www.giac.org/certifications/penetration-tester-gpen)|Penetration Tester|Penetration Testing|4 years|
|
||||
||[**GWAPT**](https://www.giac.org/certifications/web-application-penetration-tester-gwapt)|Web Application Penetration Tester|Penetration Testing|4 years|
|
||||
||[**GXPN**](https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn)|Exploit Researcher and Advanced Penetration Tester|Penetration Testing|4 years|
|
||||
||[**GMOB**](https://www.giac.org/certifications/mobile-device-security-analyst-gmob)|Mobile Device Security Analyst|Security Analysis|4 years|
|
||||
||[**GAWN**](https://www.giac.org/certifications/assessing-auditing-wireless-networks-gawn)|Assessing and Auditing Wireless Networks|Wireless Security|4 years|
|
||||
||[**GPYC**](https://www.giac.org/certifications/python-coder-gpyc)|Python Coder|Software Development|4 years|
|
||||
||[**GCFA**](https://www.giac.org/certifications/certified-forensic-analyst-gcfa)|Certified Forensic Analyst|Forensics|4 years|
|
||||
||[**GCFE**](https://www.giac.org/certifications/certified-forensic-examiner-gcfe)|Certified Forensic Examiner|Forensics|4 years|
|
||||
||[**GREM**](https://www.giac.org/certifications/reverse-engineering-malware-grem)|Reverse Engineering Malware|Malware Analysis|4 years|
|
||||
||[**GNFA**](https://www.giac.org/certifications/network-forensic-analyst-gnfa)|Network Forensic Analyst|Forensics|4 years|
|
||||
||[**GCTI**](https://www.giac.org/certifications/cyber-threat-intelligence-gcti)|Cyber Threat Intelligence|Threat Intelligence|4 years|
|
||||
||[**GASF**](https://www.giac.org/certifications/advanced-smartphone-forensics-gasf)|Advanced Smartphone Forensics|Forensics|4 years|
|
||||
||[**GSLC**](https://www.giac.org/certifications/security-leadership-gslc)|Security Leadership|Management|4 years|
|
||||
||[**GSNA**](https://www.giac.org/certifications/systems-network-auditor-gsna)|Systems and Network Auditor|Auditing|4 years|
|
||||
||[**GISP**](https://www.giac.org/certifications/information-security-professional-gisp)|Information Security Professional|General Cyber Security|4 years|
|
||||
||[**GLEG**](https://www.giac.org/certifications/law-data-security-investigations-gleg)|Law of Data Security & Investigations|Forensics|4 years|
|
||||
||[**GCPM**](https://www.giac.org/certifications/certified-project-manager-gcpm)|Certified Project Manager|Management|4 years|
|
||||
||[**GSTRT**](https://www.giac.org/certifications/strategic-planning-policy-leadership-gstrt)|Strategic Planning, Policy, and Leadership|Management|4 years|
|
||||
||[**GSSP-JAVA**](https://www.sscsrl.com/giac-secure-software-programmer-java-gssp-java/)|Secure Software Programmer-Java|Software Development|4 years|
|
||||
||[**GSSP-.NET**](https://www.sscsrl.com/giac-secure-software-programmer-net-gssp-net/)|Secure Software Programmer- .NET|Software Development|4 years|
|
||||
||[**GWEB**](https://www.sscsrl.com/giac-certified-web-application-defender-gweb/)|Certified Web Application Defender|Software Development|4 years|
|
||||
||[**GICSP**](https://www.giac.org/certifications/global-industrial-cyber-security-professional-gicsp)|Global Industrial Cyber Security Professional|Critical Infrastructure Security|4 years|
|
||||
||[**GRID**](https://www.giac.org/certifications/response-industrial-defense-grid)|Response and Industrial Defense|Critical Infrastructure Security|4 years|
|
||||
||[**GCIP**](https://www.giac.org/certifications/critical-infrastructure-protection-gcip)|Critical Infrastructure Protection|Critical Infrastructure Security|4 years|
|
||||
||[**GEVA**](https://www.giac.org/certifications/enterprise-vulnerability-assessor-geva)|Enterprise Vulnerability Assessor|Vulnerability Management|4 years|
|
||||
||**GOSI**|Open Source Intelligence|Threat Intelligence|4 years|
|
||||
||[**GBFA**](https://www.giac.org/certifications/open-source-intelligence-gosi)|Battlefield Forensics and Acquisition|Forensics|4 years|
|
||||
||[**GCSA**](https://www.sscsrl.com/giac-cloud-security-automation-gcsa/)|Cloud Security Automation|Cloud Security|4 years|
|
||||
||[**GFCT**](https://www.giac.org/certifications/foundational-cybersecurity-technologies-gfact/)|Foundational Cybersecurity Technologies|Cyber Security|4 years|
|
||||
||[**GSOC**](https://www.giac.org/certifications/security-operations-certified-gsoc)|Security Operations Certified|Security Operations|4 years|
|
||||
||[**GPCS**](https://www.giac.org/certifications/public-cloud-security-gpcs)|Public Cloud Security|Cloud Security|4 years|
|
||||
|'|[**CISM**](https://www.isaca.org/credentialing/cism)|Certified Information Security Manager|Management|3 years|
|
||||
|'|[**CRISC**](https://www.isaca.org/credentialing/crisc)|Certified In Risk and Information Systems Control|Risk Management|3 years|
|
||||
|'|[**CGEIT**](https://www.isaca.org/credentialing/cgeit)|Certified in the Governance of Enterprise IT|Management|3 years|
|
||||
|'|[**CSX-F**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Fundamentals|General Cyber Security|3 years|
|
||||
|'|[**CSX-T**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Technical Foundations|General Cyber Security|3 years|
|
||||
|'|[**CSX-P**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Practitioner|General Cyber Security|3 years|
|
||||
|'|[**CSX-A**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Audit|Auditing|3 years|
|
||||
|'|[**CDPSE**](https://www.isaca.org/credentialing/cdpse)|Certified Data Privacy Solutions Engineer|Data Priavcy|3 years|
|
||||
|[**GIAC**](https://www.giac.org/)|[**GSE**](https://www.giac.org/get-certified/giac-portfolio-certifications/?msc=main-nav)|Security Expert|General Cyber Security|4 years|
|
||||
|'|[**GSEC**](https://www.giac.org/certifications/security-essentials-gsec/)|Security Essentials|General Cyber Security|4 years|
|
||||
|'|[**GCIA**](https://www.giac.org/certifications/certified-intrusion-analyst-gcia/)|Certified Intrusion Analyst|Security Analysis|4 years|
|
||||
|'|[**GISF**](https://www.giac.org/certifications/information-security-fundamentals-gisf)|GIAC Information Security Fundamentals|General Cyber Security|4 years|
|
||||
|'|[**GCED**](https://www.giac.org/certifications/certified-enterprise-defender-gced)|Certified Enterprise Defender|Cyber Defense|4 years|
|
||||
|'|[**GCWN**](https://www.giac.org/certifications/certified-windows-security-administrator-gcwn)|Certified Windows Security Administrator|IT-Administration|4 years|
|
||||
|'|[**GPPA**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-perimeter-protection-analyst-gppa-re)|Certified Perimeter Protection Analyst|Firewalls|4 years|
|
||||
|'|[**GMON**](https://www.giac.org/certifications/continuous-monitoring-certification-gmon)|Continuous Monitoring Certification|Threat Intelligence|4 years|
|
||||
|'|[**GCCC**](https://www.giac.org/certifications/critical-controls-certification-gccc)|Critical Controls Certification|Cyber Defense|4 years|
|
||||
|'|[**GDSA**](https://www.giac.org/certifications/defensible-security-architecture-gdsa)|Defensible Security Architecture|Security Architecture|4 years|
|
||||
|'|[**GCUX**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-unix-security-administrator-gcux-ret)|Certified UNIX Security Administrator|IT-Administration|4 years|
|
||||
|'|[**GCDA**](https://www.giac.org/certifications/certified-detection-analyst-gcda)|Certified Detection Analyst|Threat Intelligence|4 years|
|
||||
|'|[**GDAT**](https://www.giac.org/certifications/defending-advanced-threats-gdat)|Defending Advanced Threats|Cyber Defense|4 years|
|
||||
|'|[**GCIH**](https://www.giac.org/certifications/certified-incident-handler-gcih)|Certified Incident Handler|Incident Response|4 years|
|
||||
|'|[**GPEN**](https://www.giac.org/certifications/penetration-tester-gpen)|Penetration Tester|Penetration Testing|4 years|
|
||||
|'|[**GWAPT**](https://www.giac.org/certifications/web-application-penetration-tester-gwapt)|Web Application Penetration Tester|Penetration Testing|4 years|
|
||||
|'|[**GXPN**](https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn)|Exploit Researcher and Advanced Penetration Tester|Penetration Testing|4 years|
|
||||
|'|[**GMOB**](https://www.giac.org/certifications/mobile-device-security-analyst-gmob)|Mobile Device Security Analyst|Security Analysis|4 years|
|
||||
|'|[**GAWN**](https://www.giac.org/certifications/assessing-auditing-wireless-networks-gawn)|Assessing and Auditing Wireless Networks|Wireless Security|4 years|
|
||||
|'|[**GPYC**](https://www.giac.org/certifications/python-coder-gpyc)|Python Coder|Software Development|4 years|
|
||||
|'|[**GCFA**](https://www.giac.org/certifications/certified-forensic-analyst-gcfa)|Certified Forensic Analyst|Forensics|4 years|
|
||||
|'|[**GCFE**](https://www.giac.org/certifications/certified-forensic-examiner-gcfe)|Certified Forensic Examiner|Forensics|4 years|
|
||||
|'|[**GREM**](https://www.giac.org/certifications/reverse-engineering-malware-grem)|Reverse Engineering Malware|Malware Analysis|4 years|
|
||||
|'|[**GNFA**](https://www.giac.org/certifications/network-forensic-analyst-gnfa)|Network Forensic Analyst|Forensics|4 years|
|
||||
|'|[**GCTI**](https://www.giac.org/certifications/cyber-threat-intelligence-gcti)|Cyber Threat Intelligence|Threat Intelligence|4 years|
|
||||
|'|[**GASF**](https://www.giac.org/certifications/advanced-smartphone-forensics-gasf)|Advanced Smartphone Forensics|Forensics|4 years|
|
||||
|'|[**GSLC**](https://www.giac.org/certifications/security-leadership-gslc)|Security Leadership|Management|4 years|
|
||||
|'|[**GSNA**](https://www.giac.org/certifications/systems-network-auditor-gsna)|Systems and Network Auditor|Auditing|4 years|
|
||||
|'|[**GISP**](https://www.giac.org/certifications/information-security-professional-gisp)|Information Security Professional|General Cyber Security|4 years|
|
||||
|'|[**GLEG**](https://www.giac.org/certifications/law-data-security-investigations-gleg)|Law of Data Security & Investigations|Forensics|4 years|
|
||||
|'|[**GCPM**](https://www.giac.org/certifications/certified-project-manager-gcpm)|Certified Project Manager|Management|4 years|
|
||||
|'|[**GSTRT**](https://www.giac.org/certifications/strategic-planning-policy-leadership-gstrt)|Strategic Planning, Policy, and Leadership|Management|4 years|
|
||||
|'|[**GSSP-JAVA**](https://www.sscsrl.com/giac-secure-software-programmer-java-gssp-java/)|Secure Software Programmer-Java|Software Development|4 years|
|
||||
|'|[**GSSP-.NET**](https://www.sscsrl.com/giac-secure-software-programmer-net-gssp-net/)|Secure Software Programmer- .NET|Software Development|4 years|
|
||||
|'|[**GWEB**](https://www.sscsrl.com/giac-certified-web-application-defender-gweb/)|Certified Web Application Defender|Software Development|4 years|
|
||||
|'|[**GICSP**](https://www.giac.org/certifications/global-industrial-cyber-security-professional-gicsp)|Global Industrial Cyber Security Professional|Critical Infrastructure Security|4 years|
|
||||
|'|[**GRID**](https://www.giac.org/certifications/response-industrial-defense-grid)|Response and Industrial Defense|Critical Infrastructure Security|4 years|
|
||||
|'|[**GCIP**](https://www.giac.org/certifications/critical-infrastructure-protection-gcip)|Critical Infrastructure Protection|Critical Infrastructure Security|4 years|
|
||||
|'|[**GEVA**](https://www.giac.org/certifications/enterprise-vulnerability-assessor-geva)|Enterprise Vulnerability Assessor|Vulnerability Management|4 years|
|
||||
|'|[**GOSI**](https://www.giac.org/)|Open Source Intelligence|Threat Intelligence|4 years|
|
||||
|'|[**GBFA**](https://www.giac.org/certifications/open-source-intelligence-gosi)|Battlefield Forensics and Acquisition|Forensics|4 years|
|
||||
|'|[**GCSA**](https://www.sscsrl.com/giac-cloud-security-automation-gcsa/)|Cloud Security Automation|Cloud Security|4 years|
|
||||
|'|[**GFCT**](https://www.giac.org/certifications/foundational-cybersecurity-technologies-gfact/)|Foundational Cybersecurity Technologies|Cyber Security|4 years|
|
||||
|'|[**GSOC**](https://www.giac.org/certifications/security-operations-certified-gsoc)|Security Operations Certified|Security Operations|4 years|
|
||||
|'|[**GPCS**](https://www.giac.org/certifications/public-cloud-security-gpcs)|Public Cloud Security|Cloud Security|4 years|
|
||||
|[**CyberDefenders**](https://cyberdefenders.org/)|[**CCD**](https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/)|Certified CyberDefender|CyberDefense / BlueTeam|_No expiration_|
|
||||
|[**EC-Council**](https://en.wikipedia.org/wiki/EC-Council)|[**CSCU**](https://www.eccouncil.org/train-certify/certified-secure-computer-user-cscu/)|EC-Council Certified Secure Computer User|Security Awareness|_No expiration_|
|
||||
||[**CND**](https://www.eccouncil.org/train-certify/certified-network-security-course/)|EC-Council Certified Network Defender|Network Security|3 years|
|
||||
||[**CEH**](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/)|EC-Council [Certified Ethical Hacker](https://en.wikipedia.org/wiki/Certified_Ethical_Hacker)|Penetration Testing|3 years|
|
||||
||[**CEH-Practical (Master)**](https://www.eccouncil.org/train-certify/ceh-master/)|EC-Council Certified Ethical Hacker Practical (Master)|Penetration Testing|3 years|
|
||||
||[**ECSA**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst|Penetration Testing|3 years|
|
||||
||[**ECSA-Master (Practical)**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst (Practical)|Penetration Testing|3 years|
|
||||
||[**LPT-Master (Practical)**](https://cert.eccouncil.org/licensed-penetration-tester.html)|EC-Council Licensed Penetration Tester (Master)|Penetration Testing|1 year|
|
||||
||[**E\|ISM**](https://codered.eccouncil.org/course/iso-iec-27001-information-security-management?logged=false)|EC-Council Information Security Manager|Management|3 years|
|
||||
||[**CCISO**](https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/)|EC-Council Certified Chief Information Security Officer|Management|1 year|
|
||||
||[**ECIH**](https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/)|EC-Council Certified Incident Handler|Incident Response|3 years|
|
||||
||[**CHFI**](https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/)|EC-Council Computer Hacking Forensic Investigator|Forensics|3 years|
|
||||
||[**EDRP**](https://cert.eccouncil.org/ec-council-disaster-recovery-professional.html)|EC-Council Disaster Recovery Professional|Disaster Recovery|3 years|
|
||||
||[**ECES**](https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/)|EC-Council Certified Encryption Specialist|Encryption|3 years|
|
||||
||[**CASE Java**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/)|EC-Council Certified Application Security Engineer Java|Software Development|3 years|
|
||||
||[**CASE .Net**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/)|EC-Council Certified Application Security Engineer .Net|Software Development|3 years|
|
||||
||[**CTIA**](https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/)|EC-Council Certified Threat Intelligence Analyst|Threat Intelligence|3 years|
|
||||
||[**CSA**](https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/)|EC-Council Certified SOC Analyst|Security Analysis|3 years|
|
||||
||[**ECSS**](https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/)|EC-Council Certified Security Specialist|General Cyber Security|3 years|
|
||||
||[**CCSE**](https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/)|EC-Council Cloud Security Engineer|Cloud Security|3 years|
|
||||
|'|[**CND**](https://www.eccouncil.org/train-certify/certified-network-security-course/)|EC-Council Certified Network Defender|Network Security|3 years|
|
||||
|'|[**CEH**](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/)|EC-Council Certified Ethical Hacker|Penetration Testing|3 years|
|
||||
|'|[**CEH-Practical (Master)**](https://www.eccouncil.org/train-certify/ceh-master/)|EC-Council Certified Ethical Hacker Practical (Master)|Penetration Testing|3 years|
|
||||
|'|[**ECSA**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst|Penetration Testing|3 years|
|
||||
|'|[**ECSA-Master (Practical)**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst (Practical)|Penetration Testing|3 years|
|
||||
|'|[**LPT-Master (Practical)**](https://cert.eccouncil.org/licensed-penetration-tester.html)|EC-Council Licensed Penetration Tester (Master)|Penetration Testing|1 year|
|
||||
|'|[**E\|ISM**](https://codered.eccouncil.org/course/iso-iec-27001-information-security-management?logged=false)|EC-Council Information Security Manager|Management|3 years|
|
||||
|'|[**CCISO**](https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/)|EC-Council Certified Chief Information Security Officer|Management|1 year|
|
||||
|'|[**ECIH**](https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/)|EC-Council Certified Incident Handler|Incident Response|3 years|
|
||||
|'|[**CHFI**](https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/)|EC-Council Computer Hacking Forensic Investigator|Forensics|3 years|
|
||||
|'|[**EDRP**](https://cert.eccouncil.org/ec-council-disaster-recovery-professional.html)|EC-Council Disaster Recovery Professional|Disaster Recovery|3 years|
|
||||
|'|[**ECES**](https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/)|EC-Council Certified Encryption Specialist|Encryption|3 years|
|
||||
|'|[**CASE Java**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/)|EC-Council Certified Application Security Engineer Java|Software Development|3 years|
|
||||
|'|[**CASE .Net**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/)|EC-Council Certified Application Security Engineer .Net|Software Development|3 years|
|
||||
|'|[**CTIA**](https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/)|EC-Council Certified Threat Intelligence Analyst|Threat Intelligence|3 years|
|
||||
|'|[**CSA**](https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/)|EC-Council Certified SOC Analyst|Security Analysis|3 years|
|
||||
|'|[**ECSS**](https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/)|EC-Council Certified Security Specialist|General Cyber Security|3 years|
|
||||
|'|[**CCSE**](https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/)|EC-Council Cloud Security Engineer|Cloud Security|3 years|
|
||||
|[**OffSec**](https://www.offsec.com/)|[**OSCP**](https://www.offsec.com/courses/pen-200/)|OffSec Certified Professional|Penetration Testing|_No expiration_|
|
||||
||[**OSWP**](https://www.offsec.com/courses/pen-210/)|OffSec Wireless Professional|Penetration Testing|_No expiration_|
|
||||
||[**OSWA**](https://www.offsec.com/courses/web-200/)|OffSec Web Assessor|Penetration Testing|_No expiration_|
|
||||
||[**OSEP**](https://www.offsec.com/courses/pen-300/)|OffSec Experienced Penetration Tester|Penetration Testing|_No expiration_|
|
||||
||[**OSED**](https://www.offsec.com/courses/exp-301/)|OffSec Security Exploit Developer|Exploit Development|_No expiration_|
|
||||
||[**OSWE**](https://www.offsec.com/courses/web-300/)|OffSec Web Expert|Penetration Testing|_No expiration_|
|
||||
||[**OSCE3**](https://www.offsec.com/offsec/osce3-certification/)|OffSec Certified Expert3|Penetration Testing|_No expiration_|
|
||||
||[**OSEE**](https://www.offsec.com/courses/exp-401/)|OffSec Exploitation Expert|Exploit Development|_No expiration_|
|
||||
||[**OSDA**](https://www.offsec.com/courses/soc-200/)|OffSec Defensive Analyst|Security Operations|_No expiration_|
|
||||
||[**OSMR**](https://www.offsec.com/courses/exp-312/)|OffSec macOS Researcher|Exploit Development|_No expiration_|
|
||||
|[**EITCI**](https://eitci.org/)|[**EITCA/IS**](https://eitci.org/eitca-programme)|[EITCA Information Technologies Security Academy](https://en.wikipedia.org/wiki/European_Information_Technologies_Certification_Academy)|General Cyber Security|_No expiration_|
|
||||
|'|[**OSWP**](https://www.offsec.com/courses/pen-210/)|OffSec Wireless Professional|Penetration Testing|_No expiration_|
|
||||
|'|[**OSWA**](https://www.offsec.com/courses/web-200/)|OffSec Web Assessor|Penetration Testing|_No expiration_|
|
||||
|'|[**OSEP**](https://www.offsec.com/courses/pen-300/)|OffSec Experienced Penetration Tester|Penetration Testing|_No expiration_|
|
||||
|'|[**OSED**](https://www.offsec.com/courses/exp-301/)|OffSec Security Exploit Developer|Exploit Development|_No expiration_|
|
||||
|'|[**OSWE**](https://www.offsec.com/courses/web-300/)|OffSec Web Expert|Penetration Testing|_No expiration_|
|
||||
|'|[**OSCE3**](https://www.offsec.com/offsec/osce3-certification/)|OffSec Certified Expert3|Penetration Testing|_No expiration_|
|
||||
|'|[**OSEE**](https://www.offsec.com/courses/exp-401/)|OffSec Exploitation Expert|Exploit Development|_No expiration_|
|
||||
|'|[**OSDA**](https://www.offsec.com/courses/soc-200/)|OffSec Defensive Analyst|Security Operations|_No expiration_|
|
||||
|'|[**OSMR**](https://www.offsec.com/courses/exp-312/)|OffSec macOS Researcher|Exploit Development|_No expiration_|
|
||||
|[**EITCI**](https://eitci.org/)|[**EITCA/IS**](https://eitci.org/eitca-programme)|EITCA Information Technologies Security Academy|General Cyber Security|_No expiration_|
|
||||
|[**CSA**](https://cloudsecurityalliance.org/)|[**CCSK**](https://cloudsecurityalliance.org/education/ccsk/)|CSA Certificate of Cloud Security Knowledge|Cloud Security|_No expiration_|
|
||||
|[**Cloud Credential Council**](https://www.cloudcredential.org/)|[**PCSM**](https://www.cloudcredential.org/certifications/cloud/pcsm/)|CCC Professional Cloud Security Manager|Cloud Security|_No expiration_|
|
||||
|[**IAPP**](https://iapp.org/)|[**CIPP**](https://iapp.org/certify/cipp/)|[Certified Information Privacy Professional](https://en.wikipedia.org/wiki/Certified_Information_Privacy_Professional)|Privacy|2 years|
|
||||
||[**CIPM**](https://iapp.org/certify/cipm/)|Certified Information Privacy Manager|Privacy|2 years|
|
||||
||[**CIPT**](https://iapp.org/certify/cipt/)|Certified Information Privacy Technologist|Privacy|2 years|
|
||||
|[**IAPP**](https://iapp.org/)|[**CIPP**](https://iapp.org/certify/cipp/)|Certified Information Privacy Professional|Privacy|2 years|
|
||||
|'|[**CIPM**](https://iapp.org/certify/cipm/)|Certified Information Privacy Manager|Privacy|2 years|
|
||||
|'|[**CIPT**](https://iapp.org/certify/cipt/)|Certified Information Privacy Technologist|Privacy|2 years|
|
||||
|[**INE Security**](https://security.ine.com/)|[**eJPT**](https://security.ine.com/certifications/ejpt-certification/)|eLearnSecurity Certified Junior Penetration Tester|Penetration Testing|_No expiration_|
|
||||
||[**eCPPT**](https://security.ine.com/certifications/ecppt-certification/)|[eLearnSecurity Certified Professional Penetration Tester](https://en.wikipedia.org/wiki/ELearnSecurity_Certified_Professional_Penetration_Tester)|Penetration Testing|_No expiration_|
|
||||
||[**eWPT**](https://security.ine.com/certifications/ewpt-certification/)|eLearnSecurity Web Application Penetration Tester|Penetration Testing|_No expiration_|
|
||||
||[**eMAPT**](https://security.ine.com/certifications/emapt-certification/)|eLearnSecurity Mobile Application Penetration Tester|Penetration Testing|_No expiration_|
|
||||
||[**eCPTX**](https://security.ine.com/certifications/ewptx-certification/)|eLearnSecurity Certified Penetration Tester eXtreme|Penetration Testing|_No expiration_|
|
||||
||[**eCIR**](https://security.ine.com/certifications/ecir-certification/)|eLearnSecurity Certified Incident Response Professional|Incident Response|_No expiration_|
|
||||
||[**eCXD**](https://ine.com/learning/certifications/internal/offensive-security-exploit-developer)|eLearnSecurity Exploit Development|Penetration Testing|_No expiration_|
|
||||
||[**eNDP**](https://ine.com/learning/courses/network-defense-network-security)|eLearnSecurity Network Defense Professional|Network Security|_No expiration_|
|
||||
||[**eCRE**](https://ine.com/learning/paths/reverse-engineering-professional)|eLearnSecurity Certified Reverse Engineer|Malware Analysis|_No expiration_|
|
||||
||[**eCTHP**](https://security.ine.com/certifications/ecthp-certification/)|eLearnSecurity Certified Threat Hunting Professional|Threat Hunting|_No expiration_|
|
||||
||[**eCMAP**](https://my.ine.com/CyberSecurity/learning-paths/e831d3ee-18b5-4b46-b1a7-9f7b3d65feae/malware-analysis-professional)|eLearnSecurity Certified Malware Analysis Professional|Malware Analysis|_No expiration_|
|
||||
||[**eWDP**](https://my.ine.com/CyberSecurity/learning-paths/1d6ff88f-8d17-4156-91fb-5af9cfb71a37/web-defense-professional)|eLearnSecurity Web Defense Professional|Web Defense|_No expiration_|
|
||||
||[**eCDFP**](https://ine.com/learning/certifications/external/elearnsecurity-certified-digital-forensics-professional)|eLearnSecurity Certified Digital Forensics Professional|Digital Forensics|_No expiration_|
|
||||
|'|[**eCPPT**](https://security.ine.com/certifications/ecppt-certification/)|eLearnSecurity Certified Professional Penetration Tester|Penetration Testing|_No expiration_|
|
||||
|'|[**eWPT**](https://security.ine.com/certifications/ewpt-certification/)|eLearnSecurity Web Application Penetration Tester|Penetration Testing|_No expiration_|
|
||||
|'|[**eMAPT**](https://security.ine.com/certifications/emapt-certification/)|eLearnSecurity Mobile Application Penetration Tester|Penetration Testing|_No expiration_|
|
||||
|'|[**eCPTX**](https://security.ine.com/certifications/ewptx-certification/)|eLearnSecurity Certified Penetration Tester eXtreme|Penetration Testing|_No expiration_|
|
||||
|'|[**eCIR**](https://security.ine.com/certifications/ecir-certification/)|eLearnSecurity Certified Incident Response Professional|Incident Response|_No expiration_|
|
||||
|'|[**eCXD**](https://ine.com/learning/certifications/internal/offensive-security-exploit-developer)|eLearnSecurity Exploit Development|Penetration Testing|_No expiration_|
|
||||
|'|[**eNDP**](https://ine.com/learning/courses/network-defense-network-security)|eLearnSecurity Network Defense Professional|Network Security|_No expiration_|
|
||||
|'|[**eCRE**](https://ine.com/learning/paths/reverse-engineering-professional)|eLearnSecurity Certified Reverse Engineer|Malware Analysis|_No expiration_|
|
||||
|'|[**eCTHP**](https://security.ine.com/certifications/ecthp-certification/)|eLearnSecurity Certified Threat Hunting Professional|Threat Hunting|_No expiration_|
|
||||
|'|[**eCMAP**](https://my.ine.com/CyberSecurity/learning-paths/e831d3ee-18b5-4b46-b1a7-9f7b3d65feae/malware-analysis-professional)|eLearnSecurity Certified Malware Analysis Professional|Malware Analysis|_No expiration_|
|
||||
|'|[**eWDP**](https://my.ine.com/CyberSecurity/learning-paths/1d6ff88f-8d17-4156-91fb-5af9cfb71a37/web-defense-professional)|eLearnSecurity Web Defense Professional|Web Defense|_No expiration_|
|
||||
|'|[**eCDFP**](https://ine.com/learning/certifications/external/elearnsecurity-certified-digital-forensics-professional)|eLearnSecurity Certified Digital Forensics Professional|Digital Forensics|_No expiration_|
|
||||
|[**CREST**](https://www.crest-approved.org/)|[**CPSA**](https://www.crest-approved.org/skills-certifications-careers/crest-practitioner-security-analyst/)|CREST Practitioner Security Analyst|Penetration Testing|3 Years|
|
||||
||[**CRT**](https://www.crest-approved.org/skills-certifications-careers/crest-registered-penetration-tester/)|CREST Registered Penetration Tester|Penetration Testing|3 Years|
|
||||
||[**CCT App**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-web-application-tester/)|CREST Certified Web Application Tester|Penetration Testing|3 Years|
|
||||
||[**CCT Inf**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-infrastructure-tester/)|CREST Certified Infrastructure Tester|Penetration Testing|3 Years|
|
||||
||[**CCSAS**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-specialist/)|CREST Certified Simulated Attack Specialist|Attack Simulation|3 Years|
|
||||
||[**CCSAM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-manager/)|CREST Certified Simulated Attack Manager|Attack Simulation|3 Years|
|
||||
||[**CCWS**](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/)|CREST Certified Wireless Specialist|Wireless security|3 Years|
|
||||
||[**CPTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-threat-intelligence-analyst/)|CREST Practitioner Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||
||[**CRTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-threat-intelligence-analyst/)|CREST Registered Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||
||[**CCTIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-threat-intelligence-manager/)|CREST Certified Threat Intelligence Manager|Threat Intelligence|3 Years|
|
||||
||[**CPIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-intrusion-analyst/)|CREST Practitioner Intrusion Analyst|Security Analysis|3 Years|
|
||||
||[**CRIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-intrusion-analyst/)|CREST Registered Intrusion Analyst|Security Analysis|3 Years|
|
||||
||[**CCNIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-network-intrusion-analyst/)|CREST Certified Network Intrusion Analyst|Security Analysis|3 Years|
|
||||
||[**CCHIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-host-intrusion-analyst/)|CREST Certified Host Intrusion Analyst|Security Analysis|3 Years|
|
||||
||[**CCMRE**](https://firebrand.training/en/courses/crest/certified-malware-reverse-engineer-certification)|CREST Certified Malware Reverse Engineer|Malware Analysis|3 Years|
|
||||
||[**CCIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-incident-manager/)|CREST Certified Incident Manager|Incident Response|3 Years|
|
||||
||[**CRTSA**](https://www.crest-approved.org/wp-content/uploads/2022/04/CRTSA-Guide-v3.0.pdf)|CREST Registered Technical Security Architect|Security Architecture|3 Years|
|
||||
|'|[**CRT**](https://www.crest-approved.org/skills-certifications-careers/crest-registered-penetration-tester/)|CREST Registered Penetration Tester|Penetration Testing|3 Years|
|
||||
|'|[**CCT App**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-web-application-tester/)|CREST Certified Web Application Tester|Penetration Testing|3 Years|
|
||||
|'|[**CCT Inf**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-infrastructure-tester/)|CREST Certified Infrastructure Tester|Penetration Testing|3 Years|
|
||||
|'|[**CCSAS**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-specialist/)|CREST Certified Simulated Attack Specialist|Attack Simulation|3 Years|
|
||||
|'|[**CCSAM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-manager/)|CREST Certified Simulated Attack Manager|Attack Simulation|3 Years|
|
||||
|'|[**CCWS**](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/)|CREST Certified Wireless Specialist|Wireless security|3 Years|
|
||||
|'|[**CPTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-threat-intelligence-analyst/)|CREST Practitioner Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||
|'|[**CRTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-threat-intelligence-analyst/)|CREST Registered Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||
|'|[**CCTIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-threat-intelligence-manager/)|CREST Certified Threat Intelligence Manager|Threat Intelligence|3 Years|
|
||||
|'|[**CPIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-intrusion-analyst/)|CREST Practitioner Intrusion Analyst|Security Analysis|3 Years|
|
||||
|'|[**CRIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-intrusion-analyst/)|CREST Registered Intrusion Analyst|Security Analysis|3 Years|
|
||||
|'|[**CCNIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-network-intrusion-analyst/)|CREST Certified Network Intrusion Analyst|Security Analysis|3 Years|
|
||||
|'|[**CCHIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-host-intrusion-analyst/)|CREST Certified Host Intrusion Analyst|Security Analysis|3 Years|
|
||||
|'|[**CCMRE**](https://firebrand.training/en/courses/crest/certified-malware-reverse-engineer-certification)|CREST Certified Malware Reverse Engineer|Malware Analysis|3 Years|
|
||||
|'|[**CCIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-incident-manager/)|CREST Certified Incident Manager|Incident Response|3 Years|
|
||||
|'|[**CRTSA**](https://www.crest-approved.org/wp-content/uploads/2022/04/CRTSA-Guide-v3.0.pdf)|CREST Registered Technical Security Architect|Security Architecture|3 Years|
|
||||
|[**InfoSec Institute**](https://www.infosecinstitute.com)|[**CCFE**](https://www.infosecinstitute.com/skills/learning-paths/certified-computer-forensics-examiner-ccfe/)|Certified Computer Forensics Examiner|Forensics|4 years|
|
||||
||[**CCTHP**](https://www.infosecinstitute.com/skills/learning-paths/cyber-threat-hunting/)|Certified Cyber Threat Hunting Professional|Threat Hunting|4 years|
|
||||
||[**CDRP**](https://www.infosecinstitute.com/courses/data-recovery-boot-camp/)|Certified Data Recovery Professional|Disaster Recovery|4 years|
|
||||
||[**CEPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-expert-penetration-tester-cept/)|Certified Expert Penetration Tester|Penetration Testing|4 years|
|
||||
||[**CEREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Expert Reverse Engineering Analyst|Malware Analysis|4 years|
|
||||
||[**CMWAPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-mobile-and-web-app-penetration-tester-cmwapt/)|Certified Mobile and Web Application Penetration Tester|Penetration Testing|4 years|
|
||||
||[**CMFE**](https://www.infosecinstitute.com/courses/mobile-forensics-training-boot-camp/)|Certified Mobile Forensics Examiner|Forensics|4 years|
|
||||
||[**CPT**](https://www.infosecinstitute.com/skills/roles/penetration-tester/)|Certified Penetration Tester|Penetration Testing|4 years|
|
||||
||[**CRTOP**](https://www.infosecinstitute.com/courses/red-team-operations/)|Certified Red Team Operations Professional|Red Teaming|4 years|
|
||||
||[**CREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Reverse Engineering Analyst|Malware Analysis|4 years|
|
||||
||[**CSSA**](https://www.infosecinstitute.com/skills/courses/introduction-to-scada-security/)|Certified SCADA Security Architect|Critical Infrastructure Security|4 years|
|
||||
||[**CSAP**](https://www.infosecinstitute.com/skills/learning-paths/certified-security-awareness-practitioner/)|Certified Security Awareness Practitioner|Security Awareness|4 years|
|
||||
|'|[**CCTHP**](https://www.infosecinstitute.com/skills/learning-paths/cyber-threat-hunting/)|Certified Cyber Threat Hunting Professional|Threat Hunting|4 years|
|
||||
|'|[**CDRP**](https://www.infosecinstitute.com/courses/data-recovery-boot-camp/)|Certified Data Recovery Professional|Disaster Recovery|4 years|
|
||||
|'|[**CEPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-expert-penetration-tester-cept/)|Certified Expert Penetration Tester|Penetration Testing|4 years|
|
||||
|'|[**CEREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Expert Reverse Engineering Analyst|Malware Analysis|4 years|
|
||||
|'|[**CMWAPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-mobile-and-web-app-penetration-tester-cmwapt/)|Certified Mobile and Web Application Penetration Tester|Penetration Testing|4 years|
|
||||
|'|[**CMFE**](https://www.infosecinstitute.com/courses/mobile-forensics-training-boot-camp/)|Certified Mobile Forensics Examiner|Forensics|4 years|
|
||||
|'|[**CPT**](https://www.infosecinstitute.com/skills/roles/penetration-tester/)|Certified Penetration Tester|Penetration Testing|4 years|
|
||||
|'|[**CRTOP**](https://www.infosecinstitute.com/courses/red-team-operations/)|Certified Red Team Operations Professional|Red Teaming|4 years|
|
||||
|'|[**CREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Reverse Engineering Analyst|Malware Analysis|4 years|
|
||||
|'|[**CSSA**](https://www.infosecinstitute.com/skills/courses/introduction-to-scada-security/)|Certified SCADA Security Architect|Critical Infrastructure Security|4 years|
|
||||
|'|[**CSAP**](https://www.infosecinstitute.com/skills/learning-paths/certified-security-awareness-practitioner/)|Certified Security Awareness Practitioner|Security Awareness|4 years|
|
||||
|[**Cyber Struggle**](https://cyberstruggle.org)|[**CSAE**](https://cyberstruggle.org/aegis-certification/)|Cyber Struggle Aegis|Security Analysis|N/A|
|
||||
||[**CSR**](https://cyberstruggle.org/ranger-certification/)|Cyber Struggle Ranger|Red Teaming|N/A|
|
||||
||[**CSTPO**](https://cyberstruggle.org/cyberstruggle-tactical-pistol-operator/)|Cyber Struggle Tactical Pistol Operator|Tactical fire gun shooting|N/A|
|
||||
|[**Linux Professional Institute (LPI)**](https://en.wikipedia.org/wiki/Linux_Professional_Institute)|[**SecE**](https://www.lpi.org/pt-br/)|[Linux Professional Institute Security Essentials](https://en.wikipedia.org/wiki/Linux_Professional_Institute_Certification_Programs#Linux_Professional_Institute_Security_Essentials)|General Cyber Security|No expiration|
|
||||
||[**LPIC-3 Security**](https://www.lpi.org/pt-br/our-certifications/lpic-3-303-overview/)|[Linux Professional Institute LPIC-3 Security](https://en.wikipedia.org/wiki/Linux_Professional_Institute_Certification_Programs#LPIC-3_Security)|IT-Administration|5 years|
|
||||
|'|[**CSR**](https://cyberstruggle.org/ranger-certification/)|Cyber Struggle Ranger|Red Teaming|N/A|
|
||||
|'|[**CSTPO**](https://cyberstruggle.org/cyberstruggle-tactical-pistol-operator/)|Cyber Struggle Tactical Pistol Operator|Tactical fire gun shooting|N/A|
|
||||
|[**Linux Professional Institute (LPI)**](https://www.lpi.org/)|[**SecE**](https://www.lpi.org/our-certifications/security-essentials-overview/)|[Linux Professional Institute Security Essentials]|General Cyber Security|_No expiration_|
|
||||
|'|[**LPIC-3 Security**](https://www.lpi.org/pt-br/our-certifications/lpic-3-303-overview/)|Linux Professional Institute LPIC-3 Security|IT-Administration|5 years|
|
||||
|[**Mile2**](https://mile2.com)|[**C)SA1**](https://mile2.com/csa1-outline/)|Certified Security Awareness 1|Security Awareness|3 Years|
|
||||
||[**C)SA2**](https://mile2.com/csa1-outline/)|Certified Security Awareness 2|Security Awareness|3 Years|
|
||||
||[**C)SP**](https://mile2.com/csp_outline/)|Certified Security Principles|General Cyber Security|3 Years|
|
||||
||[**C)ISSO**](https://mile2.com/cisso_outline/)|Certified Information Systems Security Officer|Management|3 Years|
|
||||
||[**IS20**](https://mile2.com/is18_outline/)|Information Security 20 Security Controls|General Cyber Security|3 Years|
|
||||
||[**C)SLO**](https://mile2.com/cslo_outline/)|Certified Security Leadership Officer|Management|3 Years|
|
||||
||[**C)VA**](https://mile2.com/vulnerability-assessor-outline/)|Certified Vulnerability Assessor|Vulnerability Management|3 Years|
|
||||
||[**C)PEH**](https://mile2.com/professional-ethical-hacker/)|Certified Professional Ethical Hacker|Penetration Testing|3 Years|
|
||||
||[**C)PTE**](https://mile2.com/penetration-testing-engineer-outline/)|Certified Penetration Tester|Penetration Testing|3 Years|
|
||||
||[**C)PTC**](https://mile2.com/cptc_outline/)|Certified Penetration Testing Consultant|Penetration Testing|3 Years|
|
||||
||[**C)PSH**](https://mile2.com/cpSH_outline/)|Certified PowerShell Hacker|Scripting|3 Years|
|
||||
||[**C)IHE**](https://mile2.com/cihe_outline/)|Certified Incident Handling Engineer|Incident Response|3 Years|
|
||||
||[**C)DFE**](https://mile2.com/cdfe_outline/)|Certified Digital Forensic Examiner|Forensics|3 Years|
|
||||
||[**C)VFE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Forensics Engineer|Forensics|3 Years|
|
||||
||[**C)NFE**](https://mile2.com/network-forensics-examiner-outline/)|Certified Network Forensics Examiner|Forensics|3 Years|
|
||||
||[**C)DRE**](https://mile2.com/cdre_outline/)|Certified Disaster Recovery Engineer|Disaster Recovery|3 Years|
|
||||
||[**C)HISSP**](https://mile2.com/chissp_outline/)|Certified Healthcare Information Systems Security Professional|Healthcare|3 Years|
|
||||
||[**C)ISMS-LA**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Auditor|Auditing|3 Years|
|
||||
||[**C)ISMS-LI**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Implementer|Risk Management|3 Years|
|
||||
||[**C)ISSA**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Security Systems Auditor|Auditing|3 Years|
|
||||
||[**C)SWAE**](https://mile2.com/role-based-certification-roadmap/)|Certified Secure Web Application Engineer|Application Security|3 Years|
|
||||
||[**C)VCP**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Principles|Virtualization|3 Years|
|
||||
||[**C)VE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Engineer|Virtualization|3 Years|
|
||||
||[**C)CSO**](https://mile2.com/ccso_outline/)|Certified Cloud Security Officer|Cloud Security|3 Years|
|
||||
||[**C)VSE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Systems Engineer|Virtualization|3 Years|
|
||||
||[**C)ISSM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Security Manager|Management|3 Years|
|
||||
||[**C)ISRM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Risk Manager|Risk Management|3 Years|
|
||||
||[**ISCAP**](https://mile2.com/role-based-certification-roadmap/)|Information Systems Certification & Accreditation Professional|Auditing|3 Years|
|
||||
||[**C)SWAE**](https://mile2.com/cswae_outline/)|Certified Secure Web Application Engineer|Web Security|3 Years|
|
||||
||[**C)ISS**](https://mile2.com/role-based-certification-roadmap/)|Certified IPv6 Security Specialist|Network Security|3 Years|
|
||||
||[**C)CSA**](https://mile2.com/ccsa_outline/)|Certified Cybersecurity Analyst|Security Analysis|3 Years|
|
||||
||[**C)CTA**](https://mile2.com/role-based-certification-roadmap/)|Certified Cyber Threat Analyst|Security Analysis|3 Years|
|
||||
||[**C)CTIA**](https://mile2.com/threat-analyst/)|Certified Cyber Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||
|'|[**C)SA2**](https://mile2.com/csa1-outline/)|Certified Security Awareness 2|Security Awareness|3 Years|
|
||||
|'|[**C)SP**](https://mile2.com/csp_outline/)|Certified Security Principles|General Cyber Security|3 Years|
|
||||
|'|[**C)ISSO**](https://mile2.com/cisso_outline/)|Certified Information Systems Security Officer|Management|3 Years|
|
||||
|'|[**IS20**](https://mile2.com/is18_outline/)|Information Security 20 Security Controls|General Cyber Security|3 Years|
|
||||
|'|[**C)SLO**](https://mile2.com/cslo_outline/)|Certified Security Leadership Officer|Management|3 Years|
|
||||
|'|[**C)VA**](https://mile2.com/vulnerability-assessor-outline/)|Certified Vulnerability Assessor|Vulnerability Management|3 Years|
|
||||
|'|[**C)PEH**](https://mile2.com/professional-ethical-hacker/)|Certified Professional Ethical Hacker|Penetration Testing|3 Years|
|
||||
|'|[**C)PTE**](https://mile2.com/penetration-testing-engineer-outline/)|Certified Penetration Tester|Penetration Testing|3 Years|
|
||||
|'|[**C)PTC**](https://mile2.com/cptc_outline/)|Certified Penetration Testing Consultant|Penetration Testing|3 Years|
|
||||
|'|[**C)PSH**](https://mile2.com/cpSH_outline/)|Certified PowerShell Hacker|Scripting|3 Years|
|
||||
|'|[**C)IHE**](https://mile2.com/cihe_outline/)|Certified Incident Handling Engineer|Incident Response|3 Years|
|
||||
|'|[**C)DFE**](https://mile2.com/cdfe_outline/)|Certified Digital Forensic Examiner|Forensics|3 Years|
|
||||
|'|[**C)VFE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Forensics Engineer|Forensics|3 Years|
|
||||
|'|[**C)NFE**](https://mile2.com/network-forensics-examiner-outline/)|Certified Network Forensics Examiner|Forensics|3 Years|
|
||||
|'|[**C)DRE**](https://mile2.com/cdre_outline/)|Certified Disaster Recovery Engineer|Disaster Recovery|3 Years|
|
||||
|'|[**C)HISSP**](https://mile2.com/chissp_outline/)|Certified Healthcare Information Systems Security Professional|Healthcare|3 Years|
|
||||
|'|[**C)ISMS-LA**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Auditor|Auditing|3 Years|
|
||||
|'|[**C)ISMS-LI**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Implementer|Risk Management|3 Years|
|
||||
|'|[**C)ISSA**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Security Systems Auditor|Auditing|3 Years|
|
||||
|'|[**C)SWAE**](https://mile2.com/role-based-certification-roadmap/)|Certified Secure Web Application Engineer|Application Security|3 Years|
|
||||
|'|[**C)VCP**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Principles|Virtualization|3 Years|
|
||||
|'|[**C)VE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Engineer|Virtualization|3 Years|
|
||||
|'|[**C)CSO**](https://mile2.com/ccso_outline/)|Certified Cloud Security Officer|Cloud Security|3 Years|
|
||||
|'|[**C)VSE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Systems Engineer|Virtualization|3 Years|
|
||||
|'|[**C)ISSM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Security Manager|Management|3 Years|
|
||||
|'|[**C)ISRM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Risk Manager|Risk Management|3 Years|
|
||||
|'|[**ISCAP**](https://mile2.com/role-based-certification-roadmap/)|Information Systems Certification & Accreditation Professional|Auditing|3 Years|
|
||||
|'|[**C)SWAE**](https://mile2.com/cswae_outline/)|Certified Secure Web Application Engineer|Web Security|3 Years|
|
||||
|'|[**C)ISS**](https://mile2.com/role-based-certification-roadmap/)|Certified IPv6 Security Specialist|Network Security|3 Years|
|
||||
|'|[**C)CSA**](https://mile2.com/ccsa_outline/)|Certified Cybersecurity Analyst|Security Analysis|3 Years|
|
||||
|'|[**C)CTA**](https://mile2.com/role-based-certification-roadmap/)|Certified Cyber Threat Analyst|Security Analysis|3 Years|
|
||||
|'|[**C)CTIA**](https://mile2.com/threat-analyst/)|Certified Cyber Threat Intelligence Analyst|Threat Intelligence|3 Years|
|
||||
|[**ASIS International**](https://www.asisonline.org)|[**CPP**](https://www.asisonline.org/certification/certified-protection-professional-cpp/)|Certified Protection Professional|Management|3 Years|
|
||||
||[**APP**](https://www.asisonline.org/certification/associate-protection-professional-app/)|Associate Protection Professional|Management|3 Years|
|
||||
||[**PCI**](https://www.asisonline.org/certification/professional-certified-investigator-pci/)|Professional Certified Investigator|Forensics|3 Years|
|
||||
||[**PSP**](https://www.asisonline.org/certification/physical-security-professional/)|Physical Security Professional|Physical Security|3 Years|
|
||||
|'|[**APP**](https://www.asisonline.org/certification/associate-protection-professional-app/)|Associate Protection Professional|Management|3 Years|
|
||||
|'|[**PCI**](https://www.asisonline.org/certification/professional-certified-investigator-pci/)|Professional Certified Investigator|Forensics|3 Years|
|
||||
|'|[**PSP**](https://www.asisonline.org/certification/physical-security-professional/)|Physical Security Professional|Physical Security|3 Years|
|
||||
|[**SABSA**](https://sabsa.org/)|[**SABSA-SCF**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Foundation Certificate|Security Architecture|3 Years|
|
||||
||[**SABSA-SCP**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Practitioner Certificate|Security Architecture|3 Years|
|
||||
||[**SABSA-SCM**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Master Certificate|Security Architecture|3 Years|
|
||||
|'|[**SABSA-SCP**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Practitioner Certificate|Security Architecture|3 Years|
|
||||
|'|[**SABSA-SCM**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Master Certificate|Security Architecture|3 Years|
|
||||
|[**APMG International**](https://apmg-international.com/)|[**ISO/IEC 27001-F**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Foundation|Standards|_No expiration_|
|
||||
||[**ISO/IEC 27001-P ISO**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Practitioner - Information Security Officer|Standards|_No expiration_|
|
||||
||[**NCSP-F**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Foundation|Standards|_No expiration_|
|
||||
||[**NCSP-P**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Practiioner|Standards|_No expiration_|
|
||||
|'|[**ISO/IEC 27001-P ISO**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Practitioner - Information Security Officer|Standards|_No expiration_|
|
||||
|'|[**NCSP-F**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Foundation|Standards|_No expiration_|
|
||||
|'|[**NCSP-P**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Practiioner|Standards|_No expiration_|
|
||||
|[**EXIN**](https://www.exin.com/)|[**PDP-E**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Essentials|Privacy|_No expiration_|
|
||||
||[**PDP-F**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Foundation|Privacy|_No expiration_|
|
||||
||[**PDP-P**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy and Data Protection Practitioner|Privacy|_No expiration_|
|
||||
||[**CIT-F**](https://www.exin.com/pt-br/data-protection-security/exin-cyber-and-it-security/exin-cyber-and-it-security-foundation/)|EXIN Cyber & IT Security Foundation|General Cyber Security|_No expiration_|
|
||||
||[**CEF**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-information-security-officer/)|EXIN Ethical Hacking Foundation|Penetration Testing|_No expiration_|
|
||||
||[**ISO/IEC 27001-F**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Foundation|Standards|_No expiration_|
|
||||
||[**ISO/IEC 27001-P**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Professional|Standards|_No expiration_|
|
||||
||[**ISO/IEC 27001-E**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Expert|Standards|_No expiration_|
|
||||
||[**SP-F**](https://www.exin.com/)|EXIN Secure Programming Foundation|Software Development|_No expiration_|
|
||||
|'|[**PDP-F**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Foundation|Privacy|_No expiration_|
|
||||
|'|[**PDP-P**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy and Data Protection Practitioner|Privacy|_No expiration_|
|
||||
|'|[**CIT-F**](https://www.exin.com/pt-br/data-protection-security/exin-cyber-and-it-security/exin-cyber-and-it-security-foundation/)|EXIN Cyber & IT Security Foundation|General Cyber Security|_No expiration_|
|
||||
|'|[**CEF**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-information-security-officer/)|EXIN Ethical Hacking Foundation|Penetration Testing|_No expiration_|
|
||||
|'|[**ISO/IEC 27001-F**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Foundation|Standards|_No expiration_|
|
||||
|'|[**ISO/IEC 27001-P**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Professional|Standards|_No expiration_|
|
||||
|'|[**ISO/IEC 27001-E**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Expert|Standards|_No expiration_|
|
||||
|'|[**SP-F**](https://www.exin.com/)|EXIN Secure Programming Foundation|Software Development|_No expiration_|
|
||||
|[**IBITGQ**](https://www.ibitgq.org/)|[**EU GDPR F**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Foundation|Standards|_No expiration_|
|
||||
||[**EU GDPR P**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Practitioner|Standards|_No expiration_|
|
||||
||[**C-DPO**](https://www.ibitgq.org/exams)|Certified Data Protection Officer|Privacy|_No expiration_|
|
||||
||[**C BS PIMS LI**](https://www.ibitgq.org/exams)|Certified BS 10012 PIMS Lead Implementer|Standards|_No expiration_|
|
||||
||[**CCPA F**](https://www.ibitgq.org/exams)|California Consumer Privacy Act Foundation|Privacy|_No expiration_|
|
||||
||[**C IDP F**](https://www.ibitgq.org/exams)|Certified Introduction to Data Protection|Privacy|_No expiration_|
|
||||
||[**CIS F**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Foundation|Standards|_No expiration_|
|
||||
||[**CIS LI**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Implementer|Standards|_No expiration_|
|
||||
||[**CIS LA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Auditor|Standards|_No expiration_|
|
||||
||[**CIS IA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Internal Auditor|Standards|_No expiration_|
|
||||
||[**CISRM**](https://www.ibitgq.org/exams)|Certified ISO 27005 ISMS Risk Management|Standards|_No expiration_|
|
||||
||[**PCI IM**](https://www.ibitgq.org/exams)|PCI DSS Implementation|Standards|_No expiration_|
|
||||
||[**CCRMP**](https://www.ibitgq.org/exams)|Managing Cyber Security Risk|Management|_No expiration_|
|
||||
||[**CIRM F**](https://www.ibitgq.org/exams)|Cyber Incident Response Management Foundation|Incident Response|_No expiration_|
|
||||
||[**C CR P**](https://www.ibitgq.org/exams)|Certified Cyber Resilience Practitioner|Management|_No expiration_|
|
||||
||[**CITGP**](https://www.ibitgq.org/exams)|Implementing IT Governance – Foundation & Principles|Management|_No expiration_|
|
||||
||[**C CS F**](https://www.ibitgq.org/exams)|Certified Cyber Security Foundation|General Cyber Security|_No expiration_|
|
||||
|'|[**EU GDPR P**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Practitioner|Standards|_No expiration_|
|
||||
|'|[**C-DPO**](https://www.ibitgq.org/exams)|Certified Data Protection Officer|Privacy|_No expiration_|
|
||||
|'|[**C BS PIMS LI**](https://www.ibitgq.org/exams)|Certified BS 10012 PIMS Lead Implementer|Standards|_No expiration_|
|
||||
|'|[**CCPA F**](https://www.ibitgq.org/exams)|California Consumer Privacy Act Foundation|Privacy|_No expiration_|
|
||||
|'|[**C IDP F**](https://www.ibitgq.org/exams)|Certified Introduction to Data Protection|Privacy|_No expiration_|
|
||||
|'|[**CIS F**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Foundation|Standards|_No expiration_|
|
||||
|'|[**CIS LI**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Implementer|Standards|_No expiration_|
|
||||
|'|[**CIS LA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Auditor|Standards|_No expiration_|
|
||||
|'|[**CIS IA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Internal Auditor|Standards|_No expiration_|
|
||||
|'|[**CISRM**](https://www.ibitgq.org/exams)|Certified ISO 27005 ISMS Risk Management|Standards|_No expiration_|
|
||||
|'|[**PCI IM**](https://www.ibitgq.org/exams)|PCI DSS Implementation|Standards|_No expiration_|
|
||||
|'|[**CCRMP**](https://www.ibitgq.org/exams)|Managing Cyber Security Risk|Management|_No expiration_|
|
||||
|'|[**CIRM F**](https://www.ibitgq.org/exams)|Cyber Incident Response Management Foundation|Incident Response|_No expiration_|
|
||||
|'|[**C CR P**](https://www.ibitgq.org/exams)|Certified Cyber Resilience Practitioner|Management|_No expiration_|
|
||||
|'|[**CITGP**](https://www.ibitgq.org/exams)|Implementing IT Governance – Foundation & Principles|Management|_No expiration_|
|
||||
|'|[**C CS F**](https://www.ibitgq.org/exams)|Certified Cyber Security Foundation|General Cyber Security|_No expiration_|
|
||||
|[**CertNexus**](https://certnexus.com/)|[**CFR**](https://certnexus.com/cybersec-first-responder-cfr/)|CyberSec First Responder|Incident Response|3 Years|
|
||||
||[**CIOTSP**](https://certnexus.com/certified-iot-security-practitioner-ciotsp/)|Certified IoT Security Practitioner (CIoTSP)|IoT|3 Years|
|
||||
||[**IRBIZ**](https://certnexus.com/irbiz/)|Incident Response for Business Professionals|Incident Response|3 Years|
|
||||
||[**CSC**](https://certnexus.com/cyber-secure-coder/)|Cyber Secure Coder|Software Development|3 Years|
|
||||
||[**CYBERSAFE**](https://certnexus.com/cybersafe/)|CyberSAFE|End user security|1 Year|
|
||||
|'|[**CIOTSP**](https://certnexus.com/certified-iot-security-practitioner-ciotsp/)|Certified IoT Security Practitioner (CIoTSP)|IoT|3 Years|
|
||||
|'|[**IRBIZ**](https://certnexus.com/irbiz/)|Incident Response for Business Professionals|Incident Response|3 Years|
|
||||
|'|[**CSC**](https://certnexus.com/cyber-secure-coder/)|Cyber Secure Coder|Software Development|3 Years|
|
||||
|'|[**CYBERSAFE**](https://certnexus.com/cybersafe/)|CyberSAFE|End user security|1 Year|
|
||||
|[**Lunarline**](https://lunarline.com/)|[**CEHT**](https://lunarline.com/)|Certified Expert Hunt Team|Threat Hunting|3 Years|
|
||||
||[**CECS**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/cloud-fedramp-consulting-and-training/)|Certified Expert Cloud Security|Cloud Security|3 Years|
|
||||
||[**CEIA**](https://lunarline.com/)|Certified Expert Independent Assessor|Auditing|3 Years|
|
||||
||[**CEPM**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert Program Manager|Management|3 Years|
|
||||
||[**CERP**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert RMF Professional|Management|3 Years|
|
||||
||[**CESA**](https://lunarline.com/)|Certified Expert Security Analyst|Security Analysis|3 Years|
|
||||
|'|[**CECS**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/cloud-fedramp-consulting-and-training/)|Certified Expert Cloud Security|Cloud Security|3 Years|
|
||||
|'|[**CEIA**](https://lunarline.com/)|Certified Expert Independent Assessor|Auditing|3 Years|
|
||||
|'|[**CEPM**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert Program Manager|Management|3 Years|
|
||||
|'|[**CERP**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert RMF Professional|Management|3 Years|
|
||||
|'|[**CESA**](https://lunarline.com/)|Certified Expert Security Analyst|Security Analysis|3 Years|
|
||||
|[**McAfee Institute**](https://www.mcafeeinstitute.com/)|[**CECI**](https://www.mcafeeinstitute.com/products/certified-expert-in-cyber-investigations-ceci)|Certified Expert in Cyber Investigations|Forensics|2 Years|
|
||||
||[**CCII**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-investigator-ccii)|Certified Cyber Intelligence Investigator|Threat Intelligence|2 Years|
|
||||
||[**CCIP**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-professional-ccip)|Certified Cyber Intelligence Professional|Threat Intelligence|2 Years|
|
||||
||[**CSMIE**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-expert-csmie)|Certified Social Media Intelligence Expert|Threat Intelligence|2 Years|
|
||||
||[**SMIA**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-analyst-smia)|Certified Social Media Intelligence Analyst|Threat Intelligence|2 Years|
|
||||
||[**CCTA**](https://www.mcafeeinstitute.com/products/certified-counterintelligence-threat-analyst-ccta)|Certified Counterintelligence Threat Analyst|Threat Intelligence|2 Years|
|
||||
||[**CPCI**](https://www.mcafeeinstitute.com/products/certified-professional-criminal-investigator-cpci)|Certified Professional Criminal Investigator|Forensics|2 Years|
|
||||
||[**CORCI**](https://www.mcafeeinstitute.com/products/certified-organized-retail-crime-investigator-corci)|Certified Organized Retail Crime Investigator|Forensics|2 Years|
|
||||
||[**CEL**](https://www.mcafeeinstitute.com/products/certified-executive-leader-cel)|Certified Executive Leader|Management|2 Years|
|
||||
||[**CHTI**](https://www.mcafeeinstitute.com/products/certified-human-trafficking-investigator-chti)|Certified Human Trafficking Investigator|Forensics|2 Years|
|
||||
||[**CCFI**](https://www.mcafeeinstitute.com/products/certified-cryptocurrency-forensic-investigator-ccfi)|Certified Cryptocurrency Forensic Investigator|Forensics|2 Years|
|
||||
||[**WVTS**](https://www.mcafeeinstitute.com/products/certified-workplace-violence-and-threat-specialist-wvts)|Certified Workplace violence and threat specialist|Forensics|2 Years|
|
||||
||[**C\|OSINT**](https://www.mcafeeinstitute.com/products/certified-osint)|Certified in Open Source Intelligence|Threat Intelligence|2 Years|
|
||||
|[**The IIA**](https://www.theiia.org/en/)|[**CIA**](https://www.theiia.org/en/certifications/cia/)|Certified Internal Auditor|Auditing||
|
||||
||[**CRMA**](https://www.theiia.org/en/certifications/crma/)|Certification in Risk Management Assurance|Risk Management||
|
||||
||[**QIAL**](https://www.theiia.org/en/certifications/qial/)|Qualification in Internal Audit Leadership|Auditing||
|
||||
|'|[**CCII**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-investigator-ccii)|Certified Cyber Intelligence Investigator|Threat Intelligence|2 Years|
|
||||
|'|[**CCIP**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-professional-ccip)|Certified Cyber Intelligence Professional|Threat Intelligence|2 Years|
|
||||
|'|[**CSMIE**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-expert-csmie)|Certified Social Media Intelligence Expert|Threat Intelligence|2 Years|
|
||||
|'|[**SMIA**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-analyst-smia)|Certified Social Media Intelligence Analyst|Threat Intelligence|2 Years|
|
||||
|'|[**CCTA**](https://www.mcafeeinstitute.com/products/certified-counterintelligence-threat-analyst-ccta)|Certified Counterintelligence Threat Analyst|Threat Intelligence|2 Years|
|
||||
|'|[**CPCI**](https://www.mcafeeinstitute.com/products/certified-professional-criminal-investigator-cpci)|Certified Professional Criminal Investigator|Forensics|2 Years|
|
||||
|'|[**CORCI**](https://www.mcafeeinstitute.com/products/certified-organized-retail-crime-investigator-corci)|Certified Organized Retail Crime Investigator|Forensics|2 Years|
|
||||
|'|[**CEL**](https://www.mcafeeinstitute.com/products/certified-executive-leader-cel)|Certified Executive Leader|Management|2 Years|
|
||||
|'|[**CHTI**](https://www.mcafeeinstitute.com/products/certified-human-trafficking-investigator-chti)|Certified Human Trafficking Investigator|Forensics|2 Years|
|
||||
|'|[**CCFI**](https://www.mcafeeinstitute.com/products/certified-cryptocurrency-forensic-investigator-ccfi)|Certified Cryptocurrency Forensic Investigator|Forensics|2 Years|
|
||||
|'|[**WVTS**](https://www.mcafeeinstitute.com/products/certified-workplace-violence-and-threat-specialist-wvts)|Certified Workplace violence and threat specialist|Forensics|2 Years|
|
||||
|'|[**C\|OSINT**](https://www.mcafeeinstitute.com/products/certified-osint)|Certified in Open Source Intelligence|Threat Intelligence|2 Years|
|
||||
|[**The IIA**](https://www.theiia.org/en/)|[**CIA**](https://www.theiia.org/en/certifications/cia/)|Certified Internal Auditor|Auditing|1 year|
|
||||
|'|[**CRMA**](https://www.theiia.org/en/certifications/crma/)|Certification in Risk Management Assurance|Risk Management|1 year|
|
||||
|'|[**QIAL**](https://www.theiia.org/en/certifications/qial/)|Qualification in Internal Audit Leadership|Auditing|1 year|
|
||||
|[**GAQM**](https://gaqm.org)|[**CSST**](https://gaqm.org/certifications/software_security_testing/csst)|Certified Software Security Tester|Software Development|_No Expiration_|
|
||||
||[**CASST**](https://gaqm.org/certifications/software_security_testing/casst)|Certified Advanced Software Security Tester|Software Development|_No Expiration_|
|
||||
||[**CISP**](https://gaqm.org/certifications/information_systems_security/cisp)|Certified Information Security Professional|General Cyber Security|5 Years|
|
||||
||[**CISSM**](https://gaqm.org/certifications/information_systems_security/cissm)|Certified Information Systems Security Manager|Management|5 Years|
|
||||
||[**CISST**](https://gaqm.org/certifications/information_systems_security/cisst)|Certified Information Systems Security Tester|Security Testing|_No Expiration_|
|
||||
||[**CPT**](https://gaqm.org/certifications/information_systems_security/certified_penetration_tester_cpt)|Certified Penetration Tester|Penetration Tester|_No Expiration_|
|
||||
||[**CFA**](https://gaqm.org/certifications/information_systems_security/cfa)|Certified Forensic Analyst|Forensics|_No Expiration_|
|
||||
||[**CPEH**](https://gaqm.org/certifications/information_systems_security/cpeh)|Certified Professional Ethical Hacker|Penetration Tester|_No Expiration_|
|
||||
||[**ISO/IEC 27001-CIA**](https://gaqm.org/certifications/iso_certifications/iso-27001-isms-certified-internal-auditor)|ISO 27001 ISMS Certified Internal Auditor|Auditing|_No Expiration_|
|
||||
||[**ISO/IEC 27001-27002-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001-27002 Lead Auditor|Auditing|_No Expiration_|
|
||||
||[**ISO/IEC 27001-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001:2013 ISMS Certified Lead Auditor|Auditing|_No Expiration_|
|
||||
||[**ISO/IEC 27001-F**](https://gaqm.org/certifications/iso_certifications/iso_isms_fnd)|ISO 27001:2013 ISMS Foundation|Standards|_No Expiration_|
|
||||
||[**ISO/IEC 27002-F**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-fnd)|ISO 27002 Foundation|Standards|_No Expiration_|
|
||||
||[**ISO/IEC 27002-LI**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-li)|ISO 27002 Lead Implementer|Standards|_4 Years_|
|
||||
||[**ISO/IEC 31000-LRM**](https://gaqm.org/certifications/iso_certifications/iso-31000-cla)|ISO 31000 Certified Lead Risk Manager|Standards|_No Expiration_|
|
||||
|'|[**CASST**](https://gaqm.org/certifications/software_security_testing/casst)|Certified Advanced Software Security Tester|Software Development|_No Expiration_|
|
||||
|'|[**CISP**](https://gaqm.org/certifications/information_systems_security/cisp)|Certified Information Security Professional|General Cyber Security|5 Years|
|
||||
|'|[**CISSM**](https://gaqm.org/certifications/information_systems_security/cissm)|Certified Information Systems Security Manager|Management|5 Years|
|
||||
|'|[**CISST**](https://gaqm.org/certifications/information_systems_security/cisst)|Certified Information Systems Security Tester|Security Testing|_No Expiration_|
|
||||
|'|[**CPT**](https://gaqm.org/certifications/information_systems_security/certified_penetration_tester_cpt)|Certified Penetration Tester|Penetration Tester|_No Expiration_|
|
||||
|'|[**CFA**](https://gaqm.org/certifications/information_systems_security/cfa)|Certified Forensic Analyst|Forensics|_No Expiration_|
|
||||
|'|[**CPEH**](https://gaqm.org/certifications/information_systems_security/cpeh)|Certified Professional Ethical Hacker|Penetration Tester|_No Expiration_|
|
||||
|'|[**ISO/IEC 27001-CIA**](https://gaqm.org/certifications/iso_certifications/iso-27001-isms-certified-internal-auditor)|ISO 27001 ISMS Certified Internal Auditor|Auditing|_No Expiration_|
|
||||
|'|[**ISO/IEC 27001-27002-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001-27002 Lead Auditor|Auditing|_No Expiration_|
|
||||
|'|[**ISO/IEC 27001-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001:2013 ISMS Certified Lead Auditor|Auditing|_No Expiration_|
|
||||
|'|[**ISO/IEC 27001-F**](https://gaqm.org/certifications/iso_certifications/iso_isms_fnd)|ISO 27001:2013 ISMS Foundation|Standards|_No Expiration_|
|
||||
|'|[**ISO/IEC 27002-F**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-fnd)|ISO 27002 Foundation|Standards|_No Expiration_|
|
||||
|'|[**ISO/IEC 27002-LI**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-li)|ISO 27002 Lead Implementer|Standards|4 Years|
|
||||
|'|[**ISO/IEC 31000-LRM**](https://gaqm.org/certifications/iso_certifications/iso-31000-cla)|ISO 31000 Certified Lead Risk Manager|Standards|_No Expiration_|
|
||||
|[**ISECOM**](https://www.isecom.org)|[**OPSA**](https://www.isecom.org/opsa.pdf)|OSSTMM Professional Security Analyst|Security Analyst|_No Expiration_|
|
||||
||[**OPST**](https://www.isecom.org/opst.pdf)|OSSTMM Professional Security Tester|Penetration Tester|_No Expiration_|
|
||||
||[**OPSE**](https://www.isecom.org/opse.pdf)|OSSTMM Professional Security Expert|General Cyber Security|_No Expiration_|
|
||||
||[**OWSE**](https://www.isecom.org/opse.pdf)|OSSTMM Wireless Security Expert|Penetration Tester|_No Expiration_|
|
||||
||[**CTA**](https://www.isecom.org/cta.pdf)|OSSTMM Certified Trust Analyst|Trust Management|_No Expiration_|
|
||||
||[**SAI**](https://www.isecom.org/sai.pdf)|Certified Security Awareness Instructor|Cyber Security Trainer|_No Expiration_|
|
||||
||[**CHA**](https://www.isecom.org/cha.pdf)|Certified Hacker Analyst|Penetration Tester|_No Expiration_|
|
||||
||[**CHAT**](https://www.isecom.org/chat.pdf)|Certified Hacker Analyst Trainer|Cyber Security Trainer|_No Expiration_|
|
||||
|'|[**OPST**](https://www.isecom.org/opst.pdf)|OSSTMM Professional Security Tester|Penetration Tester|_No Expiration_|
|
||||
|'|[**OPSE**](https://www.isecom.org/opse.pdf)|OSSTMM Professional Security Expert|General Cyber Security|_No Expiration_|
|
||||
|'|[**OWSE**](https://www.isecom.org/opse.pdf)|OSSTMM Wireless Security Expert|Penetration Tester|_No Expiration_|
|
||||
|'|[**CTA**](https://www.isecom.org/cta.pdf)|OSSTMM Certified Trust Analyst|Trust Management|_No Expiration_|
|
||||
|'|[**SAI**](https://www.isecom.org/sai.pdf)|Certified Security Awareness Instructor|Cyber Security Trainer|_No Expiration_|
|
||||
|'|[**CHA**](https://www.isecom.org/cha.pdf)|Certified Hacker Analyst|Penetration Tester|_No Expiration_|
|
||||
|'|[**CHAT**](https://www.isecom.org/chat.pdf)|Certified Hacker Analyst Trainer|Cyber Security Trainer|_No Expiration_|
|
||||
|[**HISPI**](https://www.hispi.org/)|[**HISP**](https://www.hispi.org/certification.php)|Holistic Information Security Practitioner|General Cyber Security|_3 Years_|
|
||||
|[**Blockchain Training Alliance**](https://blockchaintrainingalliance.com/)|[**CBSP**](https://blockchaintrainingalliance.com/collections/certifications/products/cbsp)|Certified Blockchain Security Professional|Blockchain|_2 Years_|
|
||||
|[**Crypto Consortium**](https://cryptoconsortium.org/)|[**CCSSA**](https://cryptoconsortium.org/certifications/ccssa/)|CryptoCurrency Security Standard Auditor|Blockchain|-|
|
||||
|[**The Open Group**](https://www.opengroup.org/)|[**OG0-041**](https://www.opengroup.org/certifications)|Open FAIR Foundation|Risk Management|-|
|
||||
||[**TOGAF9-F**](https://www.opengroup.org/certifications)|TOGAF 9 Foundation|Security Architecture|-|
|
||||
||[**TOGAF9-C**](https://www.opengroup.org/certifications)|TOGAF 9 Certified|Security Architecture|-|
|
||||
|[**Blockchain Training Alliance**](https://blockchaintrainingalliance.com/)|[**CBSP**](https://blockchaintrainingalliance.com/collections/certifications/products/cbsp)|Certified Blockchain Security Professional|Blockchain|2 Years|
|
||||
|[**Crypto Consortium**](https://cryptoconsortium.org/)|[**CCSSA**](https://cryptoconsortium.org/certifications/ccssa/)|CryptoCurrency Security Standard Auditor|Blockchain|2 years|
|
||||
|[**The Open Group**](https://www.opengroup.org/)|[**OG0-041**](https://www.opengroup.org/certifications)|Open FAIR Foundation|Risk Management|_No espiration_|
|
||||
|'|[**TOGAF9-F**](https://www.opengroup.org/certifications)|TOGAF 9 Foundation|Security Architecture|_No espiration_|
|
||||
|'|[**TOGAF9-C**](https://www.opengroup.org/certifications)|TOGAF 9 Certified|Security Architecture|_No espiration_|
|
||||
|[**TCM Security**](https://certifications.tcm-sec.com/)|[**PNPT**](https://certifications.tcm-sec.com/pnpt/)|Practical Network Penetration Tester|Penetration Tester|No Expiration|
|
||||
||[**PCRP**](https://certifications.tcm-sec.com/pcrp)|Practical Career-Ready Professional|Penetration Tester|3 years|
|
||||
||[**PJMR**](https://certifications.tcm-sec.com/pjmr)|Practical Junior Malware Researcher|Malware Analysis|No Expiration|
|
||||
|'|[**PCRP**](https://certifications.tcm-sec.com/pcrp)|Practical Career-Ready Professional|Penetration Tester|3 years|
|
||||
|'|[**PJMR**](https://certifications.tcm-sec.com/pjmr)|Practical Junior Malware Researcher|Malware Analysis|No Expiration|
|
||||
|[**Star Certification**](https://starcertification.org/)|[**SCSU**](https://starcertification.org/Certifications/Certificate/su)|Star Cyber Secure User|Security Awareness|3 years|
|
||||
||[**EHE**](https://starcertification.org/Certifications/Certificate/Ethical-Hacking-Expert)|Star Certified Ethical Hacking Expert|Penetration Testing|3 years|
|
||||
||[**SESS**](https://starcertification.org/Certifications/Certificate/expertsecurity)|Star Expert Security Specialist|Penetration Testing|3 years|
|
||||
||[**SMFAS**](https://starcertification.org/Certifications/Certificate/mobile)|Star Mobile Forensic and Advance Security|Forensics|3 years|
|
||||
||[**SPTE**](https://starcertification.org/Certifications/Certificate/penetration)|Star Penetration Tester Experts [[27]](https://en.wikipedia.org/wiki/List_of_computer_security_certifications#cite_note-30)|Penetration Testing|3 years|
|
||||
||[**SSCA**](https://starcertification.org/Certifications/Certificate/securityanalytics)|Star Secure Cyber Analytics|Penetration Testing|3 years|
|
||||
||[**SFICH-007**](https://starcertification.org/Certifications/Certificate/forensic)|Star Forensic investigator in Computer Hacking-007|Forensics|3 years|
|
||||
||[**SSPE.Net**](https://starcertification.org/Certifications/Certificate/securedotnet)|Star Secure Programmer Expert- .Net|Software Development|3 years|
|
||||
||[**SSPE-Java**](https://starcertification.org/Certifications/Certificate/securejava)|Star Secure Programmer Expert- Java|Software Development|3 years|
|
||||
||[**SSPE-Android**](https://starcertification.org/Certifications/Certificate/secureandroid)|Star Secure Programmer Expert- Android|Software Development|3 years|
|
||||
||[**SSPE-PHP**](https://starcertification.org/Certifications/Certificate/securephp)|Star Secure Programmer Expert- PHP|Software Development|3 years|
|
||||
|'|[**EHE**](https://starcertification.org/Certifications/Certificate/Ethical-Hacking-Expert)|Star Certified Ethical Hacking Expert|Penetration Testing|3 years|
|
||||
|'|[**SESS**](https://starcertification.org/Certifications/Certificate/expertsecurity)|Star Expert Security Specialist|Penetration Testing|3 years|
|
||||
|'|[**SMFAS**](https://starcertification.org/Certifications/Certificate/mobile)|Star Mobile Forensic and Advance Security|Forensics|3 years|
|
||||
|'|[**SSCA**](https://starcertification.org/Certifications/Certificate/securityanalytics)|Star Secure Cyber Analytics|Penetration Testing|3 years|
|
||||
|'|[**SFICH-007**](https://starcertification.org/Certifications/Certificate/forensic)|Star Forensic investigator in Computer Hacking-007|Forensics|3 years|
|
||||
|'|[**SSPE.Net**](https://starcertification.org/Certifications/Certificate/securedotnet)|Star Secure Programmer Expert- .Net|Software Development|3 years|
|
||||
|'|[**SSPE-Java**](https://starcertification.org/Certifications/Certificate/securejava)|Star Secure Programmer Expert- Java|Software Development|3 years|
|
||||
|'|[**SSPE-Android**](https://starcertification.org/Certifications/Certificate/secureandroid)|Star Secure Programmer Expert- Android|Software Development|3 years|
|
||||
|'|[**SSPE-PHP**](https://starcertification.org/Certifications/Certificate/securephp)|Star Secure Programmer Expert- PHP|Software Development|3 years|
|
||||
|[Zero-Point Security](https://training.zeropointsecurity.co.uk/)|[**CRTO**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-exam)|Certified Red Team Operator|Red Teaming|N/A|
|
||||
||[**CRTL**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-ii-exam)|Certified Red Team Lead|Red Teaming|N/A|
|
||||
|'|[**CRTL**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-ii-exam)|Certified Red Team Lead|Red Teaming|N/A|
|
||||
|[EC First](https://ecfirst.com/)|[**CCSA**](https://ecfirst.com/ccsa/)|Certified Cyber Security Architect|Security Architecture|3 years|
|
||||
||[**CSCS**](https://ecfirst.com/cscs/)|Certified Security Compliance Specialist|Risk/Compliance|3 years|
|
||||
||[**CMMP**](https://ecfirst.com/ccp/)|Certified CMMC Professional|Standards|3 years|
|
||||
|'|[**CSCS**](https://ecfirst.com/cscs/)|Certified Security Compliance Specialist|Risk/Compliance|3 years|
|
||||
|'|[**CMMP**](https://ecfirst.com/ccp/)|Certified CMMC Professional|Standards|3 years|
|
||||
|[CWNP](https://www.cwnp.com/)|[**CWS**](https://www.cwnp.com/certifications/cwsp)|Certified Wireless Specialist|Wireless Security|3 years|
|
||||
|[8kSec](https://8ksec.io/)|[**OMSE**](https://8ksec.io/omse/)|Offensive Mobile Security Expert|Red Teaming|_No expiration_|
|
||||
|[Cisco](https://www.cisco.com/site/us/en/index.html)|[CCNA Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html)|Cisco Certified Network Associate - Security|Network Security|-|
|
||||
||[CCNP Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/professional/ccnp-security-v2.html)|Cisco Certified Network Professional - Security|Network Security|-|
|
||||
||[CCIE Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/expert/ccie-security-v2.html)|Cisco Certified Internetwork Expert - Security|Network Security|-|
|
||||
||[CCNA CyberOps](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/cyberops-associate.html)|Cisco Certified Network Associate - CyberOps|Network Security|-|
|
||||
|[Check Point](https://www.checkpoint.com/)|[CCSA](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Administrator|Network Security|-|
|
||||
||[CCSE](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Expert|Network Security|-|
|
||||
|[Cisco](https://www.cisco.com/site/us/en/index.html)|[CCNA Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html)|Cisco Certified Network Associate - Security|Network Security|3 years|
|
||||
|'|[CCNP Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/professional/ccnp-security-v2.html)|Cisco Certified Network Professional - Security|Network Security|3 years|
|
||||
|'|[CCIE Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/expert/ccie-security-v2.html)|Cisco Certified Internetwork Expert - Security|Network Security|3 years|
|
||||
|'|[CCNA CyberOps](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/cyberops-associate.html)|Cisco Certified Network Associate - CyberOps|Network Security|3 years|
|
||||
|[Check Point](https://www.checkpoint.com/)|[CCSA](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Administrator|Network Security|3 years|
|
||||
|'|[CCSE](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Expert|Network Security|3 years|
|
||||
|[Kali](https://www.kali.org/)|[KLCP](https://www.kali.org/blog/introducing-kali-linux-certified-professional/)|Kali Linux Certified Professional|Penetration Testing|No expiration|
|
||||
|[IBM](https://www.ibm.com/)|[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-security-access-manager-v90-24008806)|IBM Certified Deployment Professional - Security Access Manager V9.0|Access Control|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-associate-administrator-security-guardium-data-protection-v1012-38008401)|IBM Certified Associate Administrator - Security Guardium Data Protection V10.1.2|Data Protection|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-administrator-security-guardium-v100-49002401)|IBM Certified Administrator - Security Guardium V10.0|Data Protection|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-identity-governance-and-intelligence-v52-49002501)|IBM Certified Deployment Professional - Identity Governance and Intelligence V5.2|Access Control|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-analyst-i2-analysts-notebook-v9-58000402)|IBM Certified Analyst - i2 Analysts Notebook V9|Threat Intelligence|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-soc-analyst-ibm-qradar-siem-v732-C0000801)|IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2|Threat Intelligence|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-associate-analyst-ibm-qradar-siem-v732-C0003502)|IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2|Threat Intelligence|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-associate-administrator-ibm-qradar-siem-v732-C0003602)|IBM Certified Associate Administrator - IBM QRadar SIEM V7.3.2|Threat Intelligence|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-ibm-qradar-siem-v732-C0003804)|IBM Certified Deployment Professional - IBM QRadar SIEM V7.3.2|Threat Intelligence|-|
|
||||
||[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-security-identity-governance-and-intelligence-v525-C0004502)|IBM Certified Deployment Professional - Security Identity Governance and Intelligence V5.2.5|Access Control|-|
|
||||
|[Microsoft](https://www.microsoft.com/)|[AZ-500](https://learn.microsoft.com/en-us/credentials/certifications/exams/az-500/)|Microsoft Certified: Azure Security Engineer Associate|Cloud Security|1 year *|
|
||||
||[MS-500](https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/ms-500)|Microsoft 365 Certified: Security Administrator Associate|Cloud Security|-|
|
||||
||[SC-100](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-100/)|Microsoft Certified: Cybersecurity Architect Expert|Security Architect|1 year *|
|
||||
||[SC-200](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-200/)|Microsoft Certified: Security Operations Analyst Associate|SIEM|1 year *|
|
||||
||[SC-300](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-300/)|Microsoft Certified: Identity and Access Administrator Associate|IAM|1 year *|
|
||||
||[SC-400](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-400/)|Microsoft Information Protection Administrator|Risk/Compliance|1 year *|
|
||||
||[SC-900](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/)|Microsoft Certified: Security, Compliance, and Identity Fundamentals|Fundamentals|1 year *|
|
||||
|[AWS](https://aws.amazon.com/?nc2=h_lg)|[-](https://aws.amazon.com/certification/certified-security-specialty/?gclid=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB&trk=0c2b5279-1e50-459b-b9b5-6b0861ac160e&sc_channel=ps&ef_id=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB:G:s&s_kwcid=AL!4422!3!653411798076!e!!g!!aws%20certified%20security%20specialty!19919601960!149404863724)|AWS Certified Security - Specialty|Cloud Security|-|
|
||||
|[Google](https://cloud.google.com/?hl=en)|[-](https://cloud.google.com/learn/certification/cloud-security-engineer)|Google Professional Cloud Security Engineer|Cloud Security|-|
|
||||
|[Jamf](https://www.jamf.com/)|[JCESA](https://www.jamf.com/products/)|Jamf Certified Endpoint Security Admin|macOS Security|-|
|
||||
|[Alibaba](https://www.alibabacloud.com/)|[ACA](https://edu.alibabacloud.com/certification/aca_cloudsecurity)|ACA Cloud Security Certification|Cloud Security|-|
|
||||
||[ACP](https://edu.alibabacloud.com/certification/acp_security)|ACP Cloud Security Certification|Cloud Security|-|
|
||||
||[ACE](https://edu.alibabacloud.com/certification/ace_cloudcomputing)|ACE Cloud Security Expert|Cloud Security|-|
|
||||
|[Redhat](https://www.redhat.com/en)|[EX415](https://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam)|Red Hat Certified Specialist in Security: Linux|IT-Administration|-|
|
||||
||[EX425](https://www.redhat.com/en/services/training/ex425-retired-red-hat-certified-specialist-security-containers-and-openshift-container-platform-exam)|Red Hat Certified Specialist in Security: Containers and OpenShift Container|IT-Administration|-|
|
||||
|[OpenText](https://www.opentext.com/)|[EnCE](https://www.opentext.es/products-and-solutions/services/training-and-learning-services/encase-training/examiner-certification)|EnCase Certified Examiner|Forensics|-|
|
||||
||[EnCEP](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/ediscovery-practitioner-program)|EnCase Certified eDiscovery Practitioner|Forensics|-|
|
||||
||[CFSR](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/forensic-security-responder-certification)|EnCase Certified Forensic Security Responder|Forensics|-|
|
||||
|[Microsoft](https://www.microsoft.com/)|[AZ-500](https://learn.microsoft.com/en-us/credentials/certifications/exams/az-500/)|Microsoft Certified: Azure Security Engineer Associate|Cloud Security|1 year|
|
||||
|'|[MS-500](https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/ms-500)|Microsoft 365 Certified: Security Administrator Associate|Cloud Security|1 year|
|
||||
|'|[SC-100](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-100/)|Microsoft Certified: Cybersecurity Architect Expert|Security Architect|1 year |
|
||||
|'|[SC-200](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-200/)|Microsoft Certified: Security Operations Analyst Associate|SIEM|1 year |
|
||||
|'|[SC-300](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-300/)|Microsoft Certified: Identity and Access Administrator Associate|IAM|1 year |
|
||||
|'|[SC-400](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-400/)|Microsoft Information Protection Administrator|Risk/Compliance|1 year |
|
||||
|'|[SC-900](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/)|Microsoft Certified: Security, Compliance, and Identity Fundamentals|Fundamentals|1 year|
|
||||
|[AWS](https://aws.amazon.com/?nc2=h_lg)|[-](https://aws.amazon.com/certification/certified-security-specialty/?gclid=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB&trk=0c2b5279-1e50-459b-b9b5-6b0861ac160e&sc_channel=ps&ef_id=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB:G:s&s_kwcid=AL!4422!3!653411798076!e!!g!!aws%20certified%20security%20specialty!19919601960!149404863724)|AWS Certified Security - Specialty|Cloud Security|3 years|
|
||||
|[Google](https://cloud.google.com/?hl=en)|[-](https://cloud.google.com/learn/certification/cloud-security-engineer)|Google Professional Cloud Security Engineer|Cloud Security|2 years|
|
||||
|[Jamf](https://www.jamf.com/)|[JCESA](https://www.jamf.com/products/)|Jamf Certified Endpoint Security Admin|macOS Security|3 years|
|
||||
|[Alibaba](https://www.alibabacloud.com/)|[ACA](https://edu.alibabacloud.com/certification/aca_cloudsecurity)|ACA Cloud Security Certification|Cloud Security|2 years|
|
||||
|'|[ACP](https://edu.alibabacloud.com/certification/acp_security)|ACP Cloud Security Certification|Cloud Security|2 years|
|
||||
|'|[ACE](https://edu.alibabacloud.com/certification/ace_cloudcomputing)|ACE Cloud Security Expert|Cloud Security|2 years|
|
||||
|[Redhat](https://www.redhat.com/en)|[EX415](https://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam)|Red Hat Certified Specialist in Security: Linux|IT-Administration|3 years|
|
||||
|'|[EX425](https://www.redhat.com/en/services/training/ex425-retired-red-hat-certified-specialist-security-containers-and-openshift-container-platform-exam)|Red Hat Certified Specialist in Security: Containers and OpenShift Container|IT-Administration|3 years|
|
||||
|[OpenText](https://www.opentext.com/)|[EnCE](https://www.opentext.es/products-and-solutions/services/training-and-learning-services/encase-training/examiner-certification)|EnCase Certified Examiner|Forensics|3 years|
|
||||
|'|[EnCEP](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/ediscovery-practitioner-program)|EnCase Certified eDiscovery Practitioner|Forensics|3 years|
|
||||
|'|[CFSR](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/forensic-security-responder-certification)|EnCase Certified Forensic Security Responder|Forensics|3 years|
|
||||
|[Fortinet](https://www.fortinet.com/)|[NSE 1/2/3](https://training.fortinet.com/local/staticpage/view.php?page=fca_cybersecurity)|Network Security Professional Associate|vendor-specific products|2 years|
|
||||
||[NSE 4](https://www.fortinet.com/br/training-certification)|Network Security Professional|firewalls|2 years|
|
||||
||[NSE 5](https://www.fortinet.com/br/training-certification)|Network Security Analyst|administration|2 years|
|
||||
||[NSE 6](https://www.fortinet.com/br/training-certification)|Network Security Specialist|vendor-specific products|2 years|
|
||||
||[NSE 7](https://www.fortinet.com/br/training-certification)|Network Security Architect|firewalls|2 years|
|
||||
||[NSE 8](https://training.fortinet.com/local/staticpage/view.php?page=fcx_cybersecurity)|Network Security Expert|firewalls|2 years|
|
||||
|'|[NSE 4](https://www.fortinet.com/br/training-certification)|Network Security Professional|firewalls|2 years|
|
||||
|'|[NSE 5](https://www.fortinet.com/br/training-certification)|Network Security Analyst|administration|2 years|
|
||||
|'|[NSE 6](https://www.fortinet.com/br/training-certification)|Network Security Specialist|vendor-specific products|2 years|
|
||||
|'|[NSE 7](https://www.fortinet.com/br/training-certification)|Network Security Architect|firewalls|2 years|
|
||||
|'|[NSE 8](https://training.fortinet.com/local/staticpage/view.php?page=fcx_cybersecurity)|Network Security Expert|firewalls|2 years|
|
||||
|[Juniper](https://learningportal.juniper.net/juniper/default.aspx)|[JNCIA-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncia-sec.html)|Juniper Networks Certified Associate|Network Security|3 years|
|
||||
||[JNCIS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=702)|Juniper Networks Certified Specialist|Network Security|3 years|
|
||||
||[JNCIP-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncip-sec.html)|Juniper Networks Certified Professional|Network Security|3 years|
|
||||
||[JNCIE-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=11065)|Juniper Networks Certified Expert|Network Security|3 years|
|
||||
||[JNCDS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=JUNIPER-LEARNING-PATHS-HOME)|Juniper Networks Certified Design Specialist Security|Network Security|3 years|
|
||||
|[Palo Alto](https://www.paloaltonetworks.com/)|[PCNSA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-administrator)|Palo Alto Networks Certified Network Security Administrator|Network Security|-|
|
||||
||[PCNSE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-engineer)|Palo Alto Networks Certified Network Security Engineer|Network Security|-|
|
||||
||[PCCET](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-cybersecurity-entry-level-technician)|Palo Alto Networks Certified Cybersecurity Entry-level Technician|General Cyber Security|-|
|
||||
||[PCDRA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-detection-and-remediation-analyst)|Palo Alto Networks Certified Detection and Remediation Analyst|Network Security|-|
|
||||
||[PCCSE](https://www.paloaltonetworks.com/services/education/prisma-certified-cloud-security-engineer)|Palo Alto Networks Prisma Certified Cloud Security Engineer|Cloud Security|-|
|
||||
||[PCSAE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-security-automation-engineer)|Palo Alto Networks Certified Security Automation Engineer|Threat Intelligence|-|
|
||||
|'|[JNCIS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=702)|Juniper Networks Certified Specialist|Network Security|3 years|
|
||||
|'|[JNCIP-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncip-sec.html)|Juniper Networks Certified Professional|Network Security|3 years|
|
||||
|'|[JNCIE-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=11065)|Juniper Networks Certified Expert|Network Security|3 years|
|
||||
|'|[JNCDS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=JUNIPER-LEARNING-PATHS-HOME)|Juniper Networks Certified Design Specialist Security|Network Security|3 years|
|
||||
|[Palo Alto](https://www.paloaltonetworks.com/)|[PCNSA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-administrator)|Palo Alto Networks Certified Network Security Administrator|Network Security|2 years|
|
||||
|'|[PCNSE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-engineer)|Palo Alto Networks Certified Network Security Engineer|Network Security|2 years|
|
||||
|'|[PCCET](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-cybersecurity-entry-level-technician)|Palo Alto Networks Certified Cybersecurity Entry-level Technician|General Cyber Security|2 years|
|
||||
|'|[PCDRA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-detection-and-remediation-analyst)|Palo Alto Networks Certified Detection and Remediation Analyst|Network Security|2 years|
|
||||
|'|[PCCSE](https://www.paloaltonetworks.com/services/education/prisma-certified-cloud-security-engineer)|Palo Alto Networks Prisma Certified Cloud Security Engineer|Cloud Security|2 years|
|
||||
|'|[PCSAE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-security-automation-engineer)|Palo Alto Networks Certified Security Automation Engineer|Threat Intelligence|2 years|
|
Loading…
Reference in a new issue