List of computer security certifications

{{short description|None}}

In the computer security or Information security fields, there are a number of tracks a professional can take to demonstrate qualifications.This article is about the certification and credentialing of individuals. It does not include certification of organizations or classified computer systems by authorizing, accrediting, and approval bodies and authorities as meeting a prescribed set of safeguards. Four sources categorizing these, and many other credentials, licenses, and certifications, are:

  1. Schools and universities
  2. Vendor-sponsored credentials (e.g. Microsoft, Cisco)
  3. Association- and organization-sponsored credentials
  4. Governmental (or quasi-governmental) licenses, certifications, and credentials

Quality and acceptance vary worldwide for IT security credentials, from well-known and high-quality examples like a master's degree in the field from an accredited school, CISSP, and Microsoft certification, to a controversial list of many dozens of lesser-known credentials and organizations.

In addition to certification obtained by taking courses and/or passing exams (and in the case of CISSP and others noted below, demonstrating experience and/or being recommended or given a reference from an existing credential holder), award certificates also are given for winning government, university or industry-sponsored competitions, including team competitions and contests.

Certifying organizations

= Vendor-neutral =

  • Altered Security
  • ASIS International
  • APMG International
  • Blockchain Council
  • Blockchain Training Alliance
  • Cloud Credential Council (CCC)
  • CertNexus
  • CERTCOP
  • CompTIA
  • CREST
  • Crypto Consortium
  • Cloud Security Alliance (CSA)
  • CWNP
  • CyberDefenders
  • Cyber Struggle
  • EC Council
  • EITCA/IS
  • INE Security
  • EXIN
  • GAQM
  • GIAC
  • HISPI
  • InfoSec Institute
  • IBITGQ
  • TCM Security
  • The IIA
  • IAPP
  • ISACA
  • ISECOM
  • ISC2
  • Linux Professional Institute (LPI)
  • Lunarline
  • McAfee Institute
  • Mile2
  • Offensive Security
  • PECB
  • The Open Group
  • The SecOps Group
  • SECO-Institute
  • SABSA
  • Star Certification
  • Zero-Point Security
  • EC First
  • 8kSec{{Cite web |date=2023-02-27 |title=8kSec {{!}} Live & On-Demand Mobile Security Trainings |url=https://academy.8ksec.io |access-date=2025-03-12 |language=en-US}}
  • Hack The Box (HTB)
  • TryHackMe (THM)
  • CyberWarfareLabs (CWL)
  • CNITSEC

= Vendor-specific =

List of certifications

{{See also|Tech certificate}}

= Vendor-neutral =

class="wikitable sortable mw-collapsible"

|+

! rowspan="2" |Issuing Organization

! rowspan="2" |Credential abbreviation

! rowspan="2" |Certification Title

! rowspan="2" |Focus

! rowspan="2" |Validity duration

! rowspan="2" |Number issued

rowspan="5" |Altered Security

|CRTP

|Certified Red Team Professional

| rowspan="4" |Red Teaming

| rowspan="5" |3 years

| rowspan="5" |N/A

CRTE

|Certified Red Team Expert

CRTM

|Certified Red Team Master

CARTP

|Certified Azure Red Team Professional

CAWASP

|Certified Azure Web Application Security Professional

|Application Security

rowspan="11" |SECO-Institute

|S-ITSF

|IT-Security Foundation

| rowspan="4" |General Cyber Security

| rowspan="4" |3 years

| rowspan="12" |N/A

S-ITSP

|IT-Security Practitioner

S-ITSE

|IT-Security Expert

S-CITSO

|Certified IT-Security Officer

S-DPF

|Data Protection Foundation

| rowspan="3" |Privacy

|No expiration{{Cite web|title=Data Protection Foundation|url=https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-foundation/|access-date=2021-08-14|website=SECO-Institute|language=en-GB}}

S-DPP

|Data Protection Practitioner

|1 year{{Cite web|title=Data Protection Practitioner|url=https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-practitioner/|access-date=2021-08-14|website=SECO-Institute|language=en-GB}}

S-CDPO

|Certified Data Protection Officer

|3 years

S-EHF

|Ethical Hacking Foundation

| rowspan="2" |Penetration Testing

| rowspan="4" |3 years

S-EHP

|Ethical Hacking Practitioner

S-SPF

|Secure Programming Foundation

|Software Development

S-DWF

|Dark Web Foundation

|Threat Intelligence

rowspan="9" |ISC2

|CC

|Certified in CyberSecurity

|General Cyber Security

| rowspan="9" |3 years (continuously)

CISSP

|Certified Information Systems Security Professional

|Management

|127,734{{Cite web|url=https://www.isc2.org/About/Member-Counts|title=Member Counts {{!}} How Many (ISC)2 Members Are There Per Certification {{!}} (ISC)2|website=www.isc2.org|access-date=2018-07-24}}

ISSAP

|Information Systems Security Architecture Professional

|Security Architecture

|1,952{{Cite web |url=https://www.isc2.org/About/Member-Counts |title=Member Counts {{!}} How Many (ISC)² Members Are There Per Certification {{!}} (ISC)² |website=www.isc2.org |access-date=2018-07-24}}

ISSEP

|Information Systems Security Engineering Professional

|IT-Administration

|1,147

ISSMP

|Information Systems Security Management Professional

|Management

|1,196

SSCP

|Systems Security Certified Practitioner

|IT-Administration

|4,319

CCSP

|Certified Cloud Security Professional

|Cloud Security

|3,549

CGRC

|Certified in Governance, Risk and Compliance

|Auditing

|2,671

CSSLP

|Certified Secure Software Lifecycle Professional

|Software Development

|2,214

rowspan="4" style="background:#F5FAFF" |CompTIA

|Security+

|CompTIA Security+ {{Cite web|url=https://niccs.cisa.gov/training/search/essential-assets-group-inc/comptia-security-certification-training-program|title=CompTIA Security+ Certification|access-date=2021-09-08}}

|IT-Administration

| rowspan="4" |3 years{{Cite web |title=How Long Does the CompTIA Security+ Certification Last {{!}} CompTIA IT Certifications |url=https://www.comptia.org/faq/security/how-long-does-the-comptia-security-certification-last |access-date=2024-02-21 |website=CompTIA.org |language=en}}

| rowspan="4" |N/A

CySA+

|CompTIA Cyber Security Analyst

|Security Analysis

PenTest+

|CompTIA Pentest+

|Penetration Testing

CASP+

|CompTIA Advanced Security Practitioner

|General Cyber Security

rowspan="9" |ISACA

|CISA

|Certified Information Systems Auditor

|Auditing

| rowspan="9" |3 years

|115,000{{Cite web|url=http://www.isaca.org/About-ISACA/Press-room/Pages/ISACA-Certifications-by-Region.aspx|title=ISACA Certifications by Region|website=www.isaca.org|access-date=2019-11-08}}

CISM

|Certified Information Security Manager

|Management

|27,000

CRISC

|Certified In Risk and Information Systems Control

|Risk Management

|18,000

CGEIT

|Certified in the Governance of Enterprise IT

|Management

|6,000

CSX-F

|Cyber Security Fundamentals

| rowspan="3" |General Cyber Security

| rowspan="5" |N/A

CSX-T

|Cyber Security Technical Foundations

CSX-P

|Cyber Security Practitioner

CSX-A

|Cyber Security Audit

|Auditing

CDPSE

|CERTIFIED DATA PRIVACY SOLUTIONS ENGINEER

|Data Privacy

rowspan="41" style="background:#F5FFFA" |GIAC

|GSE

|Security Expert

| rowspan="2" |General Cyber Security

| rowspan="41" |4 years{{Cite web |title=Renewing Your GIAC Certification |url=https://www.giac.org/knowledge-base/renewal/ |access-date=2024-02-20 |website=www.giac.org |language=en}}

| rowspan="41" |N/A

GSEC

|Security Essentials

GCIA

|Certified Intrusion Analyst

|Security Analysis

GISF

|GIAC Information Security Fundamentals

|General Cyber Security

GCED

|Certified Enterprise Defender

|Cyber Defense

GCWN

|Certified Windows Security Administrator

|IT-Administration

GMON

|Continuous Monitoring Certification

|Threat Intelligence

GCCC

|Critical Controls Certification

| rowspan="2" |Cyber Defense

GCLD

|Cloud Security Essentials

GDSA

|Defensible Security Architecture

|Security Architecture

GCDA

|Certified Detection Analyst

|Threat Intelligence

GDAT

|Defending Advanced Threats

|Cyber Defense

GCIH

|Certified Incident Handler

|Incident Response

GPEN

|Penetration Tester

| rowspan="3" |Penetration Testing

GWAPT

|Web Application Penetration Tester

GXPN

|Exploit Researcher and Advanced Penetration Tester

GMOB

|Mobile Device Security Analyst

|Security Analysis

GAWN

|Assessing and Auditing Wireless Networks

|Wireless Security

GPYC

|Python Coder

|Software Development

GCFA

|Certified Forensic Analyst

| rowspan="2" |Forensics

GCFE

|Certified Forensic Examiner

GREM

|Reverse Engineering Malware

|Malware Analysis

GNFA

|Network Forensic Analyst

|Forensics

GCTI

|Cyber Threat Intelligence

|Threat Intelligence

GASF

|Advanced Smartphone Forensics

|Forensics

GSLC

|Security Leadership

|Management

GSNA

|Systems and Network Auditor

|Auditing

GISP

|Information Security Professional

|General Cyber Security

GLEG

|Law of Data Security & Investigations

|Forensics

GCPM

|Certified Project Manager

| rowspan="2" |Management

GSTRT

|Strategic Planning, Policy, and Leadership

GWEB

|Certified Web Application Defender

|Software Development

GICSP

|Global Industrial Cyber Security Professional

| rowspan="3" |Critical Infrastructure Security

GRID

|Response and Industrial Defense

GCIP

|Critical Infrastructure Protection

GOSI

|Open Source Intelligence

|Threat Intelligence

GBFA

|Battlefield Forensics and Acquisition

|Forensics

GCSA

|Cloud Security Automation

| rowspan="2" |Cloud Security

GFCT

|Foundational Cybersecurity Technologies

GSOC

|Security Operations Certified

|Security Operations

GPCS

|Public Cloud Security

|Cloud Security

CyberDefenders

|CCD

|Certified CyberDefender

|Cyber Defense

| rowspan="2" |No expiration{{Cite web |last=CyberDefenders |title=CCD Certification FAQs |url=https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/#question_18 |access-date=2024-02-25 |website=CyberDefenders |language=en}}

| rowspan="2" |N/A

rowspan="19" style="background:#FFF5FA" |EC-Council

|CSCU

|EC-Council Certified Secure Computer User

|Security Awareness

CND

|EC-Council Certified Network Defender

|Network Security

| rowspan="5" |3 years{{Cite web|url=https://cert.eccouncil.org/ece-policy.html|title=ECE Policy|website=cert.eccouncil.org|language=en|access-date=2018-07-24}}

|N/A

CEH

|EC-Council Certified Ethical Hacker

| rowspan="5" |Penetration Testing

| rowspan="4" |N/A

CEH-Practical (Master)

|EC-Council Certified Ethical Hacker Practical (Master)

ECSA

|EC-Council Certified Security Analyst

ECSA-Master (Practical)

|EC-Council Certified Security Analyst (Practical)

LPT-Master (Practical)

|EC-Council Licensed Penetration Tester (Master)

|1 yearFirst validation period after exam is 2 years.{{Cite web|title=Application Process Eligibility|url=https://cert.eccouncil.org/application-process-eligibility.html|access-date=2018-07-24|website=cert.eccouncil.org|language=en}}

|N/A

E|ISM

|EC-Council Information Security Manager

| rowspan="2" |Management

|3 years

|N/A

CCISO

|EC-Council Certified Chief Information Security Officer

|1 year{{Cite news|url=https://ciso.eccouncil.org/cciso-certification/ciso-faq/#twelve|title=CISO FAQ - EC-Council|work=EC-Council|access-date=2018-07-24|language=en-US}}

|N/A

ECIH

|EC-Council Certified Incident Handler

|Incident Response

| rowspan="10" |3 years

| rowspan="10" |N/A

CHFI

|EC-Council Computer Hacking Forensic Investigator

|Forensics

EDRP

|EC-Council Disaster Recovery Professional

|Disaster Recovery

ECES

|EC-Council Certified Encryption Specialist

|Encryption

CASE Java

|EC-Council Certified Application Security Engineer Java

| rowspan="2" |Software Development

CASE .Net

|EC-Council Certified Application Security Engineer .Net

CTIA

|EC-Council Certified Threat Intelligence Analyst

|Threat Intelligence

CSA

|EC-Council Certified SOC Analyst

|Security Analysis

ECSS

|EC-Council Certified Security Specialist

|General Cyber Security

CCSE

|EC-Council Cloud Security Engineer

|Cloud Security

rowspan="12" |OffSec

|OSCP

|OffSec Certified Professional

| rowspan="4" |Penetration Testing

| rowspan="10" |No expiration{{Cite web |title=Digital certification FAQ |url=https://help.offsec.com/hc/en-us/articles/4826237411732-Digital-certification-FAQ#h_01FYPNNMQWF675J41C9ES1E09Z}}

| rowspan="12" |N/A

OSWP

|OffSec Wireless Professional

OSWA

|OffSec Web Assessor

OSEP

|OffSec Experienced Penetration Tester

OSED

|OffSec Security Exploit Developer

|Exploit Development

OSWE

|OffSec Web Expert

| rowspan="2" |Penetration Testing

OSCE3

|OffSec Certified Expert3

OSEE

|OffSec Exploitation Expert

|Exploit Development

OSDA

|OffSec Defensive Analyst

|Security Operations

OSMR

|OffSec macOS Researcher

|Exploit Development

OSIR

|OffSec Incident Responder

|Incident Response

| rowspan="2" |Starting with certifications new to the market in 2024, OffSec certifications will expire after 3 years.

OSMR

|OffSec Threat Hunter

|Threat Hunting

style="background:#F5FFFA" |EITCI

|EITCA/IS

|EITCA Information Technologies Security Academy

|General Cyber Security

| rowspan="3" |No expiration

| rowspan="3" |N/A

CSA

|CCSK

|CSA Certificate of Cloud Security Knowledge

| rowspan="2" |Cloud Security

style="background: #F5FAFF" |Cloud Credential Council

|PCSM

|CCC Professional Cloud Security Manager

rowspan="3" |IAPP

|CIPP

|Certified Information Privacy Professional

| rowspan="3" |Privacy

| rowspan="3" |2 years

| rowspan="3" |50,000 Total

CIPM

|Certified Information Privacy Manager

CIPT

|Certified Information Privacy Technologist

rowspan="8" style="background:#FFF5FA" |INE Security

|eJPT

|eLearnSecurity Certified Junior Penetration Tester

| rowspan="5" |Penetration Testing

| rowspan="8" |No expiration

| rowspan="8" |N/A

eWPT

|eLearnSecurity Web Application Penetration Tester

eWPTX

|eLearnSecurity Web Application Penetration Tester eXtreme

eMAPT

|eLearnSecurity Mobile Application Penetration Tester

eCPT

|eLearnSecurity Certified Penetration Tester

eCIR

|eLearnSecurity Certified Incident Response Professional

|Incident Response

eCTHP

|eLearnSecurity Certified Threat Hunting Professional

|Threat Hunting

eCDFP

|eLearnSecurity Certified Digital Forensics Professional

|Digital Forensics

rowspan="17" |CREST

|CPSA

|CREST Practitioner Security Analyst

| rowspan="4" | Penetration Testing

| rowspan="17" | 3 Years

| rowspan="17" |N/A

CRT

|CREST Registered Penetration Tester

CCT App

|CREST Certified Web Application Tester

CCT Inf

|CREST Certified Infrastructure Tester

CCSAS

|CREST Certified Simulated Attack Specialist

| rowspan="2" | Attack Simulation

CCSAM

|CREST Certified Simulated Attack Manager

CCWS

|CREST Certified Wireless Specialist

|Wireless security

CPTIA

|CREST Practitioner Threat Intelligence Analyst

| rowspan="3" |Threat Intelligence

CRTIA

|CREST Registered Threat Intelligence Analyst

CCTIM

|CREST Certified Threat Intelligence Manager

CPIA

|CREST Practitioner Intrusion Analyst

| rowspan="4" |Security Analysis

CRIA

|CREST Registered Intrusion Analyst

CCNIA

|CREST Certified Network Intrusion Analyst

CCHIA

|CREST Certified Host Intrusion Analyst

CCMRE

|CREST Certified Malware Reverse Engineer

|Malware Analysis

CCIM

|CREST Certified Incident Manager

|Incident Response

CRTSA

|CREST Registered Technical Security Architect

|Security Architecture

rowspan="12" style="background:#F5FFFA" |InfoSec Institute

|CCFE

|Certified Computer Forensics Examiner

|Forensics

| rowspan="12" |4 years

| rowspan="12" |N/A

CCTHP

|Certified Cyber Threat Hunting Professional

|Threat Hunting

CDRP

|Certified Data Recovery Professional

|Disaster Recovery

CEPT

|Certified Expert Penetration Tester

|Penetration Testing

CEREA

|Certified Expert Reverse Engineering Analyst

|Malware Analysis

CMWAPT

|Certified Mobile and Web Application Penetration Tester

|Penetration Testing

CMFE

|Certified Mobile Forensics Examiner

|Forensics

CPT

|Certified Penetration Tester

|Penetration Testing

CRTOP

|Certified Red Team Operations Professional

|Red Teaming

CREA

|Certified Reverse Engineering Analyst

|Malware Analysis

CSSA

|Certified SCADA Security Architect

|Critical Infrastructure Security

CSAP

|Certified Security Awareness Practitioner

|Security Awareness

rowspan="3" |Cyber Struggle{{fix|text=notability?}}

|CSAE

|Cyber Struggle Aegis

|Security Analysis

| rowspan="3" |No expiration

| rowspan="3" |N/A

CSR

|Cyber Struggle Ranger

|Red Teaming

CSTPO

|Cyber Struggle Tactical Pistol Operator

|Tactical fire gun shooting

rowspan="2" |Linux Professional Institute (LPI)

|SecE

|Linux Professional Institute Security Essentials

|General Cyber Security

|No expiration{{Cite web |date= |title=Linux Professional Institute Security Essentials |url=https://www.lpi.org/our-certifications/security-essentials-overview/ |access-date=2023-09-06 |website=lpi.org}}

|N/A

LPIC-3 Security

|Linux Professional Institute LPIC-3 Security

|IT-Administration

|5 years{{Cite web |date= |title=Linux Professional Institute LPIC-3 Security |url=https://www.lpi.org/our-certifications/lpic-3-303-overview/ |access-date=2023-09-06 |website=lpi.org}}

|N/A

rowspan="33" style="background:#F5FAFF" |Mile2

|C)SA1

|Certified Security Awareness 1

| rowspan="2" |Security Awareness

| rowspan="33" |3 Years

| rowspan="33" |N/A

C)SA2

|Certified Security Awareness 2

C)SP

|Certified Security Principles

|General Cyber Security

C)ISSO

|Certified Information Systems Security Officer

|Management

IS20

|Information Security 20 Security Controls

|General Cyber Security

C)SLO

|Certified Security Leadership Officer

|Management

C)VA

|Certified Vulnerability Assessor

|Vulnerability Management

C)PEH

|Certified Professional Ethical Hacker

| rowspan="3" |Penetration Testing

C)PTE

|Certified Penetration Tester

C)PTC

|Certified Penetration Testing Consultant

C)PSH

|Certified PowerShell Hacker

|Scripting

C)IHE

|Certified Incident Handling Engineer

|Incident Response

C)DFE

|Certified Digital Forensic Examiner

| rowspan="3" |Forensics

C)VFE

|Certified Virtualization Forensics Engineer

C)NFE

|Certified Network Forensics Examiner

C)DRE

|Certified Disaster Recovery Engineer

|Disaster Recovery

C)HISSP

|Certified Healthcare Information Systems Security Professional

|Healthcare

C)ISMS-LA

|Certified Information Security Management Systems Lead Auditor

|Auditing

C)ISMS-LI

|Certified Information Security Management Systems Lead Implementer

|Risk Management

C)ISSA

|Certified Information Security Systems Auditor

|Auditing

C)SWAE

|Certified Secure Web Application Engineer

|Application Security

C)VCP

|Certified Virtualization Principles

| rowspan="2" |Virtualization

C)VE

|Certified Virtualization Engineer

C)CSO

|Certified Cloud Security Officer

|Cloud Security

C)VSE

|Certified Virtualization Systems Engineer

|Virtualization

C)CSSM

|Certified Cybersecurity Systems Manager

|Management

C)ISRM

|Certified Information Systems Risk Manager

|Risk Management

ISCAP

|Information Systems Certification & Accreditation Professional

|Auditing

C)SWAE

|Certified Secure Web Application Engineer

|Web Security

C)ISS

|Certified IPv6 Security Specialist

|Network Security

C)CSA

|Certified Cybersecurity Analyst

| rowspan="2" |Security Analysis

C)CTA

|Certified Cyber Threat Analyst

C)CTIA

|Certified Cyber Threat Intelligence Analyst

|Threat Intelligence

rowspan="4" |ASIS International

|CPP

|Certified Protection Professional

| rowspan="2" |Management

| rowspan="4" |3 Years

| rowspan="4" |N/A

APP

|Associate Protection Professional

PCI

|Professional Certified Investigator

|Forensics

PSP

|Physical Security Professional

|Physical Security

rowspan="3" style="background: #FFF5FA" |SABSA

|SABSA-SCF

|SABSA Chartered Security Architect – Foundation Certificate

| rowspan="3" |Security Architecture

| rowspan="3" |3 Years

| rowspan="3" |N/A

SABSA-SCP

|SABSA Chartered Security Architect – Practitioner Certificate

SABSA-SCM

|SABSA Chartered Security Architect – Master Certificate

rowspan="4" |APMG International

|ISO/IEC 27001-F

|ISO/IEC 27001 Foundation

| rowspan="4" |Standards

| rowspan="4" |No expiration

| rowspan="4" |N/A

ISO/IEC 27001-P ISO

|ISO/IEC 27001 Practitioner - Information Security Officer

NCSP-F

|NIST Cyber Security Professional Foundation

NCSP-P

|NIST Cyber Security Professional Practitioner

rowspan="9" style="background:#FAF5FF" |EXIN

|PDP-E

|EXIN Privacy & Data Protection Essentials

| rowspan="3" |Privacy

| rowspan="9" |No expiration

| rowspan="9" |N/A

PDP-F

|EXIN Privacy & Data Protection Foundation

PDP-P

|EXIN Privacy and Data Protection Practitioner

CIT-F

|EXIN Cyber & IT Security Foundation

|General Cyber Security

CEF

|EXIN Ethical Hacking Foundation

|Penetration Testing

ISO/IEC 27001-F

|EXIN Information Security Management ISO27001 Foundation

| rowspan="3" |Standards

ISO/IEC 27001-P

|EXIN Information Security Management ISO27001 Professional

ISO/IEC 27001-E

|EXIN Information Security Management ISO27001 Expert

SP-F

|EXIN Secure Programming Foundation

|Software Development

rowspan="17" |IBITGQ

|EU GDPR F

|Certified EU General Data Protection Regulation Foundation

| rowspan="2" |Standards

| rowspan="2" |No expiration

| rowspan="2" |N/A

EU GDPR P

|Certified EU General Data Protection Regulation Practitioner

C-DPO

|Certified Data Protection Officer

|Privacy

| rowspan="15" |No expiration

| rowspan="15" |N/A

C BS PIMS LI

|Certified BS 10012 PIMS Lead Implementer

|Standards

CCPA F

|California Consumer Privacy Act Foundation

| rowspan="2" |Privacy

C IDP F

|Certified Introduction to Data Protection

CIS F

|Certified ISO 27001 ISMS Foundation

| rowspan="6" |Standards

CIS LI

|Certified ISO 27001 ISMS Lead Implementer

CIS LA

|Certified ISO 27001 ISMS Lead Auditor

CIS IA

|Certified ISO 27001 ISMS Internal Auditor

CISRM

|Certified ISO 27005 ISMS Risk Management

PCI IM

|PCI DSS Implementation

CCRMP

|Managing Cyber Security Risk

|Management

CIRM F

|Cyber Incident Response Management Foundation

|Incident Response

C CR P

|Certified Cyber Resilience Practitioner

| rowspan="2" |Management

CITGP

|Implementing IT Governance – Foundation & Principles

C CS F

|Certified Cyber Security Foundation

|General Cyber Security

rowspan="5" style="background:#FFF5FA" |CertNexus

|CFR

|CyberSec First Responder

|Incident Response

| rowspan="4" |3 Years

| rowspan="4" |N/A

CIOTSP

|Certified IoT Security Practitioner (CIoTSP)

|IoT

IRBIZ

|Incident Response for Business Professionals

|Incident Response

CSC

|Cyber Secure Coder

|Software Development

CYBERSAFE

|CyberSAFE

|End user security

|1 Year

| rowspan="7" |N/A

rowspan="6" |Lunarline

|CEHT

|Certified Expert Hunt Team

|Threat Hunting

| rowspan="6" |3 Years

CECS

|Certified Expert Cloud Security

|Cloud Security

CEIA

|Certified Expert Independent Assessor

|Auditing

CEPM

|Certified Expert Program Manager

| rowspan="2" |Management

CERP

|Certified Expert RMF Professional

CESA

|Certified Expert Security Analyst

|Security Analysis

rowspan="13" style="background:#FFF5FA" |McAfee Institute

|CECI

|Certified Expert in Cyber Investigations

|Forensics

| rowspan="12" |2 Years

| rowspan="12" |N/A

CCII

|Certified Cyber Intelligence Investigator

| rowspan="5" |Threat Intelligence

CCIP

|Certified Cyber Intelligence Professional

CSMIE

|Certified Social Media Intelligence Expert

SMIA

|Certified Social Media Intelligence Analyst

CCTA

|Certified Counterintelligence Threat Analyst

CPCI

|Certified Professional Criminal Investigator

| rowspan="2" |Forensics

CORCI

|Certified Organized Retail Crime Investigator

CEL

|Certified Executive Leader

|Management

CHTI

|Certified Human Trafficking Investigator

| rowspan="3" |Forensics

CCFI

|Certified Cryptocurrency Forensic Investigator

WVTS

|Certified Workplace violence and threat specialist

C|OSINT

|Certified in Open Source Intelligence

|Threat Intelligence

|2 Years

|N/A

rowspan="3" |The IIA

|CIA

|Certified Internal Auditor

|Auditing

|

|160,000+

CRMA

|Certification in Risk Management Assurance

|Risk Management

|

| rowspan="2" |N/A

QIAL

|Qualification in Internal Audit Leadership

|Auditing

|

rowspan="15" style="background:#F5FFFA |GAQM

|CSST

|Certified Software Security Tester

| rowspan="2" |Software Development

| rowspan="2" |No expiration

| rowspan="15" |N/A

CASST

|Certified Advanced Software Security Tester

CISP

|Certified Information Security Professional

|General Cyber Security

| rowspan="2" |5 Years

CISSM

|Certified Information Systems Security Manager

|Management

CISST

|Certified Information Systems Security Tester

|Security Testing

| rowspan="9" |No expiration

CPT

|Certified Penetration Tester

|Penetration Tester

CFA

|Certified Forensic Analyst

|Forensics

CPEH

|Certified Professional Ethical Hacker

|Penetration Tester

ISO/IEC 27001-CIA

|ISO 27001 ISMS Certified Internal Auditor

| rowspan="3" |Auditing

ISO/IEC 27001-27002-LA

|ISO 27001-27002 Lead Auditor

ISO/IEC 27001-LA

|ISO 27001:2013 ISMS Certified Lead Auditor

ISO/IEC 27001-F

|ISO 27001:2013 ISMS Foundation

| rowspan="4" |Standards

ISO/IEC 27002-F

|ISO 27002 Foundation

ISO/IEC 27002-LI

|ISO 27002 Lead Implementer

|4 Years

ISO/IEC 31000-LRM

|ISO 31000 Certified Lead Risk Manager

|No expiration

rowspan="8" | ISECOM

|OPSA

|OSSTMM Professional Security Analyst

|Security Analysis

| rowspan="8" |No expiration

| rowspan="8" |N/A

OPST

|OSSTMM Professional Security Tester

|Penetration Tester

OPSE

|OSSTMM Professional Security Expert

|General Cyber Security

OWSE

|OSSTMM Wireless Security Expert

|Penetration Tester

CTA

|OSSTMM Certified Trust Analyst

|Trust Management

SAI

|Certified Security Awareness Instructor

|Cyber Security Trainer

CHA

|Certified Hacker Analyst

|Penetration Tester

CHAT

|Certified Hacker Analyst Trainer

|Cyber Security Trainer

style="background: "#FAF5FF|HISPI

|HISP

|Holistic Information Security Practitioner

|General Cyber Security

|3 Years

|N/A

style="background:#F5FAFF" |Blockchain Training Alliance

|CBSP

|Certified Blockchain Security Professional

| rowspan="2" |Blockchain

|2 Years

| rowspan="5" |N/A

Crypto Consortium

|CCSSA

|CryptoCurrency Security Standard Auditor

| rowspan="4" | No expiration

rowspan="3" style="background: #FFFAF5" |The Open Group

|OG0-041

|Open FAIR Foundation

|Risk Management

TOGAF9-F

|TOGAF 9 Foundation

| rowspan="2" |Security Architecture

TOGAF9-C

|TOGAF 9 Certified

rowspan="10" |TCM Security

|PJPT

|Practical Junior Penetration Tester

| rowspan="3" |Penetration Tester

| rowspan="10" |No expiration

| rowspan="10" |N/A

PNPT

|Practical Network Penetration Tester

PCRP

|Practical Career-Ready Professional

PMPR

|Practical Malware Research Professional

|Malware Analysis

PORP

|Practical OSINT Research Professional

|Open-Source Intelligence

PIPA

|Practical IoT Pentest Associate

|Penetration Tester

PSAA

|Practical SOC Analyst Associate

|SOC Analysis

PMPA

|Practical Mobile Pentest Associate

| rowspan="3" |Penetration Tester

PWPA

|Practical Web Pentest Associate

PWPP

|Practical Web Pentest Professional

rowspan="11" style="background:#F5FFFA" |Star Certification

|SCSU

|Star Cyber Secure User

|Security Awareness

| rowspan="11" | 3 years{{Cite web|url=https://www.starcertification.org/Certifications/Certificate/su|title=(SCSU) Star Cyber Secure User {{!}} Star Certifications|access-date=2021-08-30}}

| rowspan="11" |N/A

EHE

|Star Certified Ethical Hacking Expert

| rowspan="2" |Penetration Testing

SESS

|Star Expert Security Specialist

SMFAS

|Star Mobile Forensic and Advance Security

|Forensics

SPTE

|Star Penetration Tester Experts {{Cite web|url=https://niccs.cisa.gov/training/search/star-certification-llc/star-penetration-tester-experts|title=PenTest Certification|access-date=2021-09-08}}

| rowspan="2" |Penetration Testing

SSCA

|Star Secure Cyber Analytics

SFICH-007

|Star Forensic investigator in Computer Hacking-007

|Forensics

SSPE.Net

|Star Secure Programmer Expert- .Net

| rowspan="4" |Software Development

SSPE-Java

|Star Secure Programmer Expert- Java

SSPE-Android

|Star Secure Programmer Expert- Android

SSPE-PHP

|Star Secure Programmer Expert- PHP

rowspan="2" |Zero-Point Security

|CRTO

|Certified Red Team Operator

| rowspan="2" |Red Teaming

| rowspan="2" |No expiration

| rowspan="17" |N/A

CRTL

|Certified Red Team Lead

rowspan="3" |EC First

|CCSA

|Certified Cyber Security Architect

|Security Architecture

| rowspan="3" |3 years

CSCS

|Certified Security Compliance Specialist

|Risk/Compliance

CMMP

|Certified CMMC Professional

|Standards

rowspan="6" |8kSec

|OMSE

|Certified Offensive Mobile Security Expert

|Vulnerability Research

| rowspan="6" |No expiration{{Cite web |date=2025-03-06 |title=8kSec LLC {{!}} NICCS |url=https://niccs.cisa.gov/education-training/catalog/8ksec-llc |access-date=2025-03-11 |website=niccs.cisa.gov |language=en}}

CMSE

|Certified Mobile Security Engineer

|Application Security

CISR

|Certified iOS Security Researcher

|Vulnerability Research

CASR

|Certified Android Security Researcher

|Vulnerability Research

CISE

|Certified iOS Security Engineer

|Application Security

CASE

|Certified Android Security Engineer

|Application Security

CWNP

|CWS

|Certified Wireless Specialist

|Wireless Security

|

rowspan="5" |Hack The Box (HTB)

|CBBH

|Certified Bug Bounty Hunter

|Bug Hunting

| rowspan="5" |No expiration

CPTS

|Certified Penetration Testing Specialist

|Penetration Testing

CDSA

|Certified Defensive Security Analyst

|Security Analyst

CWEE

|Certified Web Exploitation Expert

| rowspan="2" |Penetration Testing

CAPE

|Certified Active Directory Pentesting Expert

rowspan="2" |TryHackMe

|SAL1

|Security Analyst Level 1

|Security Analysis

|3 years

|N/A

PT1

|Jr Penetration Tester

|Penetration Testing

|N/A

|N/A

rowspan="3" |CNITSEC

|CISP-CISE

|Certified Information Security Engineer

|General Security

| rowspan="3" |3 years

| rowspan="3" | N/A

CISP-PTE

|Certified Penetration Testing Engineer

|Penetration Testing

CISP-IRE

|Certified Incident Response Engineer

|Incident Response

= Vendor-specific =

In this chart, colors are used to help group certifications from the same issuer together and have no other significance.

class="wikitable sortable mw-collapsible"

|+

! rowspan="2" |Issuing Organization

! rowspan="2" |Credential Abbreviation

! rowspan="2" |Certification Title

! rowspan="2" |Focus

! rowspan="2" |Validity duration

! rowspan="2" |Number issued

rowspan="4" |Cisco

|CCNA Security

|Cisco Certified Network Associate - Security

| rowspan="6" |Network Security

| rowspan="4" |3 years{{Cite web |title=Recertification - Training & Certifications |url=https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/recertification.html |access-date=2024-02-19 |website=Cisco |language=en}}

| rowspan="3" |

CCNA CyberOps

|Cisco Certified Network Associate - CyberOps

CCNP Security

|Cisco Certified Network Professional - Security

CCIE Security

|Cisco Certified Internetwork Expert - Security

|2062{{Cite web |title=CCIE |url=http://hofccie.weebly.com/ |access-date=2024-02-19 |website=CCIE Hall of Fame |language=en}}

style="background: #F5FFFA" rowspan="2" |Check Point

|CCSA

|Check Point Certified Security Administrator

| rowspan="2" |

| rowspan="2" |

CCSE

|Check Point Certified Security Expert

Kali

|KLCP

|Kali Linux Certified Professional

|Penetration Testing

|No expiration

|N/A

style="background: #F5FAFF" rowspan="10" |IBM

|-

|IBM Certified Deployment Professional - Security Access Manager V9.0

|Access Control

| rowspan="10" |

| rowspan="10" |

-

|IBM Certified Associate Administrator - Security Guardium Data Protection V10.1.2

| rowspan="2" |Data Protection

-

|IBM Certified Administrator - Security Guardium V10.0

-

|IBM Certified Deployment Professional - Identity Governance and Intelligence V5.2

|Access Control

-

|IBM Certified Analyst - i2 Analysts Notebook V9

| rowspan="5" |Threat Intelligence

-

|IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2

-

|IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2

-

|IBM Certified Associate Administrator - IBM QRadar SIEM V7.3.2

-

|IBM Certified Deployment Professional - IBM QRadar SIEM V7.3.2

-

|IBM Certified Deployment Professional - Security Identity Governance and Intelligence V5.2.5

|Access Control

rowspan="7" |Microsoft

| AZ-500

|Microsoft Certified: Azure Security Engineer Associate

| rowspan="2" |Cloud Security

| rowspan="6" |1 year *{{Cite web |last=Micsullivan |date=2023-10-25 |title=Credential expiration policies |url=https://learn.microsoft.com/en-us/credentials/support/credential-expiration-policy#role-based-and-specialty-certifications-expiry |access-date=2024-02-21 |website=learn.microsoft.com |language=en-us}}

| rowspan="6" |

MS-500

|Microsoft 365 Certified: Security Administrator Associate

SC-100

|Microsoft Certified: Cybersecurity Architect Expert

|Security Architect

SC-200

|Microsoft Certified: Security Operations Analyst Associate

|SIEM

SC-300

|Microsoft Certified: Identity and Access Administrator Associate

|IAM

SC-400

|Microsoft Information Protection Administrator

|Risk/Compliance

SC-900

|Microsoft Certified: Security, Compliance, and Identity Fundamentals

|Fundamentals

|No expiration{{Cite web |last=Micsullivan |date=2023-10-25 |title=Credential expiration policies |url=https://learn.microsoft.com/en-us/credentials/support/credential-expiration-policy#fundamentals-certifications-expiry |access-date=2024-02-21 |website=learn.microsoft.com |language=en-us}}

|

style="background:#FAF5FF" | AWS

| -

|AWS Certified Security - Specialty

| rowspan="2" |Cloud Security

| rowspan="2" |

| rowspan="2" |

Google

| -

|Google Professional Cloud Security Engineer

Jamf

|JCESA

|Jamf Certified Endpoint Security Admin

|macOS Security

|

|

rowspan="3" |Alibaba

|ACA

|ACA Cloud Security Certification

| rowspan="3" |Cloud Security

| rowspan="3" |

| rowspan="3" |

ACP

|ACP Cloud Security Certification

ACE

|ACE Cloud Security Expert

rowspan="2" style="background: #FFF5FA" |Red hat

|EX415

|Red Hat Certified Specialist in Security: Linux

| rowspan="2" |IT-Administration

| rowspan="2" |

| rowspan="2" |

EX425

|Red Hat Certified Specialist in Security: Containers and OpenShift Container

rowspan="3" style="background: #FFFAF5" |OpenText

|EnCE

|EnCase Certified Examiner

| rowspan="3" |Forensics

| rowspan="3" |

| rowspan="3" |

EnCEP

|EnCase Certified eDiscovery Practitioner

CFSR

|EnCase Certified Forensic Security Responder

rowspan="6" |Fortinet

|NSE 1/2/3

|Network Security Professional Associate

|vendor-specific products

| rowspan="6" |2 years{{cite web |title=Network Security Expert |url=https://fortinet.egnyte.com/dl/bi50RCi0b3/NSE-Brochure-2020-Web-Version_ver1.1.pdf_ |website=NSE Institute |publisher=Fortinet |via=egnyte.com}}

| rowspan="6" |

NSE 4

|Network Security Professional

| Firewalls

NSE 5

|Network Security Analyst

|administration

NSE 6

|Network Security Specialist

|vendor-specific products

NSE 7

|Network Security Architect

| rowspan="2" |Firewalls

NSE 8

|Network Security Expert

rowspan="5" style="background: #F5FFFA" |Juniper

|JNCIA-SEC

|Juniper Networks Certified Associate

| rowspan="7" |Network Security

| rowspan="5" |3 years

| rowspan="5" |

JNCIS-SEC

|Juniper Networks Certified Specialist

JNCIP-SEC

|Juniper Networks Certified Professional

JNCIE-SEC

|Juniper Networks Certified Expert

JNCDS-SEC

|Juniper Networks Certified Design Specialist Security

rowspan="6" |Palo Alto

|PCNSA

|Palo Alto Networks Certified Network Security Administrator

| rowspan="6" |

| rowspan="6" |

PCNSE

|Palo Alto Networks Certified Network Security Engineer

PCCET

|Palo Alto Networks Certified Cybersecurity Entry-level Technician

|General Cyber Security

PCDRA

|Palo Alto Networks Certified Detection and Remediation Analyst

|Network Security

PCCSE

|Palo Alto Networks Prisma Certified Cloud Security Engineer

|Cloud Security

PCSAE

|Palo Alto Networks Certified Security Automation Engineer

|Threat Intelligence

rowspan="16" style="background:#FFFAF5" |Symantec, (since 2015 NortonLifeLock)

|250-215

|Administration of Symantec Messaging Gateway 10.6

| rowspan="16" |Network Security

| rowspan="16" |

| rowspan="16" |

250-420

|Administration of Symantec VIP (March 2017)

250-426

|Administration of Symantec Data Center Security - Server Advanced 6.7

250-428

|Administration of Symantec Endpoint Protection 14

250-430

|Administration of Blue Coat ProxySG 6.6

250-433

|Administration of Blue Coat Security Analytics 7.2

250-438

|Administration of Symantec Data Loss Prevention 15*

250-440

|Administration of Symantec PacketShaper 11.9.1*

250-441

|Administration of Symantec Advanced Threat Protection 3.0*

251/250-443

|Administration of Symantec CloudSOC - R2*

250-444

|Administration of Symantec Secure Sockets Layer Visibility 5.0*

250-445

|Administration of Symantec Email Security.cloud - v1*

251/250-446

|Administration of Symantec Web Security Service (WSS) - R1*

251/250-447

|Administration of Symantec Client Management Suite 8.5*

251/250-551

|Administration of Symantec Endpoint Detection and Response 4.1*

250-556

|Administration of Symantec ProxySG 6.7*

Microsoft 1 year *: you have to do a free refresh exam within 180 days before expiration. if not done, the certificate expire otherwise it extends by 1 year.

See also

{{Commons category|Computer-related occupations}}

Notes

{{Notelist}}

References

{{Reflist}}

{{Computer Security Certifications}}

{{Computer security}}

01

computer security certifications

computer security certifications

computer security certifications