I get asked almost daily what the main Cyber Security Certification courses are. Below is a summary of some of the most recognized Cyber Security professional certifications.
Feel free to drop us a line if you’re looking for discount vouchers and scholarships etc. We do offer a range of programs to help out team to uplift their skills by way of certifications and industry technical courses.
I’ve also included some of the common vendor course links as well.
Name | Features | Benefits | Restrictions or Requirements |
---|---|---|---|
Certified Information Systems Security Professional (CISSP) | Covers 8 domains of information security; globally recognized | Enhances credibility; often required for senior roles | Minimum of 5 years of work experience in 2 or more of the 8 domains |
Certified Ethical Hacker (CEH) | Teaches ethical hacking tools and techniques | Practical skills for identifying vulnerabilities | No specific requirements; training recommended |
Certified Information Security Manager (CISM) | Focuses on managing and governing a company’s information security program | Demonstrates understanding of risk management; aligns with business goals | Minimum of 5 years of work experience in information security management |
Certified Information Systems Auditor (CISA) | Focuses on information auditing, control, assurance | Validates audit experience; enhances career progression | Minimum of 5 years of work experience in information systems auditing, control, or assurance |
Certified Cloud Security Professional (CCSP) | Specialized in cloud security; covers architectural concepts & design | Demonstrates cloud security expertise; aligns with industry standards | Minimum of 5 years of IT experience, with 3 years in information security and 1 year in one of the six CCSP domains |
Certified Cyber Security Practitioner (CCSP – Australia) | Focuses on Australian cyber security practices | Aligns with Australian regulations; enhances local career opportunities | Australian citizenship; security clearance; relevant experience |
Cisco Certified CyberOps Associate | Covers cybersecurity operations skills in a Security Operations Center (SOC) | Validates foundational cybersecurity skills; vendor-specific | No specific requirements; Cisco training recommended |
CompTIA Security+ | Entry-level; covers basic security skills and knowledge | Good starting point for cybersecurity career; vendor-neutral | No specific requirements; some experience recommended |
GIAC Security Essentials (GSEC) | Covers essential information security topics | Validates practical security knowledge; recognized by employers | No specific requirements; training recommended |
Offensive Security Certified Professional (OSCP) | Hands-on penetration testing certification | Demonstrates advanced practical skills; highly respected in the industry | Completion of the associated training course; strong foundational knowledge |
These certifications cater to various levels of expertise and specializations within the field of Cyber Security. They are instrumental in validating the skills and knowledge of professionals and are often considered by employers during the hiring process. The requirements and restrictions often include specific work experience and sometimes even citizenship or security clearance, depending on the focus of the certification.
Below is a table that includes vendors across different categories such as endpoint protection, EDR/XDR (Endpoint Detection and Response/Extended Detection and Response), asset management, and more. Please note that the cybersecurity landscape is vast and constantly evolving.
Vendor | Category | Certification Name | Features | Benefits | Restrictions or Requirements | More Information |
---|---|---|---|---|---|---|
Cisco | Network Security | Cisco Certified CyberOps Associate | Focuses on cybersecurity operations in a SOC | Validates Cisco-specific cybersecurity skills | Recommended training through Cisco | More Info |
Palo Alto Networks | Firewall/EDR | Palo Alto Networks Certified Network Security Administrator (PCNSA) | Covers Palo Alto’s next-generation firewall | Demonstrates ability to operate Palo Alto Networks firewalls | Recommended training through Palo Alto Networks | More Info |
Check Point | Firewall | Check Point Certified Security Administrator (CCSA) | Focuses on Check Point’s security administration | Validates skills in managing Check Point security solutions | Recommended training through Check Point | More Info |
Fortinet | Network Security | Fortinet Network Security Expert (NSE) Program | Multi-level certification program; covers Fortinet’s network security products | Validates expertise in Fortinet’s solutions | Levels 1-3 are free; Levels 4-8 require training and exams | More Info |
Symantec (Broadcom) | Endpoint Protection | Symantec Certified Specialist | Focuses on Symantec’s security products | Validates skills in Symantec’s solutions | Training and exams through Symantec | More Info |
McAfee | Endpoint Protection | McAfee Certified Product Specialist | Covers specific McAfee products | Demonstrates expertise in McAfee solutions | Training and exams through McAfee | More Info |
Juniper Networks | Network Security | Juniper Networks Certified Internet Specialist (JNCIS-SEC) | Focuses on Juniper’s security technologies | Validates skills in Juniper’s security solutions | Recommended training through Juniper Networks | More Info |
IBM | SIEM | IBM Certified Associate Analyst – Security QRadar SIEM V7.3.2 | Covers IBM’s QRadar SIEM | Validates skills in IBM’s security intelligence platform | Recommended training and experience with IBM QRadar | More Info |
Microsoft | Cloud Security | Microsoft Certified: Security Operations Analyst Associate | Focuses on Microsoft’s security solutions | Validates skills in Microsoft’s security technologies | Recommended training through Microsoft | More Info |
AWS | Cloud Security | AWS Certified Security – Specialty | Specialized in AWS security; covers architectural concepts & design | Demonstrates cloud security expertise in AWS environment | Minimum of 2 years of hands-on experience with AWS | More Info |
CrowdStrike | EDR/XDR | CrowdStrike Certified Falcon Administrator | Focuses on CrowdStrike’s Falcon platform | Validates skills in CrowdStrike’s EDR solutions | Recommended training through CrowdStrike | More Info |
Tanium | Endpoint Protection/EDR | Tanium Certified Operator | Covers Tanium’s endpoint protection and EDR solutions | Validates skills in Tanium’s technologies | Recommended training through Tanium | More Info |
Qualys | Asset Management | Qualys Certified Specialist | Focuses on Qualys’ asset management and security solutions | Validates skills in Qualys’ platform | Recommended training through Qualys | More Info |
ServiceNow | Security Operations | ServiceNow Certified Implementation Specialist – Security Operations | Covers ServiceNow’s security operations solutions | Validates skills in ServiceNow’s security operations platform | Recommended training through ServiceNow | More Info |
Trend Micro | Endpoint Protection | Trend Micro Certified Professional | Focuses on Trend Micro’s endpoint protection solutions | Validates skills in Trend Micro’s products | Recommended training through Trend Micro | More Info |
VMware | Network Security | VMware Certified Professional – Network Virtualization | Covers VMware’s network virtualization and security | Validates skills in VMware’s network security solutions | Recommended training through VMware | More Info |
This table includes a broad range of categories and vendors, encompassing various aspects of cybersecurity such as endpoint protection, EDR/XDR, asset management, network security, and more.