EC Council

  • The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field. more information at http://vesta.eccouncil.org/Certification/licensed-penetration-tester

  • to recieve the certification you must pass the  EC-Council’s Certified Secure Programmer 312-92 exam with a  score of 70% or greater. The exam is multiple choice, consisting of 50 questions. the certification covers C/C++, Java, .Net, PHP and SQL. the purpose of the certification is to teach knowledge on securing applications.

  • Issued By: International Council of E-Commerce Consultants (EC-Council) The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective More Information: https://www.eccouncil.org/certification/certified_ethical_hacker.aspx


  • Issued by: ISACA Awarded by the Information Systems Audit and Control Association to those individuals with an interest in information systems auditing, control, and security who have met and continue to meet specific requirements. Requirements: -Successfully complete the CISA Examination -Adhere to the Information Systems Audit and Control Association's Code of Professional Ethics -Submit evidence of a minimum of five (5) years of professional information systems (IS) auditing, control or security work experience. Substitution and waivers of such experience applies -Adhere to a continuing education program. More Information: http://www.isaca.org/Certification/CISA-Certified-Information-Systems-Au...

  • Issued by: ISACA Awarded by the Information Systems Audit and Control Association& a new certification and is specifically geared toward experienced information security professionals. CISM is business-oriented and focused on information risk management while addressing management, design and technical security issues at the conceptual level. It is for the individual who must maintain a view of the big picture by managing, designing, overseeing and assessing an enterprise's information security. Requirements: -Successfully complete the CISM Examination -Adhere to the Information Systems Audit and Control Association's Code of Professional Ethics -Submit verified evidence of a minimum of five (5) years of information security work experience, with a minimum of three (3) years of information security management work experience in three or more the CISM job practice areas More Information: http://www.isaca.org/Certification/CISM-Certified-Information-Security-M...


  • Issued by: CompTIA The CASP certification is an international, vendor-neutral exam that proves competency in enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines. The exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. For more detailed information, download the exam objectives. While there is no required prerequisite, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level. More Information: http://certification.comptia.org/getCertified/certifications/casp.aspx

  • Issued by: CompTIA CompTIA Security+ validates knowledge of systems security, network infrastructure, access control, assessments and audits, cryptography and organizational security." Requirements: "Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of on-the-job technical networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended. More Information: http://certification.comptia.org/getCertified/certifications/security.aspx


  • Issued by: ISC2 The Certified Secure Software Lifecycle Professional (CSSLP®) is the only certification in the industry designed to ensure that security is considered throughout the entire software development lifecycle. From concept and planning through operations and maintenance to the ultimate disposal, it establishes industry standards and best practices for building security into each phase. Confidentiality, integrity, availability, authentication, authorization and auditing – the core tenets of security – must become requirements in the software lifecycle. Without this level of commitment, information is placed at risk. Incorporating security early and maintaining it throughout all the phases of the software lifecycle has proven to be 30-100 times less expensive and incalculably more effective than the release and patch methodology used frequently today. More information: https://www.isc2.org/csslp/default.aspx

  • Review certification type. Issued By: (ISC)2 The Certified Authorization Professional (CAP) credential is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of authorizing and maintaining information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements and documentation. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals. The credential is appropriate for commercial markets, civilian and local governments, and the U.S. Federal government including the State Department and the Department of Defense (DoD). See the DoD Matrix. Job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers as well as all senior system managers apply. More information: https://www.isc2.org/cap/default.aspx

  • Issued by: (ISC)2 SSCP Certification was designed to recognize an international standard for practitioners of information security [IS] and understanding of a Common Body of Knowledge (CBK). It focuses on practices, roles and responsibilities as defined by experts from major IS industries. Certification can enhance an IS career and provide added credibility. Seven SSCP information systems security test domains are covered in the examination pertaining to the Common Body of Knowledge: Access Controls, Administration, Audit and Monitoring, Risk, Response and Recovery, Cryptography, Data Communications, Malicious Code/Malware. Requirements: Examination, Certification, Endorsement, Audit To be issued a certificate, a candidate must: -Pass the SSCP examination with a scaled score of 700 points or greater -Submit a properly completed and executed Endorsement Form -Successfully pass an audit of their assertions regarding professional experience, if the candidate is selected for audit Endorsement - Once a candidate has been notified they have successfully passed the SSCP examination, he or she will be required to have his or her application endorsed before the credential can be awarded. The endorser attests that the candidate's assertions regarding professional experience are true to the best of their knowledge, and that the candidate is in good standing within the information security industry. Audit Passing candidates will be randomly selected and audited by (ISC)² Services prior to issuance of any certificate. Multiple certifications may result in a candidate being audited more than once." More information: https://www.isc2.org/sscp/default.aspx

  • Issued by: ISC2 The CISSP is a certification for information security professionals&for the purpose of recognizing individuals who have distinguished themselves as an experienced, knowledgeable, and proficient information security practitioner. The CISSP certificate also provides a means of identifying those persons who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in the information security profession. Requirements: Certification is awarded to those individuals who achieve a prescribed level of information security experience, comply with a professional code of ethics, and pass a rigorous examination on the Common Body of Knowledge of information security. In order to maintain currency in the field, each CISSP must be recertified every three years by participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Common Body of Knowledge, and service in professional organizations. More information: http://www.isc2.org/cissp/default.aspx