From dfce11ef106fa3e6025d272c2638e275c98edd97 Mon Sep 17 00:00:00 2001 From: gds-domingues <150634477+gds-domingues@users.noreply.github.com> Date: Sat, 20 Jan 2024 14:47:51 -0300 Subject: [PATCH] Add files via upload Adding a table with almost all cybersecurity certifications --- certifications/cybersec_certifications.md | 649 +++++++++++----------- 1 file changed, 319 insertions(+), 330 deletions(-) diff --git a/certifications/cybersec_certifications.md b/certifications/cybersec_certifications.md index 564e508..dbf0fda 100644 --- a/certifications/cybersec_certifications.md +++ b/certifications/cybersec_certifications.md @@ -1,366 +1,355 @@ |Company|Abbreviation|Title|Focus|Validity duration| |---|---|---|---|---| |[**Altered Security**](https://www.alteredsecurity.com/)|[**CRTE**](https://www.alteredsecurity.com/redteamlab)|Certified Red Team Expert|Red Teaming|3 years| -||[**CRTM**](https://www.alteredsecurity.com/gcb)|Certified Red Team Master|Red Teaming|3 years| -||[**CARTP**](https://www.alteredsecurity.com/azureadlab)|Certified Azure Red Team Professional|Red Teaming|3 years| -||[**CAWASP**](https://www.alteredsecurity.com/azureappsec)|Certified Azure Web Application Security Professional|Application Security|3 years| +|'|[**CRTM**](https://www.alteredsecurity.com/gcb)|Certified Red Team Master|Red Teaming|3 years| +|'|[**CARTP**](https://www.alteredsecurity.com/azureadlab)|Certified Azure Red Team Professional|Red Teaming|3 years| +|'|[**CAWASP**](https://www.alteredsecurity.com/azureappsec)|Certified Azure Web Application Security Professional|Application Security|3 years| |[**SECO**](https://www.seco-institute.org/)|[**S-ITSF**](https://www.seco-institute.org/certifications/it-security-track/foundation/)|IT-Security Foundation|General Cyber Security|3 years| -||[**S-ITSP**](https://www.seco-institute.org/certifications/it-security-certification-track/it-security-practitioner-certification/)|IT-Security Practitioner|General Cyber Security|3 years| -||[**S-ITSE**](https://www.seco-institute.org/certifications/it-security-track/)|IT-Security Expert|General Cyber Security|3 years| -||[**S-CITSO**](https://www.seco-institute.org/certifications/it-security-track/certified-officer/)|Certified IT-Security Officer|General Cyber Security|3 years| -||[**S-DPF**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-foundation-certification/)|Data Protection Foundation|Privacy|_No expiration_| -||[**S-DPP**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-practitioner-certification/)|Data Protection Practitioner|Privacy|1 year| -||[**S-CDPO**](https://www.seco-institute.org/certifications/certified-data-proctection-officer-cdpo/)|Certified Data Protection Officer|Privacy|3 years| -||[**S-EHF**](https://www.seco-institute.org/certifications/ethical-hacking-certification-track/ethical-hacking-foundation-certification/)|Ethical Hacking Foundation|Penetration Testing|3 years| -||[**S-EHP**](https://www.seco-institute.org/certifications/ethical-hacking-track/practitioner/)|Ethical Hacking Practitioner|Penetration Testing|3 years| -||[**S-SPF**](https://www.seco-institute.org/certifications/secure-software-certification-track/secure-programming-foundation-certification/)|Secure Programming Foundation|Software Development|3 years| -||[**S-DWF**](https://www.seco-institute.org/certifications/dark-web-foundation-certification/)|Dark Web Foundation|Threat Intelligence|3 years| -|[(ISC)2](https://www.isc2.org/)|[**CC**](https://www.isc2.org/certifications/cc)|Certified in CyberSecurity|IT-Administration|3 years (continuously)| -||[**CISSP**](https://www.isc2.org/certifications/cissp)|Certified Information Systems Security Professional|Management|3 years (continuously)| -||[**CISSP-ISSAP**](https://www.isc2.org/certifications/issap)|Information Systems Security Architecture Professional|Security Architecture|3 years (continuously)| -||[**CISSP-ISSEP**](https://www.isc2.org/certifications/issep)|Information Systems Security Engineering Professional|IT-Administration|3 years (continuously)| -||[**CISSP-ISSMP**](https://www.isc2.org/certifications/issmp)|Information Systems Security Management Professional|Management|3 years (continuously)| -||[**SSCP**](https://www.isc2.org/certifications/sscp)|Systems Security Certified Practitioner|IT-Administration|3 years (continuously)| -||[**CCSP**](https://www.isc2.org/certifications/ccsp)|Certified Cloud Security Professional|Cloud Security|3 years (continuously)| -||[**CAP**](https://www.isc2.org/certifications/cgrc)|Certified Authorization Professional|Auditing|3 years (continuously)| -||[**CSSLP**](https://www.isc2.org/certifications/csslp)|Certified Secure Software Lifecycle Professional|Software Development|3 years (continuously)| +|'|[**S-ITSP**](https://www.seco-institute.org/certifications/it-security-certification-track/it-security-practitioner-certification/)|IT-Security Practitioner|General Cyber Security|3 years| +|'|[**S-ITSE**](https://www.seco-institute.org/certifications/it-security-track/)|IT-Security Expert|General Cyber Security|3 years| +|'|[**S-CITSO**](https://www.seco-institute.org/certifications/it-security-track/certified-officer/)|Certified IT-Security Officer|General Cyber Security|3 years| +|'|[**S-DPF**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-foundation-certification/)|Data Protection Foundation|Privacy|_No expiration_| +|'|[**S-DPP**](https://www.seco-institute.org/certifications/data-protection-certification-track/data-protection-practitioner-certification/)|Data Protection Practitioner|Privacy|1 year| +|'|[**S-CDPO**](https://www.seco-institute.org/certifications/certified-data-proctection-officer-cdpo/)|Certified Data Protection Officer|Privacy|3 years| +|'|[**S-EHF**](https://www.seco-institute.org/certifications/ethical-hacking-certification-track/ethical-hacking-foundation-certification/)|Ethical Hacking Foundation|Penetration Testing|3 years| +|'|[**S-EHP**](https://www.seco-institute.org/certifications/ethical-hacking-track/practitioner/)|Ethical Hacking Practitioner|Penetration Testing|3 years| +|'|[**S-SPF**](https://www.seco-institute.org/certifications/secure-software-certification-track/secure-programming-foundation-certification/)|Secure Programming Foundation|Software Development|3 years| +|'|[**S-DWF**](https://www.seco-institute.org/certifications/dark-web-foundation-certification/)|Dark Web Foundation|Threat Intelligence|3 years| +|[(ISC)2](https://www.isc2.org/)|[**CC**](https://www.isc2.org/certifications/cc)|Certified in CyberSecurity|IT-Administration|3 years| +|'|[**CISSP**](https://www.isc2.org/certifications/cissp)|Certified Information Systems Security Professional|Management|3 years| +|'|[**CISSP-ISSAP**](https://www.isc2.org/certifications/issap)|Information Systems Security Architecture Professional|Security Architecture|3 years| +|'|[**CISSP-ISSEP**](https://www.isc2.org/certifications/issep)|Information Systems Security Engineering Professional|IT-Administration|3 years)| +|'|[**CISSP-ISSMP**](https://www.isc2.org/certifications/issmp)|Information Systems Security Management Professional|Management|3 years)| +|'|[**SSCP**](https://www.isc2.org/certifications/sscp)|Systems Security Certified Practitioner|IT-Administration|3 years| +|'|[**CCSP**](https://www.isc2.org/certifications/ccsp)|Certified Cloud Security Professional|Cloud Security|3 years| +|'|[**CAP**](https://www.isc2.org/certifications/cgrc)|Certified Authorization Professional|Auditing|3 years| +|'|[**CSSLP**](https://www.isc2.org/certifications/csslp)|Certified Secure Software Lifecycle Professional|Software Development|3 years| |[CompTIA](https://www.comptia.org/)|[**Security+**](https://www.comptia.org/certifications/security)|CompTIA Security+|IT-Administration|3 years| -||[**CySA+**](https://www.comptia.org/certifications/cybersecurity-analyst)|CompTIA Cyber Security Analyst|Security Analysis|3 years| -||[**PenTest+**](https://www.comptia.org/certifications/pentest)|CompTIA Pentest+|Penetration Testing|3 years| -||[**CASP+**](https://www.comptia.org/certifications/comptia-advanced-security-practitioner)|CompTIA Advanced Security Practitioner|General Cyber Security|3 years| +|'|[**CySA+**](https://www.comptia.org/certifications/cybersecurity-analyst)|CompTIA Cyber Security Analyst|Security Analysis|3 years| +|'|[**PenTest+**](https://www.comptia.org/certifications/pentest)|CompTIA Pentest+|Penetration Testing|3 years| +|'|[**CASP+**](https://www.comptia.org/certifications/comptia-advanced-security-practitioner)|CompTIA Advanced Security Practitioner|General Cyber Security|3 years| |[ISACA](https://www.isaca.org/)|[**CISA**](https://www.isaca.org/credentialing/cisa)|Certified Information Systems Auditor|Auditing|3 years| -||[**CISM**](https://www.isaca.org/credentialing/cism)|Certified Information Security Manager|Management|3 years| -||[**CRISC**](https://www.isaca.org/credentialing/crisc)|Certified In Risk and Information Systems Control|Risk Management|3 years| -||[**CGEIT**](https://www.isaca.org/credentialing/cgeit)|Certified in the Governance of Enterprise IT|Management|3 years| -||[**CSX-F**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Fundamentals|General Cyber Security|3 years| -||[**CSX-T**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Technical Foundations|General Cyber Security|3 years| -||[**CSX-P**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Practitioner|General Cyber Security|3 years| -||[**CSX-A**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Audit|Auditing|3 years| -||[**CDPSE**](https://www.isaca.org/credentialing/cdpse)|Certified Data Privacy Solutions Engineer|Data Priavcy|3 years| -|GIAC|[**GSE**](https://www.giac.org/get-certified/giac-portfolio-certifications/?msc=main-nav)|Security Expert|General Cyber Security|4 years| -||[**GSEC**](https://www.giac.org/certifications/security-essentials-gsec/)|Security Essentials|General Cyber Security|4 years| -||[**GCIA**](https://www.giac.org/certifications/certified-intrusion-analyst-gcia/)|Certified Intrusion Analyst|Security Analysis|4 years| -||[**GISF**](https://www.giac.org/certifications/information-security-fundamentals-gisf)|GIAC Information Security Fundamentals|General Cyber Security|4 years| -||[**GCED**](https://www.giac.org/certifications/certified-enterprise-defender-gced)|Certified Enterprise Defender|Cyber Defense|4 years| -||[**GCWN**](https://www.giac.org/certifications/certified-windows-security-administrator-gcwn)|Certified Windows Security Administrator|IT-Administration|4 years| -||[**GPPA**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-perimeter-protection-analyst-gppa-re)|Certified Perimeter Protection Analyst|Firewalls|4 years| -||[**GMON**](https://www.giac.org/certifications/continuous-monitoring-certification-gmon)|Continuous Monitoring Certification|Threat Intelligence|4 years| -||[**GCCC**](https://www.giac.org/certifications/critical-controls-certification-gccc)|Critical Controls Certification|Cyber Defense|4 years| -||[**GDSA**](https://www.giac.org/certifications/defensible-security-architecture-gdsa)|Defensible Security Architecture|Security Architecture|4 years| -||[**GCUX**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-unix-security-administrator-gcux-ret)|Certified UNIX Security Administrator|IT-Administration|4 years| -||[**GCDA**](https://www.giac.org/certifications/certified-detection-analyst-gcda)|Certified Detection Analyst|Threat Intelligence|4 years| -||[**GDAT**](https://www.giac.org/certifications/defending-advanced-threats-gdat)|Defending Advanced Threats|Cyber Defense|4 years| -||[**GCIH**](https://www.giac.org/certifications/certified-incident-handler-gcih)|Certified Incident Handler|Incident Response|4 years| -||[**GPEN**](https://www.giac.org/certifications/penetration-tester-gpen)|Penetration Tester|Penetration Testing|4 years| -||[**GWAPT**](https://www.giac.org/certifications/web-application-penetration-tester-gwapt)|Web Application Penetration Tester|Penetration Testing|4 years| -||[**GXPN**](https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn)|Exploit Researcher and Advanced Penetration Tester|Penetration Testing|4 years| -||[**GMOB**](https://www.giac.org/certifications/mobile-device-security-analyst-gmob)|Mobile Device Security Analyst|Security Analysis|4 years| -||[**GAWN**](https://www.giac.org/certifications/assessing-auditing-wireless-networks-gawn)|Assessing and Auditing Wireless Networks|Wireless Security|4 years| -||[**GPYC**](https://www.giac.org/certifications/python-coder-gpyc)|Python Coder|Software Development|4 years| -||[**GCFA**](https://www.giac.org/certifications/certified-forensic-analyst-gcfa)|Certified Forensic Analyst|Forensics|4 years| -||[**GCFE**](https://www.giac.org/certifications/certified-forensic-examiner-gcfe)|Certified Forensic Examiner|Forensics|4 years| -||[**GREM**](https://www.giac.org/certifications/reverse-engineering-malware-grem)|Reverse Engineering Malware|Malware Analysis|4 years| -||[**GNFA**](https://www.giac.org/certifications/network-forensic-analyst-gnfa)|Network Forensic Analyst|Forensics|4 years| -||[**GCTI**](https://www.giac.org/certifications/cyber-threat-intelligence-gcti)|Cyber Threat Intelligence|Threat Intelligence|4 years| -||[**GASF**](https://www.giac.org/certifications/advanced-smartphone-forensics-gasf)|Advanced Smartphone Forensics|Forensics|4 years| -||[**GSLC**](https://www.giac.org/certifications/security-leadership-gslc)|Security Leadership|Management|4 years| -||[**GSNA**](https://www.giac.org/certifications/systems-network-auditor-gsna)|Systems and Network Auditor|Auditing|4 years| -||[**GISP**](https://www.giac.org/certifications/information-security-professional-gisp)|Information Security Professional|General Cyber Security|4 years| -||[**GLEG**](https://www.giac.org/certifications/law-data-security-investigations-gleg)|Law of Data Security & Investigations|Forensics|4 years| -||[**GCPM**](https://www.giac.org/certifications/certified-project-manager-gcpm)|Certified Project Manager|Management|4 years| -||[**GSTRT**](https://www.giac.org/certifications/strategic-planning-policy-leadership-gstrt)|Strategic Planning, Policy, and Leadership|Management|4 years| -||[**GSSP-JAVA**](https://www.sscsrl.com/giac-secure-software-programmer-java-gssp-java/)|Secure Software Programmer-Java|Software Development|4 years| -||[**GSSP-.NET**](https://www.sscsrl.com/giac-secure-software-programmer-net-gssp-net/)|Secure Software Programmer- .NET|Software Development|4 years| -||[**GWEB**](https://www.sscsrl.com/giac-certified-web-application-defender-gweb/)|Certified Web Application Defender|Software Development|4 years| -||[**GICSP**](https://www.giac.org/certifications/global-industrial-cyber-security-professional-gicsp)|Global Industrial Cyber Security Professional|Critical Infrastructure Security|4 years| -||[**GRID**](https://www.giac.org/certifications/response-industrial-defense-grid)|Response and Industrial Defense|Critical Infrastructure Security|4 years| -||[**GCIP**](https://www.giac.org/certifications/critical-infrastructure-protection-gcip)|Critical Infrastructure Protection|Critical Infrastructure Security|4 years| -||[**GEVA**](https://www.giac.org/certifications/enterprise-vulnerability-assessor-geva)|Enterprise Vulnerability Assessor|Vulnerability Management|4 years| -||**GOSI**|Open Source Intelligence|Threat Intelligence|4 years| -||[**GBFA**](https://www.giac.org/certifications/open-source-intelligence-gosi)|Battlefield Forensics and Acquisition|Forensics|4 years| -||[**GCSA**](https://www.sscsrl.com/giac-cloud-security-automation-gcsa/)|Cloud Security Automation|Cloud Security|4 years| -||[**GFCT**](https://www.giac.org/certifications/foundational-cybersecurity-technologies-gfact/)|Foundational Cybersecurity Technologies|Cyber Security|4 years| -||[**GSOC**](https://www.giac.org/certifications/security-operations-certified-gsoc)|Security Operations Certified|Security Operations|4 years| -||[**GPCS**](https://www.giac.org/certifications/public-cloud-security-gpcs)|Public Cloud Security|Cloud Security|4 years| +|'|[**CISM**](https://www.isaca.org/credentialing/cism)|Certified Information Security Manager|Management|3 years| +|'|[**CRISC**](https://www.isaca.org/credentialing/crisc)|Certified In Risk and Information Systems Control|Risk Management|3 years| +|'|[**CGEIT**](https://www.isaca.org/credentialing/cgeit)|Certified in the Governance of Enterprise IT|Management|3 years| +|'|[**CSX-F**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Fundamentals|General Cyber Security|3 years| +|'|[**CSX-T**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Technical Foundations|General Cyber Security|3 years| +|'|[**CSX-P**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Practitioner|General Cyber Security|3 years| +|'|[**CSX-A**](https://www.isaca.org/credentialing/csx-p)|Cyber Security Audit|Auditing|3 years| +|'|[**CDPSE**](https://www.isaca.org/credentialing/cdpse)|Certified Data Privacy Solutions Engineer|Data Priavcy|3 years| +|[**GIAC**](https://www.giac.org/)|[**GSE**](https://www.giac.org/get-certified/giac-portfolio-certifications/?msc=main-nav)|Security Expert|General Cyber Security|4 years| +|'|[**GSEC**](https://www.giac.org/certifications/security-essentials-gsec/)|Security Essentials|General Cyber Security|4 years| +|'|[**GCIA**](https://www.giac.org/certifications/certified-intrusion-analyst-gcia/)|Certified Intrusion Analyst|Security Analysis|4 years| +|'|[**GISF**](https://www.giac.org/certifications/information-security-fundamentals-gisf)|GIAC Information Security Fundamentals|General Cyber Security|4 years| +|'|[**GCED**](https://www.giac.org/certifications/certified-enterprise-defender-gced)|Certified Enterprise Defender|Cyber Defense|4 years| +|'|[**GCWN**](https://www.giac.org/certifications/certified-windows-security-administrator-gcwn)|Certified Windows Security Administrator|IT-Administration|4 years| +|'|[**GPPA**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-perimeter-protection-analyst-gppa-re)|Certified Perimeter Protection Analyst|Firewalls|4 years| +|'|[**GMON**](https://www.giac.org/certifications/continuous-monitoring-certification-gmon)|Continuous Monitoring Certification|Threat Intelligence|4 years| +|'|[**GCCC**](https://www.giac.org/certifications/critical-controls-certification-gccc)|Critical Controls Certification|Cyber Defense|4 years| +|'|[**GDSA**](https://www.giac.org/certifications/defensible-security-architecture-gdsa)|Defensible Security Architecture|Security Architecture|4 years| +|'|[**GCUX**](https://www.credly.com/org/global-information-assurance-certification-giac/badge/giac-certified-unix-security-administrator-gcux-ret)|Certified UNIX Security Administrator|IT-Administration|4 years| +|'|[**GCDA**](https://www.giac.org/certifications/certified-detection-analyst-gcda)|Certified Detection Analyst|Threat Intelligence|4 years| +|'|[**GDAT**](https://www.giac.org/certifications/defending-advanced-threats-gdat)|Defending Advanced Threats|Cyber Defense|4 years| +|'|[**GCIH**](https://www.giac.org/certifications/certified-incident-handler-gcih)|Certified Incident Handler|Incident Response|4 years| +|'|[**GPEN**](https://www.giac.org/certifications/penetration-tester-gpen)|Penetration Tester|Penetration Testing|4 years| +|'|[**GWAPT**](https://www.giac.org/certifications/web-application-penetration-tester-gwapt)|Web Application Penetration Tester|Penetration Testing|4 years| +|'|[**GXPN**](https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn)|Exploit Researcher and Advanced Penetration Tester|Penetration Testing|4 years| +|'|[**GMOB**](https://www.giac.org/certifications/mobile-device-security-analyst-gmob)|Mobile Device Security Analyst|Security Analysis|4 years| +|'|[**GAWN**](https://www.giac.org/certifications/assessing-auditing-wireless-networks-gawn)|Assessing and Auditing Wireless Networks|Wireless Security|4 years| +|'|[**GPYC**](https://www.giac.org/certifications/python-coder-gpyc)|Python Coder|Software Development|4 years| +|'|[**GCFA**](https://www.giac.org/certifications/certified-forensic-analyst-gcfa)|Certified Forensic Analyst|Forensics|4 years| +|'|[**GCFE**](https://www.giac.org/certifications/certified-forensic-examiner-gcfe)|Certified Forensic Examiner|Forensics|4 years| +|'|[**GREM**](https://www.giac.org/certifications/reverse-engineering-malware-grem)|Reverse Engineering Malware|Malware Analysis|4 years| +|'|[**GNFA**](https://www.giac.org/certifications/network-forensic-analyst-gnfa)|Network Forensic Analyst|Forensics|4 years| +|'|[**GCTI**](https://www.giac.org/certifications/cyber-threat-intelligence-gcti)|Cyber Threat Intelligence|Threat Intelligence|4 years| +|'|[**GASF**](https://www.giac.org/certifications/advanced-smartphone-forensics-gasf)|Advanced Smartphone Forensics|Forensics|4 years| +|'|[**GSLC**](https://www.giac.org/certifications/security-leadership-gslc)|Security Leadership|Management|4 years| +|'|[**GSNA**](https://www.giac.org/certifications/systems-network-auditor-gsna)|Systems and Network Auditor|Auditing|4 years| +|'|[**GISP**](https://www.giac.org/certifications/information-security-professional-gisp)|Information Security Professional|General Cyber Security|4 years| +|'|[**GLEG**](https://www.giac.org/certifications/law-data-security-investigations-gleg)|Law of Data Security & Investigations|Forensics|4 years| +|'|[**GCPM**](https://www.giac.org/certifications/certified-project-manager-gcpm)|Certified Project Manager|Management|4 years| +|'|[**GSTRT**](https://www.giac.org/certifications/strategic-planning-policy-leadership-gstrt)|Strategic Planning, Policy, and Leadership|Management|4 years| +|'|[**GSSP-JAVA**](https://www.sscsrl.com/giac-secure-software-programmer-java-gssp-java/)|Secure Software Programmer-Java|Software Development|4 years| +|'|[**GSSP-.NET**](https://www.sscsrl.com/giac-secure-software-programmer-net-gssp-net/)|Secure Software Programmer- .NET|Software Development|4 years| +|'|[**GWEB**](https://www.sscsrl.com/giac-certified-web-application-defender-gweb/)|Certified Web Application Defender|Software Development|4 years| +|'|[**GICSP**](https://www.giac.org/certifications/global-industrial-cyber-security-professional-gicsp)|Global Industrial Cyber Security Professional|Critical Infrastructure Security|4 years| +|'|[**GRID**](https://www.giac.org/certifications/response-industrial-defense-grid)|Response and Industrial Defense|Critical Infrastructure Security|4 years| +|'|[**GCIP**](https://www.giac.org/certifications/critical-infrastructure-protection-gcip)|Critical Infrastructure Protection|Critical Infrastructure Security|4 years| +|'|[**GEVA**](https://www.giac.org/certifications/enterprise-vulnerability-assessor-geva)|Enterprise Vulnerability Assessor|Vulnerability Management|4 years| +|'|[**GOSI**](https://www.giac.org/)|Open Source Intelligence|Threat Intelligence|4 years| +|'|[**GBFA**](https://www.giac.org/certifications/open-source-intelligence-gosi)|Battlefield Forensics and Acquisition|Forensics|4 years| +|'|[**GCSA**](https://www.sscsrl.com/giac-cloud-security-automation-gcsa/)|Cloud Security Automation|Cloud Security|4 years| +|'|[**GFCT**](https://www.giac.org/certifications/foundational-cybersecurity-technologies-gfact/)|Foundational Cybersecurity Technologies|Cyber Security|4 years| +|'|[**GSOC**](https://www.giac.org/certifications/security-operations-certified-gsoc)|Security Operations Certified|Security Operations|4 years| +|'|[**GPCS**](https://www.giac.org/certifications/public-cloud-security-gpcs)|Public Cloud Security|Cloud Security|4 years| |[**CyberDefenders**](https://cyberdefenders.org/)|[**CCD**](https://cyberdefenders.org/blue-team-training/courses/certified-cyberdefender-certification/)|Certified CyberDefender|CyberDefense / BlueTeam|_No expiration_| |[**EC-Council**](https://en.wikipedia.org/wiki/EC-Council)|[**CSCU**](https://www.eccouncil.org/train-certify/certified-secure-computer-user-cscu/)|EC-Council Certified Secure Computer User|Security Awareness|_No expiration_| -||[**CND**](https://www.eccouncil.org/train-certify/certified-network-security-course/)|EC-Council Certified Network Defender|Network Security|3 years| -||[**CEH**](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/)|EC-Council [Certified Ethical Hacker](https://en.wikipedia.org/wiki/Certified_Ethical_Hacker)|Penetration Testing|3 years| -||[**CEH-Practical (Master)**](https://www.eccouncil.org/train-certify/ceh-master/)|EC-Council Certified Ethical Hacker Practical (Master)|Penetration Testing|3 years| -||[**ECSA**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst|Penetration Testing|3 years| -||[**ECSA-Master (Practical)**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst (Practical)|Penetration Testing|3 years| -||[**LPT-Master (Practical)**](https://cert.eccouncil.org/licensed-penetration-tester.html)|EC-Council Licensed Penetration Tester (Master)|Penetration Testing|1 year| -||[**E\|ISM**](https://codered.eccouncil.org/course/iso-iec-27001-information-security-management?logged=false)|EC-Council Information Security Manager|Management|3 years| -||[**CCISO**](https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/)|EC-Council Certified Chief Information Security Officer|Management|1 year| -||[**ECIH**](https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/)|EC-Council Certified Incident Handler|Incident Response|3 years| -||[**CHFI**](https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/)|EC-Council Computer Hacking Forensic Investigator|Forensics|3 years| -||[**EDRP**](https://cert.eccouncil.org/ec-council-disaster-recovery-professional.html)|EC-Council Disaster Recovery Professional|Disaster Recovery|3 years| -||[**ECES**](https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/)|EC-Council Certified Encryption Specialist|Encryption|3 years| -||[**CASE Java**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/)|EC-Council Certified Application Security Engineer Java|Software Development|3 years| -||[**CASE .Net**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/)|EC-Council Certified Application Security Engineer .Net|Software Development|3 years| -||[**CTIA**](https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/)|EC-Council Certified Threat Intelligence Analyst|Threat Intelligence|3 years| -||[**CSA**](https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/)|EC-Council Certified SOC Analyst|Security Analysis|3 years| -||[**ECSS**](https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/)|EC-Council Certified Security Specialist|General Cyber Security|3 years| -||[**CCSE**](https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/)|EC-Council Cloud Security Engineer|Cloud Security|3 years| +|'|[**CND**](https://www.eccouncil.org/train-certify/certified-network-security-course/)|EC-Council Certified Network Defender|Network Security|3 years| +|'|[**CEH**](https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/)|EC-Council Certified Ethical Hacker|Penetration Testing|3 years| +|'|[**CEH-Practical (Master)**](https://www.eccouncil.org/train-certify/ceh-master/)|EC-Council Certified Ethical Hacker Practical (Master)|Penetration Testing|3 years| +|'|[**ECSA**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst|Penetration Testing|3 years| +|'|[**ECSA-Master (Practical)**](https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/)|EC-Council Certified Security Analyst (Practical)|Penetration Testing|3 years| +|'|[**LPT-Master (Practical)**](https://cert.eccouncil.org/licensed-penetration-tester.html)|EC-Council Licensed Penetration Tester (Master)|Penetration Testing|1 year| +|'|[**E\|ISM**](https://codered.eccouncil.org/course/iso-iec-27001-information-security-management?logged=false)|EC-Council Information Security Manager|Management|3 years| +|'|[**CCISO**](https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/)|EC-Council Certified Chief Information Security Officer|Management|1 year| +|'|[**ECIH**](https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/)|EC-Council Certified Incident Handler|Incident Response|3 years| +|'|[**CHFI**](https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/)|EC-Council Computer Hacking Forensic Investigator|Forensics|3 years| +|'|[**EDRP**](https://cert.eccouncil.org/ec-council-disaster-recovery-professional.html)|EC-Council Disaster Recovery Professional|Disaster Recovery|3 years| +|'|[**ECES**](https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/)|EC-Council Certified Encryption Specialist|Encryption|3 years| +|'|[**CASE Java**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/)|EC-Council Certified Application Security Engineer Java|Software Development|3 years| +|'|[**CASE .Net**](https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/)|EC-Council Certified Application Security Engineer .Net|Software Development|3 years| +|'|[**CTIA**](https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/)|EC-Council Certified Threat Intelligence Analyst|Threat Intelligence|3 years| +|'|[**CSA**](https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/)|EC-Council Certified SOC Analyst|Security Analysis|3 years| +|'|[**ECSS**](https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/)|EC-Council Certified Security Specialist|General Cyber Security|3 years| +|'|[**CCSE**](https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/)|EC-Council Cloud Security Engineer|Cloud Security|3 years| |[**OffSec**](https://www.offsec.com/)|[**OSCP**](https://www.offsec.com/courses/pen-200/)|OffSec Certified Professional|Penetration Testing|_No expiration_| -||[**OSWP**](https://www.offsec.com/courses/pen-210/)|OffSec Wireless Professional|Penetration Testing|_No expiration_| -||[**OSWA**](https://www.offsec.com/courses/web-200/)|OffSec Web Assessor|Penetration Testing|_No expiration_| -||[**OSEP**](https://www.offsec.com/courses/pen-300/)|OffSec Experienced Penetration Tester|Penetration Testing|_No expiration_| -||[**OSED**](https://www.offsec.com/courses/exp-301/)|OffSec Security Exploit Developer|Exploit Development|_No expiration_| -||[**OSWE**](https://www.offsec.com/courses/web-300/)|OffSec Web Expert|Penetration Testing|_No expiration_| -||[**OSCE3**](https://www.offsec.com/offsec/osce3-certification/)|OffSec Certified Expert3|Penetration Testing|_No expiration_| -||[**OSEE**](https://www.offsec.com/courses/exp-401/)|OffSec Exploitation Expert|Exploit Development|_No expiration_| -||[**OSDA**](https://www.offsec.com/courses/soc-200/)|OffSec Defensive Analyst|Security Operations|_No expiration_| -||[**OSMR**](https://www.offsec.com/courses/exp-312/)|OffSec macOS Researcher|Exploit Development|_No expiration_| -|[**EITCI**](https://eitci.org/)|[**EITCA/IS**](https://eitci.org/eitca-programme)|[EITCA Information Technologies Security Academy](https://en.wikipedia.org/wiki/European_Information_Technologies_Certification_Academy)|General Cyber Security|_No expiration_| +|'|[**OSWP**](https://www.offsec.com/courses/pen-210/)|OffSec Wireless Professional|Penetration Testing|_No expiration_| +|'|[**OSWA**](https://www.offsec.com/courses/web-200/)|OffSec Web Assessor|Penetration Testing|_No expiration_| +|'|[**OSEP**](https://www.offsec.com/courses/pen-300/)|OffSec Experienced Penetration Tester|Penetration Testing|_No expiration_| +|'|[**OSED**](https://www.offsec.com/courses/exp-301/)|OffSec Security Exploit Developer|Exploit Development|_No expiration_| +|'|[**OSWE**](https://www.offsec.com/courses/web-300/)|OffSec Web Expert|Penetration Testing|_No expiration_| +|'|[**OSCE3**](https://www.offsec.com/offsec/osce3-certification/)|OffSec Certified Expert3|Penetration Testing|_No expiration_| +|'|[**OSEE**](https://www.offsec.com/courses/exp-401/)|OffSec Exploitation Expert|Exploit Development|_No expiration_| +|'|[**OSDA**](https://www.offsec.com/courses/soc-200/)|OffSec Defensive Analyst|Security Operations|_No expiration_| +|'|[**OSMR**](https://www.offsec.com/courses/exp-312/)|OffSec macOS Researcher|Exploit Development|_No expiration_| +|[**EITCI**](https://eitci.org/)|[**EITCA/IS**](https://eitci.org/eitca-programme)|EITCA Information Technologies Security Academy|General Cyber Security|_No expiration_| |[**CSA**](https://cloudsecurityalliance.org/)|[**CCSK**](https://cloudsecurityalliance.org/education/ccsk/)|CSA Certificate of Cloud Security Knowledge|Cloud Security|_No expiration_| |[**Cloud Credential Council**](https://www.cloudcredential.org/)|[**PCSM**](https://www.cloudcredential.org/certifications/cloud/pcsm/)|CCC Professional Cloud Security Manager|Cloud Security|_No expiration_| -|[**IAPP**](https://iapp.org/)|[**CIPP**](https://iapp.org/certify/cipp/)|[Certified Information Privacy Professional](https://en.wikipedia.org/wiki/Certified_Information_Privacy_Professional)|Privacy|2 years| -||[**CIPM**](https://iapp.org/certify/cipm/)|Certified Information Privacy Manager|Privacy|2 years| -||[**CIPT**](https://iapp.org/certify/cipt/)|Certified Information Privacy Technologist|Privacy|2 years| +|[**IAPP**](https://iapp.org/)|[**CIPP**](https://iapp.org/certify/cipp/)|Certified Information Privacy Professional|Privacy|2 years| +|'|[**CIPM**](https://iapp.org/certify/cipm/)|Certified Information Privacy Manager|Privacy|2 years| +|'|[**CIPT**](https://iapp.org/certify/cipt/)|Certified Information Privacy Technologist|Privacy|2 years| |[**INE Security**](https://security.ine.com/)|[**eJPT**](https://security.ine.com/certifications/ejpt-certification/)|eLearnSecurity Certified Junior Penetration Tester|Penetration Testing|_No expiration_| -||[**eCPPT**](https://security.ine.com/certifications/ecppt-certification/)|[eLearnSecurity Certified Professional Penetration Tester](https://en.wikipedia.org/wiki/ELearnSecurity_Certified_Professional_Penetration_Tester)|Penetration Testing|_No expiration_| -||[**eWPT**](https://security.ine.com/certifications/ewpt-certification/)|eLearnSecurity Web Application Penetration Tester|Penetration Testing|_No expiration_| -||[**eMAPT**](https://security.ine.com/certifications/emapt-certification/)|eLearnSecurity Mobile Application Penetration Tester|Penetration Testing|_No expiration_| -||[**eCPTX**](https://security.ine.com/certifications/ewptx-certification/)|eLearnSecurity Certified Penetration Tester eXtreme|Penetration Testing|_No expiration_| -||[**eCIR**](https://security.ine.com/certifications/ecir-certification/)|eLearnSecurity Certified Incident Response Professional|Incident Response|_No expiration_| -||[**eCXD**](https://ine.com/learning/certifications/internal/offensive-security-exploit-developer)|eLearnSecurity Exploit Development|Penetration Testing|_No expiration_| -||[**eNDP**](https://ine.com/learning/courses/network-defense-network-security)|eLearnSecurity Network Defense Professional|Network Security|_No expiration_| -||[**eCRE**](https://ine.com/learning/paths/reverse-engineering-professional)|eLearnSecurity Certified Reverse Engineer|Malware Analysis|_No expiration_| -||[**eCTHP**](https://security.ine.com/certifications/ecthp-certification/)|eLearnSecurity Certified Threat Hunting Professional|Threat Hunting|_No expiration_| -||[**eCMAP**](https://my.ine.com/CyberSecurity/learning-paths/e831d3ee-18b5-4b46-b1a7-9f7b3d65feae/malware-analysis-professional)|eLearnSecurity Certified Malware Analysis Professional|Malware Analysis|_No expiration_| -||[**eWDP**](https://my.ine.com/CyberSecurity/learning-paths/1d6ff88f-8d17-4156-91fb-5af9cfb71a37/web-defense-professional)|eLearnSecurity Web Defense Professional|Web Defense|_No expiration_| -||[**eCDFP**](https://ine.com/learning/certifications/external/elearnsecurity-certified-digital-forensics-professional)|eLearnSecurity Certified Digital Forensics Professional|Digital Forensics|_No expiration_| +|'|[**eCPPT**](https://security.ine.com/certifications/ecppt-certification/)|eLearnSecurity Certified Professional Penetration Tester|Penetration Testing|_No expiration_| +|'|[**eWPT**](https://security.ine.com/certifications/ewpt-certification/)|eLearnSecurity Web Application Penetration Tester|Penetration Testing|_No expiration_| +|'|[**eMAPT**](https://security.ine.com/certifications/emapt-certification/)|eLearnSecurity Mobile Application Penetration Tester|Penetration Testing|_No expiration_| +|'|[**eCPTX**](https://security.ine.com/certifications/ewptx-certification/)|eLearnSecurity Certified Penetration Tester eXtreme|Penetration Testing|_No expiration_| +|'|[**eCIR**](https://security.ine.com/certifications/ecir-certification/)|eLearnSecurity Certified Incident Response Professional|Incident Response|_No expiration_| +|'|[**eCXD**](https://ine.com/learning/certifications/internal/offensive-security-exploit-developer)|eLearnSecurity Exploit Development|Penetration Testing|_No expiration_| +|'|[**eNDP**](https://ine.com/learning/courses/network-defense-network-security)|eLearnSecurity Network Defense Professional|Network Security|_No expiration_| +|'|[**eCRE**](https://ine.com/learning/paths/reverse-engineering-professional)|eLearnSecurity Certified Reverse Engineer|Malware Analysis|_No expiration_| +|'|[**eCTHP**](https://security.ine.com/certifications/ecthp-certification/)|eLearnSecurity Certified Threat Hunting Professional|Threat Hunting|_No expiration_| +|'|[**eCMAP**](https://my.ine.com/CyberSecurity/learning-paths/e831d3ee-18b5-4b46-b1a7-9f7b3d65feae/malware-analysis-professional)|eLearnSecurity Certified Malware Analysis Professional|Malware Analysis|_No expiration_| +|'|[**eWDP**](https://my.ine.com/CyberSecurity/learning-paths/1d6ff88f-8d17-4156-91fb-5af9cfb71a37/web-defense-professional)|eLearnSecurity Web Defense Professional|Web Defense|_No expiration_| +|'|[**eCDFP**](https://ine.com/learning/certifications/external/elearnsecurity-certified-digital-forensics-professional)|eLearnSecurity Certified Digital Forensics Professional|Digital Forensics|_No expiration_| |[**CREST**](https://www.crest-approved.org/)|[**CPSA**](https://www.crest-approved.org/skills-certifications-careers/crest-practitioner-security-analyst/)|CREST Practitioner Security Analyst|Penetration Testing|3 Years| -||[**CRT**](https://www.crest-approved.org/skills-certifications-careers/crest-registered-penetration-tester/)|CREST Registered Penetration Tester|Penetration Testing|3 Years| -||[**CCT App**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-web-application-tester/)|CREST Certified Web Application Tester|Penetration Testing|3 Years| -||[**CCT Inf**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-infrastructure-tester/)|CREST Certified Infrastructure Tester|Penetration Testing|3 Years| -||[**CCSAS**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-specialist/)|CREST Certified Simulated Attack Specialist|Attack Simulation|3 Years| -||[**CCSAM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-manager/)|CREST Certified Simulated Attack Manager|Attack Simulation|3 Years| -||[**CCWS**](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/)|CREST Certified Wireless Specialist|Wireless security|3 Years| -||[**CPTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-threat-intelligence-analyst/)|CREST Practitioner Threat Intelligence Analyst|Threat Intelligence|3 Years| -||[**CRTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-threat-intelligence-analyst/)|CREST Registered Threat Intelligence Analyst|Threat Intelligence|3 Years| -||[**CCTIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-threat-intelligence-manager/)|CREST Certified Threat Intelligence Manager|Threat Intelligence|3 Years| -||[**CPIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-intrusion-analyst/)|CREST Practitioner Intrusion Analyst|Security Analysis|3 Years| -||[**CRIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-intrusion-analyst/)|CREST Registered Intrusion Analyst|Security Analysis|3 Years| -||[**CCNIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-network-intrusion-analyst/)|CREST Certified Network Intrusion Analyst|Security Analysis|3 Years| -||[**CCHIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-host-intrusion-analyst/)|CREST Certified Host Intrusion Analyst|Security Analysis|3 Years| -||[**CCMRE**](https://firebrand.training/en/courses/crest/certified-malware-reverse-engineer-certification)|CREST Certified Malware Reverse Engineer|Malware Analysis|3 Years| -||[**CCIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-incident-manager/)|CREST Certified Incident Manager|Incident Response|3 Years| -||[**CRTSA**](https://www.crest-approved.org/wp-content/uploads/2022/04/CRTSA-Guide-v3.0.pdf)|CREST Registered Technical Security Architect|Security Architecture|3 Years| +|'|[**CRT**](https://www.crest-approved.org/skills-certifications-careers/crest-registered-penetration-tester/)|CREST Registered Penetration Tester|Penetration Testing|3 Years| +|'|[**CCT App**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-web-application-tester/)|CREST Certified Web Application Tester|Penetration Testing|3 Years| +|'|[**CCT Inf**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-infrastructure-tester/)|CREST Certified Infrastructure Tester|Penetration Testing|3 Years| +|'|[**CCSAS**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-specialist/)|CREST Certified Simulated Attack Specialist|Attack Simulation|3 Years| +|'|[**CCSAM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-simulated-attack-manager/)|CREST Certified Simulated Attack Manager|Attack Simulation|3 Years| +|'|[**CCWS**](https://www.crest-approved.org/skills-certifications-careers/crest-certifications/)|CREST Certified Wireless Specialist|Wireless security|3 Years| +|'|[**CPTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-threat-intelligence-analyst/)|CREST Practitioner Threat Intelligence Analyst|Threat Intelligence|3 Years| +|'|[**CRTIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-threat-intelligence-analyst/)|CREST Registered Threat Intelligence Analyst|Threat Intelligence|3 Years| +|'|[**CCTIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-threat-intelligence-manager/)|CREST Certified Threat Intelligence Manager|Threat Intelligence|3 Years| +|'|[**CPIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-practitioner-intrusion-analyst/)|CREST Practitioner Intrusion Analyst|Security Analysis|3 Years| +|'|[**CRIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-registered-intrusion-analyst/)|CREST Registered Intrusion Analyst|Security Analysis|3 Years| +|'|[**CCNIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-network-intrusion-analyst/)|CREST Certified Network Intrusion Analyst|Security Analysis|3 Years| +|'|[**CCHIA**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-host-intrusion-analyst/)|CREST Certified Host Intrusion Analyst|Security Analysis|3 Years| +|'|[**CCMRE**](https://firebrand.training/en/courses/crest/certified-malware-reverse-engineer-certification)|CREST Certified Malware Reverse Engineer|Malware Analysis|3 Years| +|'|[**CCIM**](https://www.crest-approved.org/certification-careers/crest-certifications/crest-certified-incident-manager/)|CREST Certified Incident Manager|Incident Response|3 Years| +|'|[**CRTSA**](https://www.crest-approved.org/wp-content/uploads/2022/04/CRTSA-Guide-v3.0.pdf)|CREST Registered Technical Security Architect|Security Architecture|3 Years| |[**InfoSec Institute**](https://www.infosecinstitute.com)|[**CCFE**](https://www.infosecinstitute.com/skills/learning-paths/certified-computer-forensics-examiner-ccfe/)|Certified Computer Forensics Examiner|Forensics|4 years| -||[**CCTHP**](https://www.infosecinstitute.com/skills/learning-paths/cyber-threat-hunting/)|Certified Cyber Threat Hunting Professional|Threat Hunting|4 years| -||[**CDRP**](https://www.infosecinstitute.com/courses/data-recovery-boot-camp/)|Certified Data Recovery Professional|Disaster Recovery|4 years| -||[**CEPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-expert-penetration-tester-cept/)|Certified Expert Penetration Tester|Penetration Testing|4 years| -||[**CEREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Expert Reverse Engineering Analyst|Malware Analysis|4 years| -||[**CMWAPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-mobile-and-web-app-penetration-tester-cmwapt/)|Certified Mobile and Web Application Penetration Tester|Penetration Testing|4 years| -||[**CMFE**](https://www.infosecinstitute.com/courses/mobile-forensics-training-boot-camp/)|Certified Mobile Forensics Examiner|Forensics|4 years| -||[**CPT**](https://www.infosecinstitute.com/skills/roles/penetration-tester/)|Certified Penetration Tester|Penetration Testing|4 years| -||[**CRTOP**](https://www.infosecinstitute.com/courses/red-team-operations/)|Certified Red Team Operations Professional|Red Teaming|4 years| -||[**CREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Reverse Engineering Analyst|Malware Analysis|4 years| -||[**CSSA**](https://www.infosecinstitute.com/skills/courses/introduction-to-scada-security/)|Certified SCADA Security Architect|Critical Infrastructure Security|4 years| -||[**CSAP**](https://www.infosecinstitute.com/skills/learning-paths/certified-security-awareness-practitioner/)|Certified Security Awareness Practitioner|Security Awareness|4 years| +|'|[**CCTHP**](https://www.infosecinstitute.com/skills/learning-paths/cyber-threat-hunting/)|Certified Cyber Threat Hunting Professional|Threat Hunting|4 years| +|'|[**CDRP**](https://www.infosecinstitute.com/courses/data-recovery-boot-camp/)|Certified Data Recovery Professional|Disaster Recovery|4 years| +|'|[**CEPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-expert-penetration-tester-cept/)|Certified Expert Penetration Tester|Penetration Testing|4 years| +|'|[**CEREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Expert Reverse Engineering Analyst|Malware Analysis|4 years| +|'|[**CMWAPT**](https://www.infosecinstitute.com/skills/learning-paths/certified-mobile-and-web-app-penetration-tester-cmwapt/)|Certified Mobile and Web Application Penetration Tester|Penetration Testing|4 years| +|'|[**CMFE**](https://www.infosecinstitute.com/courses/mobile-forensics-training-boot-camp/)|Certified Mobile Forensics Examiner|Forensics|4 years| +|'|[**CPT**](https://www.infosecinstitute.com/skills/roles/penetration-tester/)|Certified Penetration Tester|Penetration Testing|4 years| +|'|[**CRTOP**](https://www.infosecinstitute.com/courses/red-team-operations/)|Certified Red Team Operations Professional|Red Teaming|4 years| +|'|[**CREA**](https://www.infosecinstitute.com/courses/reverse-engineering-boot-camp/)|Certified Reverse Engineering Analyst|Malware Analysis|4 years| +|'|[**CSSA**](https://www.infosecinstitute.com/skills/courses/introduction-to-scada-security/)|Certified SCADA Security Architect|Critical Infrastructure Security|4 years| +|'|[**CSAP**](https://www.infosecinstitute.com/skills/learning-paths/certified-security-awareness-practitioner/)|Certified Security Awareness Practitioner|Security Awareness|4 years| |[**Cyber Struggle**](https://cyberstruggle.org)|[**CSAE**](https://cyberstruggle.org/aegis-certification/)|Cyber Struggle Aegis|Security Analysis|N/A| -||[**CSR**](https://cyberstruggle.org/ranger-certification/)|Cyber Struggle Ranger|Red Teaming|N/A| -||[**CSTPO**](https://cyberstruggle.org/cyberstruggle-tactical-pistol-operator/)|Cyber Struggle Tactical Pistol Operator|Tactical fire gun shooting|N/A| -|[**Linux Professional Institute (LPI)**](https://en.wikipedia.org/wiki/Linux_Professional_Institute)|[**SecE**](https://www.lpi.org/pt-br/)|[Linux Professional Institute Security Essentials](https://en.wikipedia.org/wiki/Linux_Professional_Institute_Certification_Programs#Linux_Professional_Institute_Security_Essentials)|General Cyber Security|No expiration| -||[**LPIC-3 Security**](https://www.lpi.org/pt-br/our-certifications/lpic-3-303-overview/)|[Linux Professional Institute LPIC-3 Security](https://en.wikipedia.org/wiki/Linux_Professional_Institute_Certification_Programs#LPIC-3_Security)|IT-Administration|5 years| +|'|[**CSR**](https://cyberstruggle.org/ranger-certification/)|Cyber Struggle Ranger|Red Teaming|N/A| +|'|[**CSTPO**](https://cyberstruggle.org/cyberstruggle-tactical-pistol-operator/)|Cyber Struggle Tactical Pistol Operator|Tactical fire gun shooting|N/A| +|[**Linux Professional Institute (LPI)**](https://www.lpi.org/)|[**SecE**](https://www.lpi.org/our-certifications/security-essentials-overview/)|[Linux Professional Institute Security Essentials]|General Cyber Security|_No expiration_| +|'|[**LPIC-3 Security**](https://www.lpi.org/pt-br/our-certifications/lpic-3-303-overview/)|Linux Professional Institute LPIC-3 Security|IT-Administration|5 years| |[**Mile2**](https://mile2.com)|[**C)SA1**](https://mile2.com/csa1-outline/)|Certified Security Awareness 1|Security Awareness|3 Years| -||[**C)SA2**](https://mile2.com/csa1-outline/)|Certified Security Awareness 2|Security Awareness|3 Years| -||[**C)SP**](https://mile2.com/csp_outline/)|Certified Security Principles|General Cyber Security|3 Years| -||[**C)ISSO**](https://mile2.com/cisso_outline/)|Certified Information Systems Security Officer|Management|3 Years| -||[**IS20**](https://mile2.com/is18_outline/)|Information Security 20 Security Controls|General Cyber Security|3 Years| -||[**C)SLO**](https://mile2.com/cslo_outline/)|Certified Security Leadership Officer|Management|3 Years| -||[**C)VA**](https://mile2.com/vulnerability-assessor-outline/)|Certified Vulnerability Assessor|Vulnerability Management|3 Years| -||[**C)PEH**](https://mile2.com/professional-ethical-hacker/)|Certified Professional Ethical Hacker|Penetration Testing|3 Years| -||[**C)PTE**](https://mile2.com/penetration-testing-engineer-outline/)|Certified Penetration Tester|Penetration Testing|3 Years| -||[**C)PTC**](https://mile2.com/cptc_outline/)|Certified Penetration Testing Consultant|Penetration Testing|3 Years| -||[**C)PSH**](https://mile2.com/cpSH_outline/)|Certified PowerShell Hacker|Scripting|3 Years| -||[**C)IHE**](https://mile2.com/cihe_outline/)|Certified Incident Handling Engineer|Incident Response|3 Years| -||[**C)DFE**](https://mile2.com/cdfe_outline/)|Certified Digital Forensic Examiner|Forensics|3 Years| -||[**C)VFE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Forensics Engineer|Forensics|3 Years| -||[**C)NFE**](https://mile2.com/network-forensics-examiner-outline/)|Certified Network Forensics Examiner|Forensics|3 Years| -||[**C)DRE**](https://mile2.com/cdre_outline/)|Certified Disaster Recovery Engineer|Disaster Recovery|3 Years| -||[**C)HISSP**](https://mile2.com/chissp_outline/)|Certified Healthcare Information Systems Security Professional|Healthcare|3 Years| -||[**C)ISMS-LA**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Auditor|Auditing|3 Years| -||[**C)ISMS-LI**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Implementer|Risk Management|3 Years| -||[**C)ISSA**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Security Systems Auditor|Auditing|3 Years| -||[**C)SWAE**](https://mile2.com/role-based-certification-roadmap/)|Certified Secure Web Application Engineer|Application Security|3 Years| -||[**C)VCP**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Principles|Virtualization|3 Years| -||[**C)VE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Engineer|Virtualization|3 Years| -||[**C)CSO**](https://mile2.com/ccso_outline/)|Certified Cloud Security Officer|Cloud Security|3 Years| -||[**C)VSE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Systems Engineer|Virtualization|3 Years| -||[**C)ISSM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Security Manager|Management|3 Years| -||[**C)ISRM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Risk Manager|Risk Management|3 Years| -||[**ISCAP**](https://mile2.com/role-based-certification-roadmap/)|Information Systems Certification & Accreditation Professional|Auditing|3 Years| -||[**C)SWAE**](https://mile2.com/cswae_outline/)|Certified Secure Web Application Engineer|Web Security|3 Years| -||[**C)ISS**](https://mile2.com/role-based-certification-roadmap/)|Certified IPv6 Security Specialist|Network Security|3 Years| -||[**C)CSA**](https://mile2.com/ccsa_outline/)|Certified Cybersecurity Analyst|Security Analysis|3 Years| -||[**C)CTA**](https://mile2.com/role-based-certification-roadmap/)|Certified Cyber Threat Analyst|Security Analysis|3 Years| -||[**C)CTIA**](https://mile2.com/threat-analyst/)|Certified Cyber Threat Intelligence Analyst|Threat Intelligence|3 Years| +|'|[**C)SA2**](https://mile2.com/csa1-outline/)|Certified Security Awareness 2|Security Awareness|3 Years| +|'|[**C)SP**](https://mile2.com/csp_outline/)|Certified Security Principles|General Cyber Security|3 Years| +|'|[**C)ISSO**](https://mile2.com/cisso_outline/)|Certified Information Systems Security Officer|Management|3 Years| +|'|[**IS20**](https://mile2.com/is18_outline/)|Information Security 20 Security Controls|General Cyber Security|3 Years| +|'|[**C)SLO**](https://mile2.com/cslo_outline/)|Certified Security Leadership Officer|Management|3 Years| +|'|[**C)VA**](https://mile2.com/vulnerability-assessor-outline/)|Certified Vulnerability Assessor|Vulnerability Management|3 Years| +|'|[**C)PEH**](https://mile2.com/professional-ethical-hacker/)|Certified Professional Ethical Hacker|Penetration Testing|3 Years| +|'|[**C)PTE**](https://mile2.com/penetration-testing-engineer-outline/)|Certified Penetration Tester|Penetration Testing|3 Years| +|'|[**C)PTC**](https://mile2.com/cptc_outline/)|Certified Penetration Testing Consultant|Penetration Testing|3 Years| +|'|[**C)PSH**](https://mile2.com/cpSH_outline/)|Certified PowerShell Hacker|Scripting|3 Years| +|'|[**C)IHE**](https://mile2.com/cihe_outline/)|Certified Incident Handling Engineer|Incident Response|3 Years| +|'|[**C)DFE**](https://mile2.com/cdfe_outline/)|Certified Digital Forensic Examiner|Forensics|3 Years| +|'|[**C)VFE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Forensics Engineer|Forensics|3 Years| +|'|[**C)NFE**](https://mile2.com/network-forensics-examiner-outline/)|Certified Network Forensics Examiner|Forensics|3 Years| +|'|[**C)DRE**](https://mile2.com/cdre_outline/)|Certified Disaster Recovery Engineer|Disaster Recovery|3 Years| +|'|[**C)HISSP**](https://mile2.com/chissp_outline/)|Certified Healthcare Information Systems Security Professional|Healthcare|3 Years| +|'|[**C)ISMS-LA**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Auditor|Auditing|3 Years| +|'|[**C)ISMS-LI**](https://mile2.com/cisms-la-li-outline/)|Certified Information Security Management Systems Lead Implementer|Risk Management|3 Years| +|'|[**C)ISSA**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Security Systems Auditor|Auditing|3 Years| +|'|[**C)SWAE**](https://mile2.com/role-based-certification-roadmap/)|Certified Secure Web Application Engineer|Application Security|3 Years| +|'|[**C)VCP**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Principles|Virtualization|3 Years| +|'|[**C)VE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Engineer|Virtualization|3 Years| +|'|[**C)CSO**](https://mile2.com/ccso_outline/)|Certified Cloud Security Officer|Cloud Security|3 Years| +|'|[**C)VSE**](https://mile2.com/role-based-certification-roadmap/)|Certified Virtualization Systems Engineer|Virtualization|3 Years| +|'|[**C)ISSM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Security Manager|Management|3 Years| +|'|[**C)ISRM**](https://mile2.com/role-based-certification-roadmap/)|Certified Information Systems Risk Manager|Risk Management|3 Years| +|'|[**ISCAP**](https://mile2.com/role-based-certification-roadmap/)|Information Systems Certification & Accreditation Professional|Auditing|3 Years| +|'|[**C)SWAE**](https://mile2.com/cswae_outline/)|Certified Secure Web Application Engineer|Web Security|3 Years| +|'|[**C)ISS**](https://mile2.com/role-based-certification-roadmap/)|Certified IPv6 Security Specialist|Network Security|3 Years| +|'|[**C)CSA**](https://mile2.com/ccsa_outline/)|Certified Cybersecurity Analyst|Security Analysis|3 Years| +|'|[**C)CTA**](https://mile2.com/role-based-certification-roadmap/)|Certified Cyber Threat Analyst|Security Analysis|3 Years| +|'|[**C)CTIA**](https://mile2.com/threat-analyst/)|Certified Cyber Threat Intelligence Analyst|Threat Intelligence|3 Years| |[**ASIS International**](https://www.asisonline.org)|[**CPP**](https://www.asisonline.org/certification/certified-protection-professional-cpp/)|Certified Protection Professional|Management|3 Years| -||[**APP**](https://www.asisonline.org/certification/associate-protection-professional-app/)|Associate Protection Professional|Management|3 Years| -||[**PCI**](https://www.asisonline.org/certification/professional-certified-investigator-pci/)|Professional Certified Investigator|Forensics|3 Years| -||[**PSP**](https://www.asisonline.org/certification/physical-security-professional/)|Physical Security Professional|Physical Security|3 Years| +|'|[**APP**](https://www.asisonline.org/certification/associate-protection-professional-app/)|Associate Protection Professional|Management|3 Years| +|'|[**PCI**](https://www.asisonline.org/certification/professional-certified-investigator-pci/)|Professional Certified Investigator|Forensics|3 Years| +|'|[**PSP**](https://www.asisonline.org/certification/physical-security-professional/)|Physical Security Professional|Physical Security|3 Years| |[**SABSA**](https://sabsa.org/)|[**SABSA-SCF**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Foundation Certificate|Security Architecture|3 Years| -||[**SABSA-SCP**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Practitioner Certificate|Security Architecture|3 Years| -||[**SABSA-SCM**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Master Certificate|Security Architecture|3 Years| +|'|[**SABSA-SCP**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Practitioner Certificate|Security Architecture|3 Years| +|'|[**SABSA-SCM**](https://sabsa.org/certification/)|SABSA Chartered Security Architect – Master Certificate|Security Architecture|3 Years| |[**APMG International**](https://apmg-international.com/)|[**ISO/IEC 27001-F**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Foundation|Standards|_No expiration_| -||[**ISO/IEC 27001-P ISO**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Practitioner - Information Security Officer|Standards|_No expiration_| -||[**NCSP-F**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Foundation|Standards|_No expiration_| -||[**NCSP-P**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Practiioner|Standards|_No expiration_| +|'|[**ISO/IEC 27001-P ISO**](https://apmg-international.com/pt-br/product/iso-iec-27001)|ISO/IEC 27001 Practitioner - Information Security Officer|Standards|_No expiration_| +|'|[**NCSP-F**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Foundation|Standards|_No expiration_| +|'|[**NCSP-P**](https://apmg-international.com/pt-br/product/nist-cyber-security-professional-ncsp)|NIST Cyber Security Professional Practiioner|Standards|_No expiration_| |[**EXIN**](https://www.exin.com/)|[**PDP-E**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Essentials|Privacy|_No expiration_| -||[**PDP-F**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Foundation|Privacy|_No expiration_| -||[**PDP-P**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy and Data Protection Practitioner|Privacy|_No expiration_| -||[**CIT-F**](https://www.exin.com/pt-br/data-protection-security/exin-cyber-and-it-security/exin-cyber-and-it-security-foundation/)|EXIN Cyber & IT Security Foundation|General Cyber Security|_No expiration_| -||[**CEF**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-information-security-officer/)|EXIN Ethical Hacking Foundation|Penetration Testing|_No expiration_| -||[**ISO/IEC 27001-F**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Foundation|Standards|_No expiration_| -||[**ISO/IEC 27001-P**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Professional|Standards|_No expiration_| -||[**ISO/IEC 27001-E**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Expert|Standards|_No expiration_| -||[**SP-F**](https://www.exin.com/)|EXIN Secure Programming Foundation|Software Development|_No expiration_| +|'|[**PDP-F**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy & Data Protection Foundation|Privacy|_No expiration_| +|'|[**PDP-P**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-data-protection-officer/)|EXIN Privacy and Data Protection Practitioner|Privacy|_No expiration_| +|'|[**CIT-F**](https://www.exin.com/pt-br/data-protection-security/exin-cyber-and-it-security/exin-cyber-and-it-security-foundation/)|EXIN Cyber & IT Security Foundation|General Cyber Security|_No expiration_| +|'|[**CEF**](https://www.exin.com/pt-br/career-paths/exin-career-path-certifications/exin-information-security-officer/)|EXIN Ethical Hacking Foundation|Penetration Testing|_No expiration_| +|'|[**ISO/IEC 27001-F**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Foundation|Standards|_No expiration_| +|'|[**ISO/IEC 27001-P**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Professional|Standards|_No expiration_| +|'|[**ISO/IEC 27001-E**](https://www.exin.com/pt-br/data-protection-security/exin-information-security-management-iso-iec-27001/information-security-foundation-based-on-iso-iec-27001/)|EXIN Information Security Management ISO27001 Expert|Standards|_No expiration_| +|'|[**SP-F**](https://www.exin.com/)|EXIN Secure Programming Foundation|Software Development|_No expiration_| |[**IBITGQ**](https://www.ibitgq.org/)|[**EU GDPR F**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Foundation|Standards|_No expiration_| -||[**EU GDPR P**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Practitioner|Standards|_No expiration_| -||[**C-DPO**](https://www.ibitgq.org/exams)|Certified Data Protection Officer|Privacy|_No expiration_| -||[**C BS PIMS LI**](https://www.ibitgq.org/exams)|Certified BS 10012 PIMS Lead Implementer|Standards|_No expiration_| -||[**CCPA F**](https://www.ibitgq.org/exams)|California Consumer Privacy Act Foundation|Privacy|_No expiration_| -||[**C IDP F**](https://www.ibitgq.org/exams)|Certified Introduction to Data Protection|Privacy|_No expiration_| -||[**CIS F**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Foundation|Standards|_No expiration_| -||[**CIS LI**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Implementer|Standards|_No expiration_| -||[**CIS LA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Auditor|Standards|_No expiration_| -||[**CIS IA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Internal Auditor|Standards|_No expiration_| -||[**CISRM**](https://www.ibitgq.org/exams)|Certified ISO 27005 ISMS Risk Management|Standards|_No expiration_| -||[**PCI IM**](https://www.ibitgq.org/exams)|PCI DSS Implementation|Standards|_No expiration_| -||[**CCRMP**](https://www.ibitgq.org/exams)|Managing Cyber Security Risk|Management|_No expiration_| -||[**CIRM F**](https://www.ibitgq.org/exams)|Cyber Incident Response Management Foundation|Incident Response|_No expiration_| -||[**C CR P**](https://www.ibitgq.org/exams)|Certified Cyber Resilience Practitioner|Management|_No expiration_| -||[**CITGP**](https://www.ibitgq.org/exams)|Implementing IT Governance – Foundation & Principles|Management|_No expiration_| -||[**C CS F**](https://www.ibitgq.org/exams)|Certified Cyber Security Foundation|General Cyber Security|_No expiration_| +|'|[**EU GDPR P**](https://www.ibitgq.org/exams)|Certified EU General Data Protection Regulation Practitioner|Standards|_No expiration_| +|'|[**C-DPO**](https://www.ibitgq.org/exams)|Certified Data Protection Officer|Privacy|_No expiration_| +|'|[**C BS PIMS LI**](https://www.ibitgq.org/exams)|Certified BS 10012 PIMS Lead Implementer|Standards|_No expiration_| +|'|[**CCPA F**](https://www.ibitgq.org/exams)|California Consumer Privacy Act Foundation|Privacy|_No expiration_| +|'|[**C IDP F**](https://www.ibitgq.org/exams)|Certified Introduction to Data Protection|Privacy|_No expiration_| +|'|[**CIS F**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Foundation|Standards|_No expiration_| +|'|[**CIS LI**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Implementer|Standards|_No expiration_| +|'|[**CIS LA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Lead Auditor|Standards|_No expiration_| +|'|[**CIS IA**](https://www.ibitgq.org/exams)|Certified ISO 27001 ISMS Internal Auditor|Standards|_No expiration_| +|'|[**CISRM**](https://www.ibitgq.org/exams)|Certified ISO 27005 ISMS Risk Management|Standards|_No expiration_| +|'|[**PCI IM**](https://www.ibitgq.org/exams)|PCI DSS Implementation|Standards|_No expiration_| +|'|[**CCRMP**](https://www.ibitgq.org/exams)|Managing Cyber Security Risk|Management|_No expiration_| +|'|[**CIRM F**](https://www.ibitgq.org/exams)|Cyber Incident Response Management Foundation|Incident Response|_No expiration_| +|'|[**C CR P**](https://www.ibitgq.org/exams)|Certified Cyber Resilience Practitioner|Management|_No expiration_| +|'|[**CITGP**](https://www.ibitgq.org/exams)|Implementing IT Governance – Foundation & Principles|Management|_No expiration_| +|'|[**C CS F**](https://www.ibitgq.org/exams)|Certified Cyber Security Foundation|General Cyber Security|_No expiration_| |[**CertNexus**](https://certnexus.com/)|[**CFR**](https://certnexus.com/cybersec-first-responder-cfr/)|CyberSec First Responder|Incident Response|3 Years| -||[**CIOTSP**](https://certnexus.com/certified-iot-security-practitioner-ciotsp/)|Certified IoT Security Practitioner (CIoTSP)|IoT|3 Years| -||[**IRBIZ**](https://certnexus.com/irbiz/)|Incident Response for Business Professionals|Incident Response|3 Years| -||[**CSC**](https://certnexus.com/cyber-secure-coder/)|Cyber Secure Coder|Software Development|3 Years| -||[**CYBERSAFE**](https://certnexus.com/cybersafe/)|CyberSAFE|End user security|1 Year| +|'|[**CIOTSP**](https://certnexus.com/certified-iot-security-practitioner-ciotsp/)|Certified IoT Security Practitioner (CIoTSP)|IoT|3 Years| +|'|[**IRBIZ**](https://certnexus.com/irbiz/)|Incident Response for Business Professionals|Incident Response|3 Years| +|'|[**CSC**](https://certnexus.com/cyber-secure-coder/)|Cyber Secure Coder|Software Development|3 Years| +|'|[**CYBERSAFE**](https://certnexus.com/cybersafe/)|CyberSAFE|End user security|1 Year| |[**Lunarline**](https://lunarline.com/)|[**CEHT**](https://lunarline.com/)|Certified Expert Hunt Team|Threat Hunting|3 Years| -||[**CECS**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/cloud-fedramp-consulting-and-training/)|Certified Expert Cloud Security|Cloud Security|3 Years| -||[**CEIA**](https://lunarline.com/)|Certified Expert Independent Assessor|Auditing|3 Years| -||[**CEPM**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert Program Manager|Management|3 Years| -||[**CERP**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert RMF Professional|Management|3 Years| -||[**CESA**](https://lunarline.com/)|Certified Expert Security Analyst|Security Analysis|3 Years| +|'|[**CECS**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/cloud-fedramp-consulting-and-training/)|Certified Expert Cloud Security|Cloud Security|3 Years| +|'|[**CEIA**](https://lunarline.com/)|Certified Expert Independent Assessor|Auditing|3 Years| +|'|[**CEPM**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert Program Manager|Management|3 Years| +|'|[**CERP**](https://lunarline-staging.materiellcloud.com/services/governance-risk-and-compliance/risk-management-framework/)|Certified Expert RMF Professional|Management|3 Years| +|'|[**CESA**](https://lunarline.com/)|Certified Expert Security Analyst|Security Analysis|3 Years| |[**McAfee Institute**](https://www.mcafeeinstitute.com/)|[**CECI**](https://www.mcafeeinstitute.com/products/certified-expert-in-cyber-investigations-ceci)|Certified Expert in Cyber Investigations|Forensics|2 Years| -||[**CCII**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-investigator-ccii)|Certified Cyber Intelligence Investigator|Threat Intelligence|2 Years| -||[**CCIP**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-professional-ccip)|Certified Cyber Intelligence Professional|Threat Intelligence|2 Years| -||[**CSMIE**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-expert-csmie)|Certified Social Media Intelligence Expert|Threat Intelligence|2 Years| -||[**SMIA**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-analyst-smia)|Certified Social Media Intelligence Analyst|Threat Intelligence|2 Years| -||[**CCTA**](https://www.mcafeeinstitute.com/products/certified-counterintelligence-threat-analyst-ccta)|Certified Counterintelligence Threat Analyst|Threat Intelligence|2 Years| -||[**CPCI**](https://www.mcafeeinstitute.com/products/certified-professional-criminal-investigator-cpci)|Certified Professional Criminal Investigator|Forensics|2 Years| -||[**CORCI**](https://www.mcafeeinstitute.com/products/certified-organized-retail-crime-investigator-corci)|Certified Organized Retail Crime Investigator|Forensics|2 Years| -||[**CEL**](https://www.mcafeeinstitute.com/products/certified-executive-leader-cel)|Certified Executive Leader|Management|2 Years| -||[**CHTI**](https://www.mcafeeinstitute.com/products/certified-human-trafficking-investigator-chti)|Certified Human Trafficking Investigator|Forensics|2 Years| -||[**CCFI**](https://www.mcafeeinstitute.com/products/certified-cryptocurrency-forensic-investigator-ccfi)|Certified Cryptocurrency Forensic Investigator|Forensics|2 Years| -||[**WVTS**](https://www.mcafeeinstitute.com/products/certified-workplace-violence-and-threat-specialist-wvts)|Certified Workplace violence and threat specialist|Forensics|2 Years| -||[**C\|OSINT**](https://www.mcafeeinstitute.com/products/certified-osint)|Certified in Open Source Intelligence|Threat Intelligence|2 Years| -|[**The IIA**](https://www.theiia.org/en/)|[**CIA**](https://www.theiia.org/en/certifications/cia/)|Certified Internal Auditor|Auditing|| -||[**CRMA**](https://www.theiia.org/en/certifications/crma/)|Certification in Risk Management Assurance|Risk Management|| -||[**QIAL**](https://www.theiia.org/en/certifications/qial/)|Qualification in Internal Audit Leadership|Auditing|| +|'|[**CCII**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-investigator-ccii)|Certified Cyber Intelligence Investigator|Threat Intelligence|2 Years| +|'|[**CCIP**](https://www.mcafeeinstitute.com/products/certified-cyber-intelligence-professional-ccip)|Certified Cyber Intelligence Professional|Threat Intelligence|2 Years| +|'|[**CSMIE**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-expert-csmie)|Certified Social Media Intelligence Expert|Threat Intelligence|2 Years| +|'|[**SMIA**](https://www.mcafeeinstitute.com/products/certified-social-media-intelligence-analyst-smia)|Certified Social Media Intelligence Analyst|Threat Intelligence|2 Years| +|'|[**CCTA**](https://www.mcafeeinstitute.com/products/certified-counterintelligence-threat-analyst-ccta)|Certified Counterintelligence Threat Analyst|Threat Intelligence|2 Years| +|'|[**CPCI**](https://www.mcafeeinstitute.com/products/certified-professional-criminal-investigator-cpci)|Certified Professional Criminal Investigator|Forensics|2 Years| +|'|[**CORCI**](https://www.mcafeeinstitute.com/products/certified-organized-retail-crime-investigator-corci)|Certified Organized Retail Crime Investigator|Forensics|2 Years| +|'|[**CEL**](https://www.mcafeeinstitute.com/products/certified-executive-leader-cel)|Certified Executive Leader|Management|2 Years| +|'|[**CHTI**](https://www.mcafeeinstitute.com/products/certified-human-trafficking-investigator-chti)|Certified Human Trafficking Investigator|Forensics|2 Years| +|'|[**CCFI**](https://www.mcafeeinstitute.com/products/certified-cryptocurrency-forensic-investigator-ccfi)|Certified Cryptocurrency Forensic Investigator|Forensics|2 Years| +|'|[**WVTS**](https://www.mcafeeinstitute.com/products/certified-workplace-violence-and-threat-specialist-wvts)|Certified Workplace violence and threat specialist|Forensics|2 Years| +|'|[**C\|OSINT**](https://www.mcafeeinstitute.com/products/certified-osint)|Certified in Open Source Intelligence|Threat Intelligence|2 Years| +|[**The IIA**](https://www.theiia.org/en/)|[**CIA**](https://www.theiia.org/en/certifications/cia/)|Certified Internal Auditor|Auditing|1 year| +|'|[**CRMA**](https://www.theiia.org/en/certifications/crma/)|Certification in Risk Management Assurance|Risk Management|1 year| +|'|[**QIAL**](https://www.theiia.org/en/certifications/qial/)|Qualification in Internal Audit Leadership|Auditing|1 year| |[**GAQM**](https://gaqm.org)|[**CSST**](https://gaqm.org/certifications/software_security_testing/csst)|Certified Software Security Tester|Software Development|_No Expiration_| -||[**CASST**](https://gaqm.org/certifications/software_security_testing/casst)|Certified Advanced Software Security Tester|Software Development|_No Expiration_| -||[**CISP**](https://gaqm.org/certifications/information_systems_security/cisp)|Certified Information Security Professional|General Cyber Security|5 Years| -||[**CISSM**](https://gaqm.org/certifications/information_systems_security/cissm)|Certified Information Systems Security Manager|Management|5 Years| -||[**CISST**](https://gaqm.org/certifications/information_systems_security/cisst)|Certified Information Systems Security Tester|Security Testing|_No Expiration_| -||[**CPT**](https://gaqm.org/certifications/information_systems_security/certified_penetration_tester_cpt)|Certified Penetration Tester|Penetration Tester|_No Expiration_| -||[**CFA**](https://gaqm.org/certifications/information_systems_security/cfa)|Certified Forensic Analyst|Forensics|_No Expiration_| -||[**CPEH**](https://gaqm.org/certifications/information_systems_security/cpeh)|Certified Professional Ethical Hacker|Penetration Tester|_No Expiration_| -||[**ISO/IEC 27001-CIA**](https://gaqm.org/certifications/iso_certifications/iso-27001-isms-certified-internal-auditor)|ISO 27001 ISMS Certified Internal Auditor|Auditing|_No Expiration_| -||[**ISO/IEC 27001-27002-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001-27002 Lead Auditor|Auditing|_No Expiration_| -||[**ISO/IEC 27001-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001:2013 ISMS Certified Lead Auditor|Auditing|_No Expiration_| -||[**ISO/IEC 27001-F**](https://gaqm.org/certifications/iso_certifications/iso_isms_fnd)|ISO 27001:2013 ISMS Foundation|Standards|_No Expiration_| -||[**ISO/IEC 27002-F**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-fnd)|ISO 27002 Foundation|Standards|_No Expiration_| -||[**ISO/IEC 27002-LI**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-li)|ISO 27002 Lead Implementer|Standards|_4 Years_| -||[**ISO/IEC 31000-LRM**](https://gaqm.org/certifications/iso_certifications/iso-31000-cla)|ISO 31000 Certified Lead Risk Manager|Standards|_No Expiration_| +|'|[**CASST**](https://gaqm.org/certifications/software_security_testing/casst)|Certified Advanced Software Security Tester|Software Development|_No Expiration_| +|'|[**CISP**](https://gaqm.org/certifications/information_systems_security/cisp)|Certified Information Security Professional|General Cyber Security|5 Years| +|'|[**CISSM**](https://gaqm.org/certifications/information_systems_security/cissm)|Certified Information Systems Security Manager|Management|5 Years| +|'|[**CISST**](https://gaqm.org/certifications/information_systems_security/cisst)|Certified Information Systems Security Tester|Security Testing|_No Expiration_| +|'|[**CPT**](https://gaqm.org/certifications/information_systems_security/certified_penetration_tester_cpt)|Certified Penetration Tester|Penetration Tester|_No Expiration_| +|'|[**CFA**](https://gaqm.org/certifications/information_systems_security/cfa)|Certified Forensic Analyst|Forensics|_No Expiration_| +|'|[**CPEH**](https://gaqm.org/certifications/information_systems_security/cpeh)|Certified Professional Ethical Hacker|Penetration Tester|_No Expiration_| +|'|[**ISO/IEC 27001-CIA**](https://gaqm.org/certifications/iso_certifications/iso-27001-isms-certified-internal-auditor)|ISO 27001 ISMS Certified Internal Auditor|Auditing|_No Expiration_| +|'|[**ISO/IEC 27001-27002-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001-27002 Lead Auditor|Auditing|_No Expiration_| +|'|[**ISO/IEC 27001-LA**](https://gaqm.org/certifications/iso_certifications/iso-27001-2013-certified-lead-auditor)|ISO 27001:2013 ISMS Certified Lead Auditor|Auditing|_No Expiration_| +|'|[**ISO/IEC 27001-F**](https://gaqm.org/certifications/iso_certifications/iso_isms_fnd)|ISO 27001:2013 ISMS Foundation|Standards|_No Expiration_| +|'|[**ISO/IEC 27002-F**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-fnd)|ISO 27002 Foundation|Standards|_No Expiration_| +|'|[**ISO/IEC 27002-LI**](https://gaqm.org/certifications/iso_certifications/iso-iec-27002-li)|ISO 27002 Lead Implementer|Standards|4 Years| +|'|[**ISO/IEC 31000-LRM**](https://gaqm.org/certifications/iso_certifications/iso-31000-cla)|ISO 31000 Certified Lead Risk Manager|Standards|_No Expiration_| |[**ISECOM**](https://www.isecom.org)|[**OPSA**](https://www.isecom.org/opsa.pdf)|OSSTMM Professional Security Analyst|Security Analyst|_No Expiration_| -||[**OPST**](https://www.isecom.org/opst.pdf)|OSSTMM Professional Security Tester|Penetration Tester|_No Expiration_| -||[**OPSE**](https://www.isecom.org/opse.pdf)|OSSTMM Professional Security Expert|General Cyber Security|_No Expiration_| -||[**OWSE**](https://www.isecom.org/opse.pdf)|OSSTMM Wireless Security Expert|Penetration Tester|_No Expiration_| -||[**CTA**](https://www.isecom.org/cta.pdf)|OSSTMM Certified Trust Analyst|Trust Management|_No Expiration_| -||[**SAI**](https://www.isecom.org/sai.pdf)|Certified Security Awareness Instructor|Cyber Security Trainer|_No Expiration_| -||[**CHA**](https://www.isecom.org/cha.pdf)|Certified Hacker Analyst|Penetration Tester|_No Expiration_| -||[**CHAT**](https://www.isecom.org/chat.pdf)|Certified Hacker Analyst Trainer|Cyber Security Trainer|_No Expiration_| +|'|[**OPST**](https://www.isecom.org/opst.pdf)|OSSTMM Professional Security Tester|Penetration Tester|_No Expiration_| +|'|[**OPSE**](https://www.isecom.org/opse.pdf)|OSSTMM Professional Security Expert|General Cyber Security|_No Expiration_| +|'|[**OWSE**](https://www.isecom.org/opse.pdf)|OSSTMM Wireless Security Expert|Penetration Tester|_No Expiration_| +|'|[**CTA**](https://www.isecom.org/cta.pdf)|OSSTMM Certified Trust Analyst|Trust Management|_No Expiration_| +|'|[**SAI**](https://www.isecom.org/sai.pdf)|Certified Security Awareness Instructor|Cyber Security Trainer|_No Expiration_| +|'|[**CHA**](https://www.isecom.org/cha.pdf)|Certified Hacker Analyst|Penetration Tester|_No Expiration_| +|'|[**CHAT**](https://www.isecom.org/chat.pdf)|Certified Hacker Analyst Trainer|Cyber Security Trainer|_No Expiration_| |[**HISPI**](https://www.hispi.org/)|[**HISP**](https://www.hispi.org/certification.php)|Holistic Information Security Practitioner|General Cyber Security|_3 Years_| -|[**Blockchain Training Alliance**](https://blockchaintrainingalliance.com/)|[**CBSP**](https://blockchaintrainingalliance.com/collections/certifications/products/cbsp)|Certified Blockchain Security Professional|Blockchain|_2 Years_| -|[**Crypto Consortium**](https://cryptoconsortium.org/)|[**CCSSA**](https://cryptoconsortium.org/certifications/ccssa/)|CryptoCurrency Security Standard Auditor|Blockchain|-| -|[**The Open Group**](https://www.opengroup.org/)|[**OG0-041**](https://www.opengroup.org/certifications)|Open FAIR Foundation|Risk Management|-| -||[**TOGAF9-F**](https://www.opengroup.org/certifications)|TOGAF 9 Foundation|Security Architecture|-| -||[**TOGAF9-C**](https://www.opengroup.org/certifications)|TOGAF 9 Certified|Security Architecture|-| +|[**Blockchain Training Alliance**](https://blockchaintrainingalliance.com/)|[**CBSP**](https://blockchaintrainingalliance.com/collections/certifications/products/cbsp)|Certified Blockchain Security Professional|Blockchain|2 Years| +|[**Crypto Consortium**](https://cryptoconsortium.org/)|[**CCSSA**](https://cryptoconsortium.org/certifications/ccssa/)|CryptoCurrency Security Standard Auditor|Blockchain|2 years| +|[**The Open Group**](https://www.opengroup.org/)|[**OG0-041**](https://www.opengroup.org/certifications)|Open FAIR Foundation|Risk Management|_No espiration_| +|'|[**TOGAF9-F**](https://www.opengroup.org/certifications)|TOGAF 9 Foundation|Security Architecture|_No espiration_| +|'|[**TOGAF9-C**](https://www.opengroup.org/certifications)|TOGAF 9 Certified|Security Architecture|_No espiration_| |[**TCM Security**](https://certifications.tcm-sec.com/)|[**PNPT**](https://certifications.tcm-sec.com/pnpt/)|Practical Network Penetration Tester|Penetration Tester|No Expiration| -||[**PCRP**](https://certifications.tcm-sec.com/pcrp)|Practical Career-Ready Professional|Penetration Tester|3 years| -||[**PJMR**](https://certifications.tcm-sec.com/pjmr)|Practical Junior Malware Researcher|Malware Analysis|No Expiration| +|'|[**PCRP**](https://certifications.tcm-sec.com/pcrp)|Practical Career-Ready Professional|Penetration Tester|3 years| +|'|[**PJMR**](https://certifications.tcm-sec.com/pjmr)|Practical Junior Malware Researcher|Malware Analysis|No Expiration| |[**Star Certification**](https://starcertification.org/)|[**SCSU**](https://starcertification.org/Certifications/Certificate/su)|Star Cyber Secure User|Security Awareness|3 years| -||[**EHE**](https://starcertification.org/Certifications/Certificate/Ethical-Hacking-Expert)|Star Certified Ethical Hacking Expert|Penetration Testing|3 years| -||[**SESS**](https://starcertification.org/Certifications/Certificate/expertsecurity)|Star Expert Security Specialist|Penetration Testing|3 years| -||[**SMFAS**](https://starcertification.org/Certifications/Certificate/mobile)|Star Mobile Forensic and Advance Security|Forensics|3 years| -||[**SPTE**](https://starcertification.org/Certifications/Certificate/penetration)|Star Penetration Tester Experts [[27]](https://en.wikipedia.org/wiki/List_of_computer_security_certifications#cite_note-30)|Penetration Testing|3 years| -||[**SSCA**](https://starcertification.org/Certifications/Certificate/securityanalytics)|Star Secure Cyber Analytics|Penetration Testing|3 years| -||[**SFICH-007**](https://starcertification.org/Certifications/Certificate/forensic)|Star Forensic investigator in Computer Hacking-007|Forensics|3 years| -||[**SSPE.Net**](https://starcertification.org/Certifications/Certificate/securedotnet)|Star Secure Programmer Expert- .Net|Software Development|3 years| -||[**SSPE-Java**](https://starcertification.org/Certifications/Certificate/securejava)|Star Secure Programmer Expert- Java|Software Development|3 years| -||[**SSPE-Android**](https://starcertification.org/Certifications/Certificate/secureandroid)|Star Secure Programmer Expert- Android|Software Development|3 years| -||[**SSPE-PHP**](https://starcertification.org/Certifications/Certificate/securephp)|Star Secure Programmer Expert- PHP|Software Development|3 years| +|'|[**EHE**](https://starcertification.org/Certifications/Certificate/Ethical-Hacking-Expert)|Star Certified Ethical Hacking Expert|Penetration Testing|3 years| +|'|[**SESS**](https://starcertification.org/Certifications/Certificate/expertsecurity)|Star Expert Security Specialist|Penetration Testing|3 years| +|'|[**SMFAS**](https://starcertification.org/Certifications/Certificate/mobile)|Star Mobile Forensic and Advance Security|Forensics|3 years|  +|'|[**SSCA**](https://starcertification.org/Certifications/Certificate/securityanalytics)|Star Secure Cyber Analytics|Penetration Testing|3 years| +|'|[**SFICH-007**](https://starcertification.org/Certifications/Certificate/forensic)|Star Forensic investigator in Computer Hacking-007|Forensics|3 years| +|'|[**SSPE.Net**](https://starcertification.org/Certifications/Certificate/securedotnet)|Star Secure Programmer Expert- .Net|Software Development|3 years| +|'|[**SSPE-Java**](https://starcertification.org/Certifications/Certificate/securejava)|Star Secure Programmer Expert- Java|Software Development|3 years| +|'|[**SSPE-Android**](https://starcertification.org/Certifications/Certificate/secureandroid)|Star Secure Programmer Expert- Android|Software Development|3 years| +|'|[**SSPE-PHP**](https://starcertification.org/Certifications/Certificate/securephp)|Star Secure Programmer Expert- PHP|Software Development|3 years| |[Zero-Point Security](https://training.zeropointsecurity.co.uk/)|[**CRTO**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-exam)|Certified Red Team Operator|Red Teaming|N/A| -||[**CRTL**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-ii-exam)|Certified Red Team Lead|Red Teaming|N/A| +|'|[**CRTL**](https://training.zeropointsecurity.co.uk/pages/red-team-ops-ii-exam)|Certified Red Team Lead|Red Teaming|N/A| |[EC First](https://ecfirst.com/)|[**CCSA**](https://ecfirst.com/ccsa/)|Certified Cyber Security Architect|Security Architecture|3 years| -||[**CSCS**](https://ecfirst.com/cscs/)|Certified Security Compliance Specialist|Risk/Compliance|3 years| -||[**CMMP**](https://ecfirst.com/ccp/)|Certified CMMC Professional|Standards|3 years| +|'|[**CSCS**](https://ecfirst.com/cscs/)|Certified Security Compliance Specialist|Risk/Compliance|3 years| +|'|[**CMMP**](https://ecfirst.com/ccp/)|Certified CMMC Professional|Standards|3 years| |[CWNP](https://www.cwnp.com/)|[**CWS**](https://www.cwnp.com/certifications/cwsp)|Certified Wireless Specialist|Wireless Security|3 years| |[8kSec](https://8ksec.io/)|[**OMSE**](https://8ksec.io/omse/)|Offensive Mobile Security Expert|Red Teaming|_No expiration_| -|[Cisco](https://www.cisco.com/site/us/en/index.html)|[CCNA Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html)|Cisco Certified Network Associate - Security|Network Security|-| -||[CCNP Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/professional/ccnp-security-v2.html)|Cisco Certified Network Professional - Security|Network Security|-| -||[CCIE Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/expert/ccie-security-v2.html)|Cisco Certified Internetwork Expert - Security|Network Security|-| -||[CCNA CyberOps](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/cyberops-associate.html)|Cisco Certified Network Associate - CyberOps|Network Security|-| -|[Check Point](https://www.checkpoint.com/)|[CCSA](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Administrator|Network Security|-| -||[CCSE](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Expert|Network Security|-| +|[Cisco](https://www.cisco.com/site/us/en/index.html)|[CCNA Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html)|Cisco Certified Network Associate - Security|Network Security|3 years| +|'|[CCNP Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/professional/ccnp-security-v2.html)|Cisco Certified Network Professional - Security|Network Security|3 years| +|'|[CCIE Security](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/expert/ccie-security-v2.html)|Cisco Certified Internetwork Expert - Security|Network Security|3 years| +|'|[CCNA CyberOps](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/cyberops-associate.html)|Cisco Certified Network Associate - CyberOps|Network Security|3 years| +|[Check Point](https://www.checkpoint.com/)|[CCSA](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Administrator|Network Security|3 years| +|'|[CCSE](https://www.checkpoint.com/mind/secureacademy/ambassador/)|Check Point Certified Security Expert|Network Security|3 years| |[Kali](https://www.kali.org/)|[KLCP](https://www.kali.org/blog/introducing-kali-linux-certified-professional/)|Kali Linux Certified Professional|Penetration Testing|No expiration| -|[IBM](https://www.ibm.com/)|[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-security-access-manager-v90-24008806)|IBM Certified Deployment Professional - Security Access Manager V9.0|Access Control|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-associate-administrator-security-guardium-data-protection-v1012-38008401)|IBM Certified Associate Administrator - Security Guardium Data Protection V10.1.2|Data Protection|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-administrator-security-guardium-v100-49002401)|IBM Certified Administrator - Security Guardium V10.0|Data Protection|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-identity-governance-and-intelligence-v52-49002501)|IBM Certified Deployment Professional - Identity Governance and Intelligence V5.2|Access Control|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-analyst-i2-analysts-notebook-v9-58000402)|IBM Certified Analyst - i2 Analysts Notebook V9|Threat Intelligence|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-soc-analyst-ibm-qradar-siem-v732-C0000801)|IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2|Threat Intelligence|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-associate-analyst-ibm-qradar-siem-v732-C0003502)|IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2|Threat Intelligence|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-associate-administrator-ibm-qradar-siem-v732-C0003602)|IBM Certified Associate Administrator - IBM QRadar SIEM V7.3.2|Threat Intelligence|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-ibm-qradar-siem-v732-C0003804)|IBM Certified Deployment Professional - IBM QRadar SIEM V7.3.2|Threat Intelligence|-| -||[-](https://www.ibm.com/training/certification/ibm-certified-deployment-professional-security-identity-governance-and-intelligence-v525-C0004502)|IBM Certified Deployment Professional - Security Identity Governance and Intelligence V5.2.5|Access Control|-| -|[Microsoft](https://www.microsoft.com/)|[AZ-500](https://learn.microsoft.com/en-us/credentials/certifications/exams/az-500/)|Microsoft Certified: Azure Security Engineer Associate|Cloud Security|1 year *| -||[MS-500](https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/ms-500)|Microsoft 365 Certified: Security Administrator Associate|Cloud Security|-| -||[SC-100](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-100/)|Microsoft Certified: Cybersecurity Architect Expert|Security Architect|1 year *| -||[SC-200](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-200/)|Microsoft Certified: Security Operations Analyst Associate|SIEM|1 year *| -||[SC-300](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-300/)|Microsoft Certified: Identity and Access Administrator Associate|IAM|1 year *| -||[SC-400](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-400/)|Microsoft Information Protection Administrator|Risk/Compliance|1 year *| -||[SC-900](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/)|Microsoft Certified: Security, Compliance, and Identity Fundamentals|Fundamentals|1 year *| -|[AWS](https://aws.amazon.com/?nc2=h_lg)|[-](https://aws.amazon.com/certification/certified-security-specialty/?gclid=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB&trk=0c2b5279-1e50-459b-b9b5-6b0861ac160e&sc_channel=ps&ef_id=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB:G:s&s_kwcid=AL!4422!3!653411798076!e!!g!!aws%20certified%20security%20specialty!19919601960!149404863724)|AWS Certified Security - Specialty|Cloud Security|-| -|[Google](https://cloud.google.com/?hl=en)|[-](https://cloud.google.com/learn/certification/cloud-security-engineer)|Google Professional Cloud Security Engineer|Cloud Security|-| -|[Jamf](https://www.jamf.com/)|[JCESA](https://www.jamf.com/products/)|Jamf Certified Endpoint Security Admin|macOS Security|-| -|[Alibaba](https://www.alibabacloud.com/)|[ACA](https://edu.alibabacloud.com/certification/aca_cloudsecurity)|ACA Cloud Security Certification|Cloud Security|-| -||[ACP](https://edu.alibabacloud.com/certification/acp_security)|ACP Cloud Security Certification|Cloud Security|-| -||[ACE](https://edu.alibabacloud.com/certification/ace_cloudcomputing)|ACE Cloud Security Expert|Cloud Security|-| -|[Redhat](https://www.redhat.com/en)|[EX415](https://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam)|Red Hat Certified Specialist in Security: Linux|IT-Administration|-| -||[EX425](https://www.redhat.com/en/services/training/ex425-retired-red-hat-certified-specialist-security-containers-and-openshift-container-platform-exam)|Red Hat Certified Specialist in Security: Containers and OpenShift Container|IT-Administration|-| -|[OpenText](https://www.opentext.com/)|[EnCE](https://www.opentext.es/products-and-solutions/services/training-and-learning-services/encase-training/examiner-certification)|EnCase Certified Examiner|Forensics|-| -||[EnCEP](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/ediscovery-practitioner-program)|EnCase Certified eDiscovery Practitioner|Forensics|-| -||[CFSR](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/forensic-security-responder-certification)|EnCase Certified Forensic Security Responder|Forensics|-| +|[Microsoft](https://www.microsoft.com/)|[AZ-500](https://learn.microsoft.com/en-us/credentials/certifications/exams/az-500/)|Microsoft Certified: Azure Security Engineer Associate|Cloud Security|1 year| +|'|[MS-500](https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/ms-500)|Microsoft 365 Certified: Security Administrator Associate|Cloud Security|1 year| +|'|[SC-100](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-100/)|Microsoft Certified: Cybersecurity Architect Expert|Security Architect|1 year | +|'|[SC-200](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-200/)|Microsoft Certified: Security Operations Analyst Associate|SIEM|1 year | +|'|[SC-300](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-300/)|Microsoft Certified: Identity and Access Administrator Associate|IAM|1 year | +|'|[SC-400](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-400/)|Microsoft Information Protection Administrator|Risk/Compliance|1 year | +|'|[SC-900](https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-900/)|Microsoft Certified: Security, Compliance, and Identity Fundamentals|Fundamentals|1 year| +|[AWS](https://aws.amazon.com/?nc2=h_lg)|[-](https://aws.amazon.com/certification/certified-security-specialty/?gclid=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB&trk=0c2b5279-1e50-459b-b9b5-6b0861ac160e&sc_channel=ps&ef_id=Cj0KCQiA2KitBhCIARIsAPPMEhKByrylLjwMco3zWiJy3ZkryNhW5231qDt6aCjnkIL4K65WioIv3pIaAg9NEALw_wcB:G:s&s_kwcid=AL!4422!3!653411798076!e!!g!!aws%20certified%20security%20specialty!19919601960!149404863724)|AWS Certified Security - Specialty|Cloud Security|3 years| +|[Google](https://cloud.google.com/?hl=en)|[-](https://cloud.google.com/learn/certification/cloud-security-engineer)|Google Professional Cloud Security Engineer|Cloud Security|2 years| +|[Jamf](https://www.jamf.com/)|[JCESA](https://www.jamf.com/products/)|Jamf Certified Endpoint Security Admin|macOS Security|3 years| +|[Alibaba](https://www.alibabacloud.com/)|[ACA](https://edu.alibabacloud.com/certification/aca_cloudsecurity)|ACA Cloud Security Certification|Cloud Security|2 years| +|'|[ACP](https://edu.alibabacloud.com/certification/acp_security)|ACP Cloud Security Certification|Cloud Security|2 years| +|'|[ACE](https://edu.alibabacloud.com/certification/ace_cloudcomputing)|ACE Cloud Security Expert|Cloud Security|2 years| +|[Redhat](https://www.redhat.com/en)|[EX415](https://www.redhat.com/en/services/training/ex415-red-hat-certified-specialist-security-linux-exam)|Red Hat Certified Specialist in Security: Linux|IT-Administration|3 years| +|'|[EX425](https://www.redhat.com/en/services/training/ex425-retired-red-hat-certified-specialist-security-containers-and-openshift-container-platform-exam)|Red Hat Certified Specialist in Security: Containers and OpenShift Container|IT-Administration|3 years| +|[OpenText](https://www.opentext.com/)|[EnCE](https://www.opentext.es/products-and-solutions/services/training-and-learning-services/encase-training/examiner-certification)|EnCase Certified Examiner|Forensics|3 years| +|'|[EnCEP](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/ediscovery-practitioner-program)|EnCase Certified eDiscovery Practitioner|Forensics|3 years| +|'|[CFSR](https://www.opentext.com.br/products-and-solutions/services/training-and-learning-services/encase-training/forensic-security-responder-certification)|EnCase Certified Forensic Security Responder|Forensics|3 years| |[Fortinet](https://www.fortinet.com/)|[NSE 1/2/3](https://training.fortinet.com/local/staticpage/view.php?page=fca_cybersecurity)|Network Security Professional Associate|vendor-specific products|2 years| -||[NSE 4](https://www.fortinet.com/br/training-certification)|Network Security Professional|firewalls|2 years| -||[NSE 5](https://www.fortinet.com/br/training-certification)|Network Security Analyst|administration|2 years| -||[NSE 6](https://www.fortinet.com/br/training-certification)|Network Security Specialist|vendor-specific products|2 years| -||[NSE 7](https://www.fortinet.com/br/training-certification)|Network Security Architect|firewalls|2 years| -||[NSE 8](https://training.fortinet.com/local/staticpage/view.php?page=fcx_cybersecurity)|Network Security Expert|firewalls|2 years| +|'|[NSE 4](https://www.fortinet.com/br/training-certification)|Network Security Professional|firewalls|2 years| +|'|[NSE 5](https://www.fortinet.com/br/training-certification)|Network Security Analyst|administration|2 years| +|'|[NSE 6](https://www.fortinet.com/br/training-certification)|Network Security Specialist|vendor-specific products|2 years| +|'|[NSE 7](https://www.fortinet.com/br/training-certification)|Network Security Architect|firewalls|2 years| +|'|[NSE 8](https://training.fortinet.com/local/staticpage/view.php?page=fcx_cybersecurity)|Network Security Expert|firewalls|2 years| |[Juniper](https://learningportal.juniper.net/juniper/default.aspx)|[JNCIA-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncia-sec.html)|Juniper Networks Certified Associate|Network Security|3 years| -||[JNCIS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=702)|Juniper Networks Certified Specialist|Network Security|3 years| -||[JNCIP-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncip-sec.html)|Juniper Networks Certified Professional|Network Security|3 years| -||[JNCIE-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=11065)|Juniper Networks Certified Expert|Network Security|3 years| -||[JNCDS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=JUNIPER-LEARNING-PATHS-HOME)|Juniper Networks Certified Design Specialist Security|Network Security|3 years| -|[Palo Alto](https://www.paloaltonetworks.com/)|[PCNSA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-administrator)|Palo Alto Networks Certified Network Security Administrator|Network Security|-| -||[PCNSE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-engineer)|Palo Alto Networks Certified Network Security Engineer|Network Security|-| -||[PCCET](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-cybersecurity-entry-level-technician)|Palo Alto Networks Certified Cybersecurity Entry-level Technician|General Cyber Security|-| -||[PCDRA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-detection-and-remediation-analyst)|Palo Alto Networks Certified Detection and Remediation Analyst|Network Security|-| -||[PCCSE](https://www.paloaltonetworks.com/services/education/prisma-certified-cloud-security-engineer)|Palo Alto Networks Prisma Certified Cloud Security Engineer|Cloud Security|-| -||[PCSAE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-security-automation-engineer)|Palo Alto Networks Certified Security Automation Engineer|Threat Intelligence|-| \ No newline at end of file +|'|[JNCIS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=702)|Juniper Networks Certified Specialist|Network Security|3 years| +|'|[JNCIP-SEC](https://www.juniper.net/us/en/training/certification/tracks/security/jncip-sec.html)|Juniper Networks Certified Professional|Network Security|3 years| +|'|[JNCIE-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=11065)|Juniper Networks Certified Expert|Network Security|3 years| +|'|[JNCDS-SEC](https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=JUNIPER-LEARNING-PATHS-HOME)|Juniper Networks Certified Design Specialist Security|Network Security|3 years| +|[Palo Alto](https://www.paloaltonetworks.com/)|[PCNSA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-administrator)|Palo Alto Networks Certified Network Security Administrator|Network Security|2 years| +|'|[PCNSE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-engineer)|Palo Alto Networks Certified Network Security Engineer|Network Security|2 years| +|'|[PCCET](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-cybersecurity-entry-level-technician)|Palo Alto Networks Certified Cybersecurity Entry-level Technician|General Cyber Security|2 years| +|'|[PCDRA](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-detection-and-remediation-analyst)|Palo Alto Networks Certified Detection and Remediation Analyst|Network Security|2 years| +|'|[PCCSE](https://www.paloaltonetworks.com/services/education/prisma-certified-cloud-security-engineer)|Palo Alto Networks Prisma Certified Cloud Security Engineer|Cloud Security|2 years| +|'|[PCSAE](https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-security-automation-engineer)|Palo Alto Networks Certified Security Automation Engineer|Threat Intelligence|2 years| \ No newline at end of file