Cyber Security Training Landscape
Bedrijven - Opleidingen - Certificaten - Events - Training Sites - Security Tools
Certificaten
| Naam | Onderwerpen | Niveau | Bedrijf |
|---|---|---|---|
| Certified Ethical Hacker | vulnerabilities | Professional | EC-Council |
| Computer Hacking Forensics Investigator | forensics | Professional | EC-Council |
| EC-Council Certified Security Analyst | pen testing | Professional | EC-Council |
| Licensed Penetration Tester | Professional | EC-Council | |
| Chief Information Security Officer | governance, IS management, core security competences | Professional | EC-Council |
| Certified Network Defender | network security | Professional | EC-Council |
| Certified Network Defence Architect | Professional | EC-Council | |
| Certified Threat Intelligence Analyst | threat analysis | Professional | EC-Council |
| Certified Application Security Engineer | application security | Professional | EC-Council |
| Certified SOC Analyst | network security, security operations | Professional | EC-Council |
| Certified Secure Computer User | Amateur | EC-Council | |
| EC-Council Certified Encryption Specialist | encryption | Professional | EC-Council |
| EC-Council Certified Security Specialist | forensics, network security, information security | Professional | EC-Council |
| EC-Council Certified Incident Handler | law, risk assessment methodologies | Professional | EC-Council |
| CCNA Security | Professional | CISCO | |
| Offensive Security Certified Professional | pen testing | Professional | Offensive Security |
| Offensive Security Certified Expert� | pen testing | Professional | Offensive Security |
| Offensive Security Web Expert | vulnerabilities, web security | Professional | Offensive Security |
| Offensive Security Wireless Professional | network security | Professional | Offensive Security |
| Offensive Security Exploitation Expert | vulnerabilities, system security | Professional | Offensive Security |
| CISSP�Certified Information Systems Security Professional | network security, application security, risk, security operations, security engineering | Professional | (ISC)2 |
| SSCP�Systems Security Certified Practitioner | network security, application security, incident response, risk, crypto, system security, access control | Professional | (ISC)2 |
| CCSP�Certified Cloud Security Professional | cloud security, security operations, legal | Professional | (ISC)2 |
| CAP�Certified Authorization Professional | risk, authorization | Professional | (ISC)2 |
| CSSLP�Certified Secure Software Lifecycle Professional | application security, SDLC, security testing | Professional | (ISC)2 |
| ISSAP�Information Systems Security Architecture Professional | application security, risk, security engineering | Professional | (ISC)2 |
| ISSEP�Information Systems Security Engineering Professional | application security | Professional | (ISC)2 |
| ISSMP�Information Systems Security Management Professional | governance, incident response | Professional | (ISC)2 |
| CCNP Security | Professional | CISCO | |
| CCIE Security | Professional | CISCO | |
| Certified in Risk and Information Systems Control (CRISC)� | risk, vulnerabilities, threat | Professional | ISACA |
| Certified Information Security Manager (CISM)� | network security, security tools, identity management, access control, policies, physical security | Professional | ISACA |
| Security Essentials | network security, prevention, defense in depth | Professional | GIAC |
| Certified Intrusion Analyst | forensics, network security | Professional | GIAC |
| Information Security Fundamentals | network security, crypto | Professional | GIAC |
| Certified Enterprise Defender | pen testing, network security, incident response, vulnerabilities, malware | Professional | GIAC |
| Certified Windows Security Administrator | network security, crypto, system security | Professional | GIAC |
| Continuous Monitoring Certification | network security, monitoring | Professional | GIAC |
| Certified Perimeter Protection Analyst | network security, crypto | Professional | GIAC |
| Critical Controls Certification | pen testing, incident response, threats, risk, vulnerabilities, malware | Professional | GIAC |
| Certified UNIX Security Administrator | forensics, system security, security in depth | Professional | GIAC |
| Defending Advanced Threats | network security, vulnerabilities, malware | Professional | GIAC |
| Defensible Security Architecture | software security | Professional | GIAC |
| Certified Incident Handler | hacking, vulnerabilities, incident handling | Professional | GIAC |
| Penetration Tester | pen testing, network security | Professional | GIAC |
| Web Application Penetration Tester | pen testing, vulnerabilities, web security | Professional | GIAC |
| Exploit Researcher and Advanced Penetration Tester | pen testing, vulnerabilities | Professional | GIAC |
| Mobile Device Security Analyst | hacking, vulnerabilities | Professional | GIAC |
| Accessing and Auditing Wireless Networks | network security | Professional | GIAC |
| Enterprise Vulnerability Assessor | vulnerabilities | Professional | GIAC |
| Certified Forensic Analyst | forensics, incident response, threats | Professional | GIAC |
| Certified Forensic Examiner | forensics | Professional | GIAC |
| Reverse Engineering Malware | vulnerabilities, malware | Professional | GIAC |
| Network Forensic Analyst | forensics, network security, incident response, threats | Professional | GIAC |
| Cyber Threat Intelligence | Professional | GIAC | |
| Advanced Smartphone Forensics | forensics, mobile security | Professional | GIAC |
| Security Leadership | network security, crypto | Professional | GIAC |
| Systems and Network Auditor | network security | Professional | GIAC |
| Information Security Professional | network security, application security, risk, security operations, security engineering | Professional | GIAC |
| Law of Data Security & Investigations | fraud, law | Professional | GIAC |
| Secure Software Programmer - Java | application security | Professional | GIAC |
| Certified Web Application Defender | web security | Professional | GIAC |
| Secure Software Programmer - .NET | application security | Professional | GIAC |
| Security+ | network security, application security, threats, risk, crypto, law | Professional | CompTIA |
| Cybersecurity Analyst (CySA+) | network security, application security, threats, vulnerabilities, risks | Professional | CompTIA |
| PenTest+ | pen testing, network security, vulnerabilities | Professional | CompTIA |
| Advanced Security Practitioner (CASP+) | application security, mobile security, crypto, secure engineering | Professional | CompTIA |
| IT Security Certificate (EITCA/IS) | network security, threats, crypto, law, system security, risks | Professional | European Information Technologies Certification Institute |
| Professional Security Analyst Accredited Certification (OPSA) | network security | Professional | Institute for Security and Open Methodologies (ISECOM) |
| Professional Security Tester Accredited Certification (OPST) | network security, security testing, auditing | Professional | Institute for Security and Open Methodologies (ISECOM) |
| Professional Security Expert Accredited Certification (OPSE) | web security, risks, security testing, physical security | Professional | Institute for Security and Open Methodologies (ISECOM) |
| Wireless Security Expert (OWSE) | network security | Professional | Institute for Security and Open Methodologies (ISECOM) |
| Certified Trust Analyst (CTA) | security testing, trust | Professional | Institute for Security and Open Methodologies (ISECOM) |
| Security Awareness Instructor (SAI) | network security, hacking, security analysis | Professional | Institute for Security and Open Methodologies (ISECOM) |
| Certified Hacker Analyst (CHA) | network security, hacking, security analysis | Professional | Institute for Security and Open Methodologies (ISECOM) |