Disclaimer: Links are provided on these pages purely for informational purposes and should not be construed as endorsement or claim of affiliation with any of the companies, websites, people or products. All names, logos and trademarks belong to their respective owners.

Follow the link to find details about the exam outline, experience requirements etc on the each of the certification pages.



Certified Information Systems Security Professional
CISSP Domains * Domain 1. Security and Risk Management * Domain 2. Asset Security * Domain 3. Security Architecture and Engineering * Domain 4. Communication and Network Security * Domain 5. Identity and Access Management (IAM) * Domain 6. Security Assessment and Testing * Domain 7. Security Operations * Domain 8. Software Development Security *


Certified Cloud Security Professional
The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions: Enterprise Architect, Security Administrator, Systems Engineer, Security Architect, Security Consultant, Security Engineer, Security Manager, Systems Architect.


Information Systems Security Architecture Professional
The CISSP-ISSAP is an appropriate credential if you’re a chief security architect or analyst. Typically, you work as an independent consultant or in a similar capacity. As the architect, you play a key role in the information security department. Your responsibilities fall between the C-suite and upper managerial level and the implementation of the security program. Although your role is tied closely to technology, it may be closer to the consultative and analytical process of information security.


Information Systems Security Engineering Professional
The CISSP-ISSEP is an ideal credential for proving you know how to incorporate security into all facets of business operations. This security engineering certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems. The CISSP-ISSEP was developed in conjunction with the U.S. National Security Agency (NSA). It offers an invaluable tool for any systems security engineering professional.


Information Systems Security Management Professional
You are vital to your organization’s success. Prove your knowledge and leadership skills with the CISSP-ISSMP.</p> <p>This cybersecurity management certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.


Certified Secure Software Lifecycle Professional
The CSSLP is ideal for software development and security professionals responsible for applying best practices to each phase of the SDLC – from software design and implementation to testing and deployment – including those in the following positions: Software Architect * Software Engineer * Software Developer * Application Security Specialist * Software Program Manager * Quality Assurance Tester * Penetration Tester * Software Procurement Analyst * Project Manager * Security Manager * IT Director/Manager


Certified Authorization Professional
The CAP is ideal for IT, information security, and information assurance practitioners and contractors who use the RMF in:<br /> The U.S. federal government, such as the U.S. Department of State or Department of Defense * The military<br /> Civilian roles, such as: Federal Contractors * Local governments * Private sector organizations.


Systems Security Certified Practitioner
The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets, including those in the following positions: Network Security Engineer * Systems Administrator * Security Analyst * Systems Engineer * Security Consultant/Specialist * Security Administrator * Systems/Network Analyst.<br /> Database Administrator


Certified Information Systems Auditor
Validate your expertise and get the leverage you need to move up in your career. With ISACA’s Certified Information Systems Auditor (CISA) certification, you can do just that. CISA is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems.


Certified in Risk and Information Systems Control
ISACA’s Certified in Risk and Information Systems Control (CRISC) certification indicates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. Gain instant recognition and credibility with CRISC and boost your career!


Certified Information Security Manager
ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management. Take your career out of the technical realm to management!


Certified in the Governance of Enterprise IT
ISACA's Certified in the Governance of Enterprise IT (CGEIT) certification is framework agnostic and the only IT governance certification for the individual. CGEIT can put you in the role of a trusted advisor to your enterprise!


Certified Data Privacy Solutions Engineer (CDPSE) certification
Given the high stakes for organizations and the great need for qualified professionals to create privacy solutions that are aligned with organizational goals and risk appetite, ISACA is launching its new Certified Data Privacy Solutions Engineer (CDPSE) certification. The first experience-based, technical certification of its kind, CDPSE assesses a technology professional’s ability to implement privacy by design to enable organizations to enhance privacy technology platforms and products that provide benefits to consumers, build trust and advance data privacy. Plus, CDPSE holders have the validated experience to ensure that privacy solutions match the organization's risk appetite and mitigate risks of noncompliance.


Cybersecurity Practitioner
Be recognized among the world’s most-qualified cybersecurity professionals with ISACA®’s award-winning CSX®Cybersecurity Practitioner Certification (CSX-P).


GIAC Security Expert
The GSE certification is the most prestigious credential in the IT Security industry. The exam was developed by subject matter experts and top industry practitioners. The GSE's performance based, hands-on nature sets it apart from any other certifications in the IT security industry. The GSE will determine if a candidate has truly mastered the wide variety of skills required by top security consultants and individual practitioners.

Cyber Defense

Whether an attacker is successful penetrating an organization's network depends on the strength and intelligence of that organization's cyber defense professionals. Defending against attacks is an ongoing challenge, with new threats emerging daily and APT (advanced persistent threat) on everyone's mind. Well prepared organizations understand what has worked and will always work is taking a risk based approach to cyber defense. Ensuring the highest level of cyber security means having the expertise and knowledge to focus on the right areas of cyber defense.

Penetration Testing

High-value penetration testing doesn't involve just throwing a bunch of hacks at a target environment and declaring victory when a shell prompt magically pops up. Instead, the best penetration testers focus on understanding their craft in-depth. Pen Test Professionals provide significant value to organizations by improving their security stance through technical excellence and implementation of well-understood and repeatable methodologies. Ultimately, delivering real savings through information security to the business. GIAC Certifications are developed with these principles in mind and to ensure penetration testers and ethical hackers achieve the status of certified expert penetration testers and ethical hackers.

Incident Response and Forensics

Becoming a GIAC Incident Response and Forensic Certified professional ensures that you have the knowledge and performance efficiency to hunt for cyber security threats and respond to incidents properly.

Management & Audit

GIAC Management and Leadership Certifications build the next generation of cyber leaders and managers, preparing them to be a vital part of developing and delivering the organization's strategy. Technical knowledge is no longer sufficient for leading a security function across complex organizations. Today's security leaders must combine technical knowledge with leadership and management skills that are rooted in a deep understanding of the business.


GIAC Developer Certifications are developed through a consensus process involving subject matter experts, including developers, architects, administrators, security managers, and information security professionals. The cyber security certification addresses secure coding principles, security fundamentals and awareness, and the in-depth technical aspects of the most crucial areas of application security, secure coding, and secure development processes.

Industrial Control Systems

Industrial Control System (ICS) environments remain a target for cyber attackers. GIAC ICS Certifications equip security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. GIAC Certifications validate that both security professionals and control system engineers are equipped with the knowledge and skills they need to safeguard our critical infrastructures.


Certified Chief Information Security Officer
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.

C|EH Master

Certified Ethical Hacker - Master
C|EH Master, is the next evolution for the world-renowned Certified Ethical Hacker credential, and a logical ‘next step’ for those holding the prestigious certification. Earning the C|EH Master designation is your way of saying, “I learned it, I understood it, and I proved it.

C | EH

Certified Ethical Hacker
The Certified Ethical Hacker (CEH) is a core training program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit.


Certified Security Analyst
The ECSA program offers a seamless learning progress, continuing where the CEH program left off.

L|PT Master

Licensed Penetration Tester - Master
Your pen testing skills will be challenged over three levels, each with three challenges, against a multi-layered network architecture with defense-in-depth controls. You will be required to make knowledgeable decisions under immense pressure at critical stages while selecting your approach and exploits.


Licensed Penetration Tester
The exam will require you to demonstrate mastery of deploying advanced pen testing techniques and tools including multi-level pivoting, OS vulnerabilities exploits, SSH tunnelling, host-based application exploits, privilege escalation, web server and web application exploitation such as arbitrary local and remote file upload, SQL injection and parameter manipulation, etc – all in a real life scenario on hardened machines, networks, and applications.


EC-Council Certified Incident Handler v2
This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.


Computer Hacking Forensic Investigator
A CHFI certified professional will be equipped to be gainfully employed as a Computer Forensics or a Digital Forensics professional. They will be able to:


Certified Network Defense Architect
CNDA, which stands for Certified Network Defense Architect, is specially designed for Government Agencies or Military Agencies around the world.


Disaster Recovery Professional
The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.


Certificate of Cloud Security Knowledge
The CCSK certificate is widely recognized as the standard of expertise for cloud security and provides you with the foundations you need to secure data in the cloud. How you choose to build on that knowledge is your choice.


Certificate of Cloud Auditing Knowledge
The industry's first global cloud auditing credential.<br /> The Certificate of Cloud Auditing Knowledge (CCAK) is a credential that industry professionals can obtain to demonstrate their expertise in understanding the essential principles of auditing cloud computing systems. The CCAK is being developed by the Cloud Security Alliance, the global leader in cloud security best practices and will be available in Q3 2020.

Cloud Architect

Cloud Institute
A Certified Cloud Architect has proven knowledge in the designing and implementation of Cloud Computing services. Therefore he/she is an expert in the technology and the basis architecture of Cloud Computing platforms

Cloud Professional

Cloud Institute
A Certified Cloud Professional has a deep business related and essential technical understanding of the Cloud Computing specifics. A Certified Cloud Professional also knows best how to leverage the business by adopting Cloud Computing solutions. Therefore he/she is aware of all advantages, disadvantages and risks of the most popular Cloud Computing Operation and Service Delivery Models. A Certified Cloud Professional furthermore has hands-on experience of the Cloud Computing migration processes.

AWS Solutions Architect - Professional

The AWS Certified Solutions Architect – Professional exam is intended for individuals who perform a solutions architect role with two or more years of hands-on experience managing and operating systems on AWS.

AWS DevOps Engineer - Professional

AWS Certified DevOps Engineer - Professional
The AWS Certified DevOps Engineer – Professional exam is intended for individuals who perform a DevOps engineer role with two or more years of experience provisioning, operating, and managing AWS environments.

Solutions Architect – Associate

AWS Certified Solutions Architect – Associate
The AWS Certified Solutions Architect - Associate examination is intended for individuals who perform a solutions architect role and have one or more years of hands-on experience designing available, cost-efficient, fault-tolerant, and scalable distributed systems on AWS.

SysOps Administrator - Associate

AWS Certified SysOps Administrator - Associate
The AWS Certified SysOps Administrator – Associate examination is intended for systems administrators in a systems operations role with at least one year of experience in deployment, management, and operations on AWS.

Developer - Associate

AWS Certified Developer - Associate
The AWS Certified Developer - Associate examination is intended for individuals who perform a development role and have one or more years of hands-on experience developing and maintaining an AWS-based application.

Cloud Practitioner

AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner examination is intended for individuals who have the knowledge and skills necessary to effectively demonstrate an overall understanding of the AWS Cloud, independent of specific technical roles addressed by other AWS Certifications. The exam can be taken at a testing center or from the comfort and convenience of a home or office location as an online proctored exam.

Advanced Networking - Specialty

AWS Certified Advanced Networking - Specialty
The AWS Certified Advanced Networking - Specialty is intended for individuals who perform complex networking tasks.

Security - Specialty

AWS Certified Security - Specialty
The AWS Certified Security – Specialty is intended for individuals who perform a security role with at least two years of hands-on experience securing AWS workloads.

Machine Learning – Specialty

AWS Certified Machine Learning – Specialty
The AWS Certified Machine Learning - Specialty certification is intended for individuals who perform a development or data science role. It validates a candidate's ability to design, implement, deploy, and maintain machine learning (ML) solutions for given business problems.

Alexa Skill Builder - Specialty

AWS Certified Alexa Skill Builder - Specialty
The AWS Certified Alexa Skill Builder - Specialty certification is intended for individuals who perform a role as an Alexa skill builder. It validates a candidate’s ability to build, test, and publish Amazon Alexa skills.

Data Analytics - Specialty

AWS Certified Data Analytics - Specialty
Earn an industry-recognized credential from AWS that validates your expertise in AWS data lakes and analytics services. Build credibility and confidence by highlighting your ability to design, build, secure, and maintain analytics solutions on AWS that are efficient, cost-effective, and secure. Show you have breadth and depth in delivering insight from data.

Database - Specialty

AWS Certified Database - Specialty
Earn an industry-recognized credential from AWS that validates your expertise in the breadth of AWS database services and accelerating the use of database technology to drive your organization’s business transformation. Build credibility and confidence by highlighting your ability to design, recommend, and maintain the optimal AWS database solution for a use case.

Azure Certifications

Various Azure certifications
Azure Data Scientist Associate (Exam DP-100) * Azure Database Administrator Associate (Exam DP-300) * Azure Data Fundamentals (Exam DP-900) * Azure AI Fundamentals (Exam AI-900) * Azure Administrator Associate (Exam AZ-104) * Azure Data Engineer Associate (Exam DP-200, DP-201) * Azure IoT Developer Specialty (Exam AZ-220) * Azure for SAP Workloads Specialty (Exam AZ-120) * DevOps Engineer Expert (Exam AZ-400) * Azure AI Engineer Associate (Exam AI-100) * Azure Developer Associate (Exam AZ-204) *

Microsoft Certified: Azure Solutions Architect Expert

Required exams: AZ-303, AZ-304
Candidates for the Azure Solutions Architect Expert certification should have subject matter expertise in designing and implementing solutions that run on Microsoft Azure, including aspects like compute, network, storage, and security. * Responsibilities for this role include advising stakeholders and translating business requirements into secure, scalable, and reliable cloud solutions. An Azure Solution Architect partners with cloud administrators, cloud DBAs, and clients to implement solutions. * A candidate for this certification should have advanced experience and knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance–this role should manage how decisions in each area affect an overall solution. In addition, this role should have expert-level skills in Azure administration and have experience with Azure development and DevOps processes.

Microsoft Certified: Azure Security Engineer Associate

Required exams: AZ-500
Candidates for the Azure Security Engineer certification should have subject matter expertise implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. * Responsibilities for this role include maintaining the security posture, identifying, and remediating vulnerabilities by using a variety of security tools, implementing threat protection, and responding to security incident escalations. * Azure Security Engineers often serve as part of a larger team dedicated to cloud-based management and security or hybrid environments as part of an end-to-end infrastructure. * A candidate for this certification should have strong skills in scripting and automation; a deep understanding of networking, virtualization, and cloud N-tier architecture; and a strong familiarity with cloud capabilities and products and services for Azure, plus other Microsoft products and services.

Microsoft Certified: Azure Administrator Associate

Required exams: AZ-104
Candidates for the Azure Administrator Associate certification should have subject matter expertise implementing, managing, and monitoring an organization’s Microsoft Azure environment. * Responsibilities for this role include implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed. * An Azure Administrator often serves as part of a larger team dedicated to implementing your organization's cloud infrastructure. * A candidate for this certification should have at least six months of hands-on experience administering Azure, along with a strong understanding of core Azure services, Azure workloads, security, and governance. In addition, this role should have experience using PowerShell, Azure CLI, Azure portal, and Azure Resource Manager templates.

Microsoft Certified: Azure Fundamentals

Required exams: AZ-900
Candidates for the Azure Fundamentals certification should have foundational knowledge of cloud services and how those services are provided with Microsoft Azure. Azure Fundamentals certification is an opportunity to prove knowledge of cloud concepts, core Azure services, Azure pricing, SLA, and lifecycle, and the fundamentals of cloud security, privacy, compliance, and trust. This certification is intended for people beginning to work with cloud-based solutions and services. Candidates should be able to demonstrate a fundamental knowledge of cloud concepts, as well as Azure services, workloads, security, privacy, pricing, and support. In addition, you should be familiar with concepts of networking, storage, compute, application support, and application development.

Cloud Architect Professional

Google Cloud
A Professional Cloud Architect enables organizations to leverage Google Cloud technologies. With a thorough understanding of cloud architecture and Google Cloud Platform, this individual can design, develop, and manage robust, secure, scalable, highly available, and dynamic solutions to drive business objectives.

Associate Cloud Engineer

Google Cloud
An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. This individual is able to use Google Cloud Console and the command-line interface to perform common platform-based tasks to maintain one or more deployed solutions that leverage Google-managed or self-managed services on Google Cloud.


GCP - GSuite
A Google Cloud certification in G Suite signals to employers that you possess the digital skills to work collaboratively and productively in a professional environment. By earning the G Suite certification, you prove your ability to complete common workplace activities using cloud-based tools to create and share documents, spreadsheets, presentations, and files. You demonstrate that you can communicate effectively with email and online meeting solutions.

CCIE - Security

CCIE Security certification is for individuals who have skills to implement and maintain extensive Network Security Solutions using industry best practices.

CCNP Security

4 Exams are Required
300-208 SISAS * 300-206 SENSS*300-209 *300-210 SITCS


Offensive Security Certified Professional
Required Training: PWK - Penetration Testing With Kali Linux


Offensive Security Exploitation Expert
Required Training: AWE : Advanced Windows Exploitation


Offensive Security Certified Expert (Prerequisite: OSCP certificate)
Required Training: (CTP) Cracking the Perimeter


Offensive Security Wireless Professional
Required Training: WIFU : Wireless Attacks


Offensive Security Web Expert
Required Training: AWAE: Advanced Web Attacks and Exploitation


CompTIA Cloud+
CompTIA Cloud+ validates the skills you need to maintain and optimize cloud infrastructure services.