Certifications

This list of certifications is provided as a service by Saumil to provide a single source of available certifications. If you would like a certification added to the list, contact s.aumil@yahoo.com.

Certifications are listed in alphabetical order within each section.


Programs


Information Security

CEH Certified Ethical Hacker
CIPP Certified Information Privacy Professional
CISM Certified Information Security Manager
CISSP Certified Information Systems Security Professional
CITRMSR Certified Identity Theft Risk Management Specialist
CSP RSA Certified Security Professional
ECSA EC-Council Certified Security Analyst
GIAC Global Information Assurance Certification
ISSPCS International Systems Security Professional Certification Scheme
LPT Licensed Penetration Tester
PCIP Professional in Critical Infrastructure Protection
Security+ Computer Technology Industry Association (CompTIA)
SSCP Systems Security Certified Practitioner
Symantec SPS - Symantec Product Specialist
STA - Symantec Technology Architect
SCSE - Symantec Certified Security Engineer
SCSP - Symantec Certified Security Practitioner



Business Continuity/Disaster Recovery

DRI International

ABCP Associate Business Continuity Professional
CBCP Certified Business Continuity Professional
MBCP Master Business Continuity Professional

BCM Institute

BCCP Business Continuity Certified Planner
BCCS
DRCS
Business Continuity Certified Specialist
Disaster Recovery Certified Specialist
BCCE
DRCE
Business Continuity Certified Expert
Disaster Recovery Certified Expert



Audit

CCSA Certification in Control Self-Assessment
CIA Certified Internal Auditor
CISA Certified Information Systems Auditor
CISM Certified Information Security Manager
CSA Control Self-Assessment



Information Technology/Computing

ACP Associate Computing Professional
CCP Certified Computing Professional
CISCO CCNA/CCNP - Network Installation & Support
CCDA/CCDP - Network Engineering & Design
CCIP - Communications & Services
Cisco Qualified Specialist
CITP Certified Information Technology Professional (AICPA)
CWNP Certified Wireless Network Professional
Microsoft MCP, MCP + Internet, MCP + Site Building
MCSD
MCSE, MCSE + Internet
MCDBA
MCT



Miscellaneous

AHC Anti-Hacking Certification
AISC Advanced Information Security Certification
CFE Certified Fraud Examiner
CHFI Computer Hacking Forensic Investigator
CPP Certified Protection Professional
SSEC Software Security Engineering Certification







Information Security


CEH - Certified Ethical Hacker

Certified Ethical Hacker is a certificiation offered by EC Council. For more information, visit the website: http://www.eccouncil.org/CEH.htm.


Certified Identity Theft Risk Management Specialist (CITRMS®)

The Certified Identity Theft Risk Management Specialist (CITRMS®) certification program is the nation’s only training program specifically developed for professionals who are dedicated to educating and assisting clients, customers, businesses, and the general public in combating the epidemic of Identity Theft and related fraud. CITRMS®-qualified professionals are employed by a wide range of organizations including financial institutions; mortgage, real estate, and financial services firms; law enforcement, and other government agencies. Many others are private practitioners including attorneys, CPAs, financial advisors, counselors, and consultants. For more information, visit the website:
http://www.financial-education-icfe.org/identity_theft_specialist/identity_theft_risk_management_specialist_certification.asp


Certified Information Systems Security Professional

The Certified Information Systems Security Professional (CISSP) is a certification for information security professionals. This certification is obtained through the International Information Systems Security Certification Consortium (ISC)2 for the purpose of recognizing individuals who have distinguished themselves as an experienced, knowledgeable, and proficient information security practitioner. The CISSP certificate also provides a means of identifying those persons who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in the information security profession.

Certification is awarded to those individuals who achieve a prescribed level of information security experience, comply with a professional code of ethics, and pass a rigorous examination on the Common Body of Knowledge of information security. In order to maintain currency in the field, each CISSP must be recertified every three years by participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Common Body of Knowledge, and service in professional organizations.

For more information, see the (ISC)2 web site at www.isc2.org.

Seminar and examination schedules are available on the (ISC)2 site.

ISSA endorses the Certified Information Systems Security Professional (CISSP) certification provided by (ISC)² as the certification for the Information Security Professional.


CIPP – Certified Information Privacy Professional

The Certified Information Privacy Professional (CIPP) debuted in 2004 and has since become the industry-standard certification in corporate compliance with U.S. privacy laws and regulations as well as European requirements for transfers of personal data. Successful candidates have become IAPP members and also have completed and passed the Certification Foundation Examination and the CIPP Examination.

For further information, visit www.privacyassociation.org


CSP – RSA Certified Security Professional

The RSA Certified Security Professional Program offers technology professionals the knowledge, skills, and credentials necessary to deploy and maintain reliable enterprise security systems.

Recertification is required for every major product release and for certain point releases that RSA deems sufficiently important. RSA Security will notify you by e-mail of changes in requirements for any certifications you hold.

  • RSA SecurID Certified Systems Engineer
  • RSA SecurID Certified Administrator
  • RSA SecurID CI
  • RSA Access Manager CSE
  • RSA Digital Certificate Management Solutions CSE
  • RSA Sign-On Manager CSE

For further information, visit www.rsasecurity.com.


ECSA – EC-Council Certified Security Analyst

EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure. For more information, see: http://www.eccouncil.org/ecsa/


Global Information Assurance Certification (GIAC)

SANS' GIAC Training and Certification Program is designed to serve the people who are or will be responsible for managing and protecting important information systems and networks. GIAC course specifications were developed through a consensus process that involved more than a hundred members of SANS' faculty and other experienced security practitioners. They combine the opinions, knowledge, and expertise of many of the world's most experienced front-line security and system administrators, intrusion detection analysts, consultants, auditors, and managers.

The GIAC certification program consists of:

  • Information Security KickStart
  • LevelOne Security Essentials
  • LevelTwo subject area modules

GIAC training and certification is presented in live training sessions at SANS conferences. Information Security KickStart, LevelOne Security Essentials, and an increasing selection of LevelTwo courses are also offered over the web with both online course books and (in most cases) audio tracks.

For more information visit the SANS Web Site.


International Systems Security Professional Certification Scheme (ISSPCS)

ISSPCS is a global and open certification scheme for Information and Systems Security Professionals based on essential security principles with the following key features:

  • Internationally independent and professional certification
  • Comprehensive continuous muti-level certification
  • Practical, transparent open resources with real-world focus
  • Customised region-specific content

ISSPCS certification identifies the holder as a knowledgeable and practical individual in the field of Information Security and provides a practical solution to the issue of continually changing information security processes and best practices.

For more information, visit http://www.isspcs.org/.


Licensed Penetration Tester (LPT)

EC-Council’s Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The Licensed Penetration Tester standardizes the knowledge base for penetration testing professionals by incorporating the best practices followed by experienced experts in the field. For additional information, see: http://www.eccouncil.org/lpt/Licensed_Penetration_Tester.htm


Professional in Critical Infrastructure Protection (PCIP – formerly CCISP)

Critical infrastructure is defined by the office of Homeland Security as those assets, facilities, industries, and capabilities that are needed to support commerce and our daily lives. This includes SCADA, energy, utility, oil & gas, financial, communications, and transportation to name a few.

Since the birth of the internet, the threats that these industries face are becoming increasingly more complex, and alarmingly more common, as these, once isolated, environments are now faced with viruses, hackers, cyber terrorists, and remote threats of high available system outages. Securing the systems and network environments that support this critical infrastructure is more important in today's world now more than ever and requires an extended set of specialized skills.

The PCIP certification (formerly the CCISP), maintained by the Critical Infrastructure Institute, is different than other security certifications in that it is tailored specifically to the Critical Infrastructure sectors and the Critical Infrastructure Protection Industry (CIP). Professionals carrying the PCIP designation will have demonstrated the necessary knowledge and professional skills required for designing, maintaining, and managing security architectures for critical infrastructure, SCADA, and high-availability environments. These skills range from security architecture design & management to highly advanced technical skills such as those used by hackers to circumvent security measures as well as countermeasure techniques all specific to these critical infrastructure, SCADA, and high availability environments.

For authenticity purposes, all recipients, along with their certification number, are maintained in a secure database and each recipient carries a PCIP ID card.

For more information visit http://www.ci-institute.org.


CompTIA Security+ Certification

CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. It is an international, vendor-neutral certification that is taught at colleges, universities and commercial training centers around the world. Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended.

For more information visit: http://certification.comptia.org/security/


SSCP – Systems Security Certified Practitioner 

SSCP Certification was designed to recognize an international standard for practitioners of information security [IS] and understanding of a Common Body of Knowledge (CBK). It focuses on practices, roles and responsibilities as defined by experts from major IS industries. Certification can enhance an IS career and provide added credibility.

Seven SSCP information systems security test domains are covered in the examination pertaining to the Common Body of Knowledge:

  • Access Controls
  • Administration
  • Audit and Monitoring
  • Risk, Response and Recovery
  • Cryptography
  • Data Communications
  • Malicious Code/Malware

For further detail regarding SSCP Certification, please refer to the SSCP White Paper posted on this (ISC)2, Inc. web site.

For more information, see the (ISC)2 web site at www.isc2.org.

Seminar and examination schedules are available on the (ISC)2 site.


Symantec Certifications

Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies. Candidates may choose the appropriate path to support their goals. Symantec Training offerings are available to prepare for Certifications , e.g. Security Solutions Education that qualify for CPE credits. For program details visit the Symantec Certification Webb site (www.symantec.com/education/certification).

  • SPS - Symantec Product Specialist - demonstrates knowledge and experience with a specific Symantec product
  • STA - Symantec Technology Architect - demonstrates knowledge and experience with one on the four vendor neutral security disciplines
  • SCSE - Symantec Certified Security Engineer - demonstrates knowledge and experience with one of the four vendor neutral security disciplines and the related Symantec products
  • SCSP - Symantec Certified Security Practitioner - demonstrates knowledge and experience with all four of the vendor neutral security disciplines and all related Symantec products



Business Continuity/Disaster Recovery

DRI International

DRI International's world-renowned professional certification program (ABCP, CBCP, MBCP) acknowledges an individual's effort to achieve a professional level of competence in the industry. Designed to be rigorous, well controlled, and free of bias, the program is centered on the "Professional Practices for Business Continuity Planners", the international industry standard.


Certified Business Continuity Professional (CBCP)

DRII's CBCP certification is reserved for individuals who have demonstrated their knowledge and experience in the business continuity / disaster recovery industry. The CBCP level is designed for an individual with a minimum of two years of experience as a business continuity/disaster recovery planner.


Associate Business Continuity Planner (ABCP)

The Associate Business Continuity Planner (ABCP) or Associate level, is for individuals with at least a specified minimum level of knowledge in business continuity/disaster recovery planning, but who have not yet attained the two years of experience required for CBCP. Individuals can also qualify if they work in  positions related to--but not actually in--business continuity/disaster recovery planning.


Master Business Continuity Professional (MBCP)

The Master Business Continuity Professional (MBCP) or Master level, targets an individual with a minimum of five years of experience as a business continuity/disaster recovery planner. In addition, the MBCP must attain a higher score on the CBCP Examination, and either successfully complete a case-study examination or complete a directed research project and paper.

An additional prerequisite for the CBCP and MBCP certification levels is the demonstration of proficiency in a specific number of Subject Areas of the Professional Practices for Business Continuity Planners. For more information, see the Disaster Recovery Institute International at http://www.drii.org.

BCM Institute

BCMI's objective is not to compete but to complement existing certifications in geographical areas where you will not have the opportunity to experience formal BC & DR training and certification. BCMI instructors continue to practice in BC-DR and related domains; each possessing 3 or more years of experience. Course content is designed around practical knowledge and skills for implementing BCM programs and BC plans within organizations. Curriculum is consistent with DRI International's 10 Subject Areas in the Professional Practices for BC Professionals; complementing the international certification courses and examinations. More information about BCM Institute certifications at http://www.bcm-institute.org/.


Foundation – Business Continuity Certified Planner (BCCP)

The BCCP recognizes practitioners who are involved in developing, implementing and maintaining BC procedures and processes for their business sub-units; as well as for senior and middle management involved in BCM.


Specialist – Business Continuity Certified Specialist (BCCS) & Disaster Recovery Certified Specialist (DRCS)

The specialist’s role as it implies are designed to recognised individuals who are participating as department coordinators in the BCP project. The BCCS caters to coordinators supporting business users. The DRCS caters to individuals who are participating in the DR planning stages; usually, overseeing specific areas in the IT infrastructure, application, software and hardware.


Expert – Business Continuity Certified Expert (BCCE) & Disaster Recovery Certified Expert (DRCE)

Individuals intending to qualify for the expert level are expected to manage and drive organizational-wide BCP/DRP projects. Such individuals are expected to assist organizations to sustain BCM programs. This will involve developing and conducting integrated tests and exercises; which should also assess the coordination between inter and intra-dependent business and support units (including IT). The BCCE is targeted at individuals involved in BCM. The DRCE is targeted at individuals involved in DRP.




Audit



Certification in Control Self-Assessment (CCSA)

The Certification in Control Self-Assessment (CCSA) is The Institute of Internal Auditor’s first specialty certification and second certification to be offered by the Board of Regents in the history of the Institute of Internal Auditors. The new CCSA certification program will identify the skill sets needed by successful CSA practitioners, measure proficiency in CSA, and provide guidance for CSA initiatives.

To receive the CCSA designation, professionals must satisfy educational and professional work experience requirements and successfully complete an exam designed to test an individual's proficiency in control self-assessment.

The first CCSA exam will be offered in early 1999. This will be a computer-based exam offered on demand at numerous facilities around the United States and Canada. For more information, see the IIA web site at http://www.theiia.org.


Certified Internal Auditor (CIA)

The Institute of Internal Auditors (IIA) also offers Certified Internal Auditor (CIA) certification which requires candidates to master their ability to identify risks, examine alternative remedies, and prescribe the best initiatives to control these risks. CIAs master auditing standards and practices as well as management principles and controls, information technology, and emerging strategies to improve business and government. CIAs learn the best ways to manage business. The CIA exam tests a candidate's knowledge and ability regarding the current practice of internal auditing. It enables candidates and prospective managers to adapt to professional changes and challenges by:

  • Addressing nearly all management skills.
  • Focusing on the principles of management control.
  • Measuring a candidate's understanding of risk management and internal controls.

For more information, see the IIA web site at http://www.theiia.org.


Certified Information Systems Auditor (CISA)

The CISA designation is awarded by the Information Systems Audit and Control Association to those individuals with an interest in information systems auditing, control, and security who have met and continue to meet specific requirements.

To earn and retain the CISA designation, CISAs are required to:

  • Successfully complete the CISA Examination;
  • Adhere to the Information Systems Audit and Control Association's Code of Professional Ethics;
  • Submit evidence of a minimum of five (5) years of professional information systems (IS) auditing, control or security work experience. Substitution and waivers of such experience applies; and
  • Adhere to a continuing education program.

For more information, see the Information Systems Audit and Control Association site at http://www.isaca.org.


Certified Information Security Manager (CISM)

The CISM designation is awarded by the Information Systems Audit and Control Association. That is a new certification and is specifically geared toward experienced information security professionals. CISM is business-oriented and focused on information risk management while addressing management, design and technical security issues at the conceptual level. It is for the individual who must maintain a view of the "big picture" by managing, designing, overseeing and assessing an enterprise's information security.

To earn and retain the CISM designation, CISMs are required to:

  • Successfully complete the CISM Examination;
  • Adhere to the Information Systems Audit and Control Association's Code of Professional Ethics;
  • Submit verified evidence of a minimum of five (5) years of information security work experience, with a minimum of three (3) years of information security management work experience in three or more the CISM job practice areas.

For more information, see the Information Systems Audit and Control Association site at http://www.isaca.org.


Control Self-Assessment (CSA)

CSA Qualification is offered by the Institute of Internal Auditors. Candidates must complete 54 CPD hours in the following manner: 18 CPD hours for Introduction to Control Self-Assessment; 18 CPD hours for either Value-Added Business Controls: The Right Way to Manage Risk or Evaluating Internal Controls: A COSO-Based Approach; and 18 CPD hours for either Assessing Risk: A Better Way to Audit or CSA Facilitation Techniques for Auditors. For more information, see the IIA web site at http://www.theiia.org.




Information Technology/Computing


Associate Computing Professional (ACP)

The ACP designation was developed to validate an individual's knowledge of the general computing industry and specific programming language skills. The Institute for Certification of Computing Professionals' (ICCP) exams allow candidates to test themselves against the industry's Common Body of Knowledge as established by the Test Councils of the ICCP. Additionally, the ICCP assists in identifying specific strengths within the candidate's area of expertise.


Certified Computing Professional (CCP)

The CCP certification has replaced three designations previously conferred by the Institute for Certification of Computing Professionals:

  • CDP - Certificate in Data Processing
  • CCP - Certified Computer Programmer
  • CSP - Certified Systems Professional

The CCP designation is conferred upon anyone who:

  1. Passes the examinations,
  2. Meets the experience requirement,
  3. Signs a document agreeing to comply with the ICCP Codes of Ethics, Conduct and Good Practice.

For more information on either certification contact the Institute for Certification of Computing Professionals at http://www.iccp.org.


CISCO Certifications

Cisco provides three levels of certification for IT professionals with several different tracks to meet individual needs. Use the menus below—or click the graphic at the upper right—to learn more about certification levels and tracks and qualification designations. There are many paths to Cisco certification, but only one requirement—passing one or more exams demonstrating knowledge and skill.

  • CCNA/CCNP - Network Installation & Support
  • CCDA/CCDP - Network Engineering & Design
  • CCIP - Communications & Services
  • Cisco Qualified Specialist

For more information on CISCO certification programs visit the CISCO Career Certifications Page.


CITP – Certified Information Technology Professional

The AICPA’s Certified Information Technology Professional (CITP) Credential recognizes Certified Public Accountants with IT expertise and unique ability to bridge the gap between business and technology. Unlike other certifications that recognize only a narrow scope of skills, the CITP credential recognizes technical excellence across the wide range of business-technology practice areas that comprise the CITP body of knowledge:

  • Strategic Technology Planning
  • IT Architecture
  • Business Process Enablement
  • IT Governance and Regulation
  • System Development, Acquisition, Implementation and Project Management
  • Information Systems Management
  • Systems Security, Reliability Audit and Control

To qualify for the CITP Credential, candidates must be CPAs and members of the American Institute of Certified Public Accountants, and must demonstrate significant business and lifelong learning experience in the above-referenced business-technology practice areas over the past five years. To obtain an application, or to learn more about the credential, visit www.aicpa.org/CITP.


CWNP – Certified Wireless Network Professional

Description:this is the first and only vendor-neutral certification programme for IT professionals wanting to work with Wireless Networks (particularly IEEE 802.11 Wi-Fi Wireless LANs).

Certifications Offered: The programme incorporates four levels of certification:

  • Certified Wireless Network Administrator (CWNA(TM))
  • Certified Wireless Security Professional (CWSP(TM))
  • Certified Wireless AnalysisProfessional (CWAP(TM))
  • Certified Wireless Network Expert (CWNE(TM))

The CWNA, CWSP and CWAP certifications are already available. The Certified Wireless Network Expert (CWNE) curriculum and exam will be launched during 2005.

For more information, visit the Planet3 Wireless Inc. website.


Microsoft Certifications

Microsoft offers a number of platform-specific technical certifications and other technical certification programs.

Technical Certifications:

  • MCP, MCP + Internet, MCP + Site Building
  • MCSD
  • MCSE, MCSE + Internet
  • MCDBA
  • MCT

For more information on the Microsoft certification programs visit the Microsoft Certification Page.



Miscellaneous


Anti-Hacking Certification (Training) from Security University

The Anti-Hacking Certification offers the basics of performance based computer security education. From building a blueprint of your critical assets with Network Penetration Testing class, to knowing how a hacker thinks, and where the compromise happened inside your network, this certification exceeds users expectations for labs and experience.

For more information see the SU website: http://www.securityuniversity.net/


Advanced Information Security Certification (Training) from Security University

The AIS Certification (Advanced Information Security) include advanced information security classes. These classes include PKI & certificate management, Security Policies and Services Oriented Architecture and IDS monitoring classes. In order to qualify for the AIS certification you have to complete the 4 Anti-Hacking Certification classes and the 4 AIS classes. The AIS classes are hands-on classes with performance based testing, the labs and experience exceed users expectations.

For more information see the SU website: http://www.securityuniversity.net/


Certified Fraud Examiner (CFE)

The Association of Certified Fraud Examiners is a professional, international organization with 25,000 members. Since 1988, the Association has been dedicated to educating and certifying qualified individuals (Certified Fraud Examiners) in the highly specialized aspects of fraud detection and prevention. The diverse membership of the Association includes auditors, accountants, fraud investigators, loss prevention specialists, attorneys, educators, criminologists, and other anti-fraud professionals.

The Association is the recognized international source of fraud information, the Association researches and develops fraud-related training programs on a variety of topics while presenting more than 50 national and international seminars per year. Identified as "the premier financial sleuthing organization" by The Wall Street Journal, the Association has also been cited for its efforts against white-collar crime by U.S. News & World Report, The New York Times, Fortune, ABC-TV's Nightline and 20/20, and CBS News' 60 Minutes.

The Certified Fraud Examiner program is an accrediting process for individuals with the specialized skills to detect, investigate, and deter fraud. Certified Fraud Examiners have the expertise to resolve allegations of fraud from inception to disposition, gather evidence, take statements, write reports, testify to findings, and assist in the prevention and detection of fraud. Before applying to become a CFE, candidates must first become Associate Members of the Association of Certified Fraud Examiners. Further requirements include the equivalent of a bachelors degree from a recognized institution of higher learning, two years of professional experience related directly or indirectly to the detection and deterrence of fraud, and successful completion of the Uniform CFE Examination. Please contact the Association for more information at http://www.cfenet.com.


CHFI - Computer Hacking Forensic Investigator Certification

EC Council - Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. For more information, see: http://www.eccouncil.org/CHFI.htm


Certified Protection Professional (CPP)

For years the world has recognized a need for competent professionals who can effectively manage complex security issues that threaten people and the assets of corporations, governments, and public and private institutions. As the emphasis on protecting people, property, and information increases, it has strengthened the demand for professional managers. To meet these needs, the American Society for Industrial Security (ASIS) International administers the Certified Protection Professional (CPP) program. More than 8,000 professionals have earned the designation of CPP. This group of professionals has demonstrated its competency in the areas of security solutions and best-business practices through an intensive qualification and testing program. As a result, these men and women have been awarded the coveted designation of CPP, and are recognized as proven leaders in their profession.

The CPP designation identifies professionals as dedicated to the security profession and recognizes their ability to perform to exemplary standards. Ask a Certified Protection Professional "why?" and they'll tell you that the certification process is one of the single most important steps you can make in career development. What does certification mean to you?

  • The CPP demonstrates your commitment to the profession.
  • The CPP establishes professional credentials.
  • The CPP prepares you for greater on-the-job responsibilities.
  • The CPP improves skills and knowledge.
  • The CPP improves career opportunities and advancement.
  • The CPP provides for greater earnings potential.
  • The CPP offers greater professional recognition from peers.
  • The CPP enhances the profession's image.
  • The CPP reflects achievement.

For more information on CPP certification, please contact ASIS at http://www.asisonline.org/cpp.html.


Software Security Engineering Certification (Training) from Security University

Security University Software Security Engineer Certification is a number of classes that make a Software Security Engineer Certification. This certification is for anyone interested in securing software from flaws and bugs, with how to break code, and best practices for checking your code, to penetration testing your code. These classes and certification are new and will provide consistent, extreme hands-on software security labs and classes with trademarked escalating workshops and performance based training for security, IT professionals and now coding /developers.

For more information see the SU website: http://www.securityuniversity.net/

Make a free website with Yola