Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
10 Security Certifications To Boost Your Career
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
infosavvy
infosavvy,
User Rank: Apprentice
9/7/2020 | 8:13:41 AM
yber security live online training & certification
Nice post! it is really very helpful for us. if anyone want to know the details about cyber security live online training & certification 
osetim
osetim,
User Rank: Apprentice
6/12/2017 | 9:47:27 AM
Re: Requesting info
My question too

 
osetim
osetim,
User Rank: Apprentice
6/12/2017 | 9:42:54 AM
Re: About certs
pls can you give advices on any of the certification for begginners pls

 
NaveenK856
NaveenK856,
User Rank: Apprentice
3/27/2017 | 6:33:59 AM
New certification for Software/Application Security Professionals.
Hack2Secure has now Come-up with its first certification on SDLC Known As SWADLP (Secure Web Application development Lifecycle Practitioner ).This certificaton can give a boost to the Security Professionals.
ClarenceR927
ClarenceR927,
User Rank: Strategist
2/3/2017 | 11:23:16 AM
Re: Certifications always pay off...
Agree on CEH not being worth the time.  In the last 5 years I have begun discounting the CISSP also.  I have hired two ex-military CISSPs only to find out DoD paid for a boot camp for them to get the paper. One could not have spelled "CISSP" if you spotted him the 'CIS' and the other was only marginally better. We had to let both go. I had another apply who claimed an MS and PhD from a school that has never existed who failed our background check.  I reported him but as far as I can tell nothing has been done about him. 10 years ago the CISSP meant something but apparently it no longer does.
annabear4ever
annabear4ever,
User Rank: Apprentice
2/3/2017 | 9:24:54 AM
About certs
I got my start in the industry as a broke college student.  I saved up for and studied for the exams myself.  I don't agree that you have to sell everything you own to get these.  Some of the certs might be on the more expensive side, but none of them require that you take a class from a vendor.  Buy a book and read it.  Download the free tools and use them.  You'll learn 50x as much downloading and using the tools for six months and reading a study guide on the side than you ever will in a week long course.  You can even borrow the books from your local library, or buy them used online (watch the versioning).  Best yet... check your local community college!  Most of them are now offering classes for computer security; they're pretty cheap and come with 16 weeks of class!
CraigF
CraigF,
User Rank: Apprentice
9/28/2016 | 7:43:11 PM
Re: Is it just me, or is there a counting problem?
That is because the last two were place together. ;)
Cwal463
Cwal463,
User Rank: Apprentice
7/28/2016 | 12:55:04 AM
Requesting info
I've recently enrolled in cooled for cybercrime but may change it it to security. I found out that college looks good on paper but it's the certifications that matter. Can any one tell me what certs I need and where I can get them on my own time without spending and arm and leg. Please start with the beginning to advanced please. Any help would be greatly appreciated it.
JHWMP01
JHWMP01,
User Rank: Strategist
2/21/2016 | 9:15:04 AM
Alternative Certifications
There's been discussion on the relative real use of EC Council's CEH in real world application. Although DOD 4750 lists this certification, it is by nomeans a must have. Meaning, there are alternatives that match, and in most cases, out perform this over advertized "one-stop" cert in hacking. 

First off, the 4750 is being replaced witht he newer Directive 8140 that highlight areas that certifications should match, therefore a specific certification is not going to be required. With the build up and advertizing funds that EC Council (Malaysia) has dumped into making people think they are the permiere cert, the Pentagon and other DoD/US Government entities that hired and then forced their employees to gain the CEH have found it did not provide them with the actual technical skills to perform the job. The results was a series of foreign hacking successes reported in the news. DoD is now re-evaulting with the lack of skill with CEH. 

This of course is met with vile and anger from those that may hold that particular cert, those that work in the corporate arena and know nothing of US DoD inside talk, or those that think even mentioning this is rude. 

I, however, want to get the word out. The competition is fast rising. One such competator is a company I've seen listed in the newest CompTIA Roadmap 2016 called Mile2. THey have the premiere Certified Penetration Testing Engineer course and certification that is listed as Expert by CompTIA. I would like see more discussion on certification vendors that deliver training that actually teaches the skill set, not fluff and over funding a certification that was stated to be the end-all of ethical hacking, only to end up short and cuased failures. 

Mile2 actually was the training vendor that developed CEH back in the early days after 9/11. They continued to train the most people after they devloped the CEH course for EC Council. Having personnnaly been thorugh both training platforms, I find that the direct approach Mile2 takes with a known list of popular tools that are weaved into Labs that are performed by the student actually teach the necessary skills that are higly important now.

Recently, as of 15 OCT 2015, EC Council decided to do a major over-haul of their CEHv8 exam to v9 that was unannounced and caused a major failure rate globally. Upon complaints, they droped the $350 re-take fee down to $250, but the expense and time that student invested in the v8 material was now null and void and those students who chose to re-take the exam had to spend more funding and time to achieve a pass. That is unprofessional and a backdoor under-the-table tactic. 

CompTIA, SANS/GIAC, Mile2, Cisco, ISC2, Offensive Security (OSCP), and other vendors give out ntoifications and wanring when updates are pending and never would trash their students like EC Council has done. CEH has fallen from grace due to it's own marketing and inferior training. THere are alternative training vendors that met or out perform CEH, I suggest student looking to get into hacking seek out other vendors and stay away from EC Council! You'll only get burned!
etittel@yahoo.com
[email protected],
User Rank: Apprentice
11/9/2015 | 11:57:33 AM
Is it just me, or is there a counting problem?
The title calls out 10 certs, but I count only 9 in the slide deck:

1. SANS/GIAC GSEC
2. ISC-squared CISSP
3. ISC-squared SSCP
4. ISACA CISM
5. ISACA CISA
6. EC-Council CEH
7. EC-Council ECSA
8. CompTIA Security+
9. CWNP CWSP

As such lists go, this one ain't half bad. I've written extensively about this subject for years, and do a biannual survey of Infosec Certs for SearchSecurity over at TechTarget. I'd love to see what the author would come up with for a 10th item, just for completeness' sake.

One more thing: those worried about the cost of the SANS credentials should look into their various scholarship programs. They're running special scholarships for women in infosec right now, and a pilot program for active duty military (Air Force and Army right now, at Joint Strike Base Lewis McChord in WA state) to help them transition into infosec jobs to transition into civilian employment. Their training is terrific and their credentials top-notch, if costly, so those who are interested should inquire about assistance if money is the only thing holding them back.

HTH,

Ed Tittel www dot edtittel dot com writes on security topics for Tom's IT Pro, various TechTarget sites, GoCertify, InformIT and PearsonITCertification. Creator of the "Exam Cram" cert prep series in 1997.
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-38129
PUBLISHED: 2022-08-10
A path traversal vulnerability exists in the com.keysight.tentacle.licensing.LicenseManager.addLicenseFile() method in the Keysight Sensor Management Server (SMS). This allows an unauthenticated remote attacker to upload arbitrary files to the SMS host.
CVE-2022-38130
PUBLISHED: 2022-08-10
The com.keysight.tentacle.config.ResourceManager.smsRestoreDatabaseZip() method is used to restore the HSQLDB database used in SMS. It takes the path of the zipped database file as the single parameter. An unauthenticated, remote attacker can specify an UNC path for the database file (i.e., \\<at...
CVE-2022-37024
PUBLISHED: 2022-08-10
Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 2022-07-29 through 2022-07-30 ( 125658, 126003, 126105, and 126120) allow authenticated users to make database changes that lead to remote code execution.
CVE-2022-37003
PUBLISHED: 2022-08-10
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files.
CVE-2022-37004
PUBLISHED: 2022-08-10
The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability.