Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/5/2015
10:30 PM
100%
0%

10 Security Certifications To Boost Your Career

Earning a security credential can help you open the door to a great job. But you need to know which certification is the right one for you.
Previous
1 of 10
Next

As the market for information security talent heats up and the skills shortage continues, infosec pros who have the right combination of credentials and experience are in remarkably high demand. While certifications are not a sure bet for a job offer, prospective employers look for industry-leading credentials as one measure of qualifications and commitment to quality.

Here is a list of ten certifications, including a short description, prerequisites, exam cost, available courses, and study material links, as well as online practice test links.

In addition to the these certifications, there are several other courses and credentials that focus on specific technology areas. The key challenge for any IT security enthusiast at any point in his or her career is to identify the skills levels required (beginner to expert), and then look for reputable certifications that will bring career advancement. Fortunately, there are a lot of opportunities.

Good luck out there! 

 

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article.
View Full Bio
 

Recommended Reading:

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
infosavvy
50%
50%
infosavvy,
User Rank: Apprentice
9/7/2020 | 8:13:41 AM
yber security live online training & certification
Nice post! it is really very helpful for us. if anyone want to know the details about cyber security live online training & certification 
osetim
50%
50%
osetim,
User Rank: Apprentice
6/12/2017 | 9:47:27 AM
Re: Requesting info
My question too

 
osetim
50%
50%
osetim,
User Rank: Apprentice
6/12/2017 | 9:42:54 AM
Re: About certs
pls can you give advices on any of the certification for begginners pls

 
NaveenK856
50%
50%
NaveenK856,
User Rank: Apprentice
3/27/2017 | 6:33:59 AM
New certification for Software/Application Security Professionals.
Hack2Secure has now Come-up with its first certification on SDLC Known As SWADLP (Secure Web Application development Lifecycle Practitioner ).This certificaton can give a boost to the Security Professionals.
ClarenceR927
100%
0%
ClarenceR927,
User Rank: Strategist
2/3/2017 | 11:23:16 AM
Re: Certifications always pay off...
Agree on CEH not being worth the time.  In the last 5 years I have begun discounting the CISSP also.  I have hired two ex-military CISSPs only to find out DoD paid for a boot camp for them to get the paper. One could not have spelled "CISSP" if you spotted him the 'CIS' and the other was only marginally better. We had to let both go. I had another apply who claimed an MS and PhD from a school that has never existed who failed our background check.  I reported him but as far as I can tell nothing has been done about him. 10 years ago the CISSP meant something but apparently it no longer does.
annabear4ever
50%
50%
annabear4ever,
User Rank: Apprentice
2/3/2017 | 9:24:54 AM
About certs
I got my start in the industry as a broke college student.  I saved up for and studied for the exams myself.  I don't agree that you have to sell everything you own to get these.  Some of the certs might be on the more expensive side, but none of them require that you take a class from a vendor.  Buy a book and read it.  Download the free tools and use them.  You'll learn 50x as much downloading and using the tools for six months and reading a study guide on the side than you ever will in a week long course.  You can even borrow the books from your local library, or buy them used online (watch the versioning).  Best yet... check your local community college!  Most of them are now offering classes for computer security; they're pretty cheap and come with 16 weeks of class!
CraigF
50%
50%
CraigF,
User Rank: Apprentice
9/28/2016 | 7:43:11 PM
Re: Is it just me, or is there a counting problem?
That is because the last two were place together. ;)
Cwal463
100%
0%
Cwal463,
User Rank: Apprentice
7/28/2016 | 12:55:04 AM
Requesting info
I've recently enrolled in cooled for cybercrime but may change it it to security. I found out that college looks good on paper but it's the certifications that matter. Can any one tell me what certs I need and where I can get them on my own time without spending and arm and leg. Please start with the beginning to advanced please. Any help would be greatly appreciated it.
JHWMP01
50%
50%
JHWMP01,
User Rank: Strategist
2/21/2016 | 9:15:04 AM
Alternative Certifications
There's been discussion on the relative real use of EC Council's CEH in real world application. Although DOD 4750 lists this certification, it is by nomeans a must have. Meaning, there are alternatives that match, and in most cases, out perform this over advertized "one-stop" cert in hacking. 

First off, the 4750 is being replaced witht he newer Directive 8140 that highlight areas that certifications should match, therefore a specific certification is not going to be required. With the build up and advertizing funds that EC Council (Malaysia) has dumped into making people think they are the permiere cert, the Pentagon and other DoD/US Government entities that hired and then forced their employees to gain the CEH have found it did not provide them with the actual technical skills to perform the job. The results was a series of foreign hacking successes reported in the news. DoD is now re-evaulting with the lack of skill with CEH. 

This of course is met with vile and anger from those that may hold that particular cert, those that work in the corporate arena and know nothing of US DoD inside talk, or those that think even mentioning this is rude. 

I, however, want to get the word out. The competition is fast rising. One such competator is a company I've seen listed in the newest CompTIA Roadmap 2016 called Mile2. THey have the premiere Certified Penetration Testing Engineer course and certification that is listed as Expert by CompTIA. I would like see more discussion on certification vendors that deliver training that actually teaches the skill set, not fluff and over funding a certification that was stated to be the end-all of ethical hacking, only to end up short and cuased failures. 

Mile2 actually was the training vendor that developed CEH back in the early days after 9/11. They continued to train the most people after they devloped the CEH course for EC Council. Having personnnaly been thorugh both training platforms, I find that the direct approach Mile2 takes with a known list of popular tools that are weaved into Labs that are performed by the student actually teach the necessary skills that are higly important now.

Recently, as of 15 OCT 2015, EC Council decided to do a major over-haul of their CEHv8 exam to v9 that was unannounced and caused a major failure rate globally. Upon complaints, they droped the $350 re-take fee down to $250, but the expense and time that student invested in the v8 material was now null and void and those students who chose to re-take the exam had to spend more funding and time to achieve a pass. That is unprofessional and a backdoor under-the-table tactic. 

CompTIA, SANS/GIAC, Mile2, Cisco, ISC2, Offensive Security (OSCP), and other vendors give out ntoifications and wanring when updates are pending and never would trash their students like EC Council has done. CEH has fallen from grace due to it's own marketing and inferior training. THere are alternative training vendors that met or out perform CEH, I suggest student looking to get into hacking seek out other vendors and stay away from EC Council! You'll only get burned!
etittel@yahoo.com
100%
0%
[email protected],
User Rank: Apprentice
11/9/2015 | 11:57:33 AM
Is it just me, or is there a counting problem?
The title calls out 10 certs, but I count only 9 in the slide deck:

1. SANS/GIAC GSEC
2. ISC-squared CISSP
3. ISC-squared SSCP
4. ISACA CISM
5. ISACA CISA
6. EC-Council CEH
7. EC-Council ECSA
8. CompTIA Security+
9. CWNP CWSP

As such lists go, this one ain't half bad. I've written extensively about this subject for years, and do a biannual survey of Infosec Certs for SearchSecurity over at TechTarget. I'd love to see what the author would come up with for a 10th item, just for completeness' sake.

One more thing: those worried about the cost of the SANS credentials should look into their various scholarship programs. They're running special scholarships for women in infosec right now, and a pilot program for active duty military (Air Force and Army right now, at Joint Strike Base Lewis McChord in WA state) to help them transition into infosec jobs to transition into civilian employment. Their training is terrific and their credentials top-notch, if costly, so those who are interested should inquire about assistance if money is the only thing holding them back.

HTH,

Ed Tittel www dot edtittel dot com writes on security topics for Tom's IT Pro, various TechTarget sites, GoCertify, InformIT and PearsonITCertification. Creator of the "Exam Cram" cert prep series in 1997.
Page 1 / 3   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...