Certifications
Most important cyber security certifications available in the market that will help you to succeed in any cyber security role.
Certified Information Systems Security Professional (CISSP)
CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)². As of January 2022 there are 152,632 (ISC)² members holding the CISSP certification
International Information Systems Security Certification Consortium, (ISC)2
Certified Information Security Management (CISM)
ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management.
It is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager.
Information Systems Audit and Control Association, ISACA
Certified Cloud Security Professional (CCSP)
The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
International Information Systems Security Certification Consortium, (ISC)2
Security+
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
Computing and Technology Industry Association, CompTIA
Certified Ethical Hacker (CEH)
Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
The International Council of E-Commerce Consultants, EC-Council
GIAC Security Essentials (GSEC)
The GIAC Security Essentials (GSEC) certification validates a practitioner’s knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.
Global Information Assurance Certification, GIAC
Systems Security Certified Practitioner (SSCP)
SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².
International Information Systems Security Certification Consortium, (ISC)2
CompTIA Advanced Security Practitioner (CASP+)
CASP+ is a certification for technical professionals who wish to remain immersed in technology, as opposed to strictly managing.
It validates advanced-level competency in the following areas:
Risk management, enterprise security operations and architecture
Research and collaboration
Integration of enterprise security
Computing and Technology Industry Association, CompTIA
GIAC Certified Incident Handler (GCIH)
The GIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
Global Information Assurance Certification, GIAC
GIAC Offensive Security Certified Professional (OSCP) Incident Handler (GCIH)
The OSCP is a hands-on penetration testing certification, requiring holders to successfully attack and penetrate various live machines in a safe lab environment. It is considered more technical than other ethical hacking certifications and is one of the few certifications that requires evidence of practical penetration testing skills.
Offensive Security
Computer Hacking Forensic Investigator (CHFI)
CHFI is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics.
The International Council of E-Commerce Consultants, EC-Council
Educational videos available for our WeCyberYou! community
Articles & Tips…
Learn more about this amazing field and how to become a recognised professional in this growing industry.
Ultimate Career Guide Part 2
Cyber Security is in high demand, and there are plenty of job opportunities to choose from in this exciting industry. With salaries often several times higher than most average IT professionals, being a cyber security professional could be a great career of your choice.
Ultimate Career Guide Part 1
Cyber Security is in high demand, and there are plenty of job opportunities to choose from in this exciting industry. With salaries often several times higher than most average IT professionals, being a cyber security professional could be a great career of your choice.
Pathways To Learn Cyber Security
If you aspire to become a cyber security professional or are anxious about what the career can offer you in the future, now is the best time to start researching.
Understanding Cyber Security Part 1
The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.
Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.
I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.
Understanding Cyber Security Part 2
The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.
Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.
I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.
Understanding Cyber Security Part 3
The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.
Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.
I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.
Did you know 55,000 devices are compromised by ransomware each month globally?
With over 20 years’ experience specialising in cyber security, we have developed courses to educate and help you safeguard your privacy and stay safe from cybercrime. Get the latest in cyber security news, educational videos, and updates.