EC-Council
CompTIA
ISACA
ISC2
GAQM
Offensive Security
Edit Content
Certified Chief Information Security Officer
CCSE – Certified Cloud Security Engineer
CPENT-Certified Penetration Testing Professional
EC-Council Disaster Recovery Professional
EC-Council Certified Security Specialist (ECSS)
ECSA Certification | EC-Council Certified Security Analyst
ECIH Certification | EC-Council Certified Incident Handler
ECES Certification: EC-Council Certified Encryption Specialist
CTIA- Certified Threat Intelligence Analyst
CSCU-Certified Secure Computer User Certification
Certified CHFI Computer Hacking Forensic Investigator-DFIR
Certified Application Security Engineer (CASE) .NET
CASE JAVA: Certified Application Security Engineer JAVA
EC-Council CEH – Certified Ethical Hacker (CEH v11/ v12) / PT
Certified Network Defender CND (312-38) Certification
Certified Ethical Hacker Practical (CEH v12)
Edit Content
Certified CompTIA Server+ Certification
Certified CompTIA IT Fundamentals Certification
Certified CompTIA A+ Certification
Certified CompTIA CySA+ Certification
Certified CompTIA DATA+ Certification
Certified CompTIA Linux+ Certification
Certified CompTIA CTT+
Certified CompTIA Security+ Certification
Certified CompTIA CASP+
Edit Content
ISACA CRISC: Certified in Risk and Information Systems Control
ISACA CISA: Certified Information Systems Auditor
ISACA CSX-P: Cyber security Practitioner Certification
ISACA CGEIT: Certified in the Governance of Enterprise IT
ISACA CISM: Certified Information Security Manager
Edit Content
ISC²: CCSP – Certified Cloud Security Professional
ISC²: CISSP – Certified Information Systems Security Professional
Edit Content
GAQM CISO: Certified Information Security Officer
GAQM CPEH – Certified Professional Ethical Hacker
GAQM CFA – Certified Forensic Analyst
GAQM CPT – Certified Penetration Tester
GAQM CISST – Certified Information Systems Security Tester
GAQM CISSM: Certified Information Systems Security Manager
GAQM CISP – Certified Information Security Professional
Edit Content
WEB-300: Advanced Web Attacks and Exploitation
PEN-200: Penetration Testing with Kali Linux