Home » IT Qualifications » Cyber Security Qualifications

Cyber Security

CISSP

Certified Information Systems Security Professional (CISSP)

The Certified Information Systems Security Professional (CISSP) qualification is a globally recognized certification for information security professionals. It is offered by the International Information System Security Certification Consortium, and is one of the most widely recognized certificates in the field of information security.

The course is designed to validate the knowledge and skills required for a career in information security. The certification covers a wide range of topics related to security, including security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.

To become a CISSP certified professional, candidates must have at least five years of experience in at least two of the eight domains covered by the certification, as well as pass the CISSP certification exam. The exam consists of 250 multiple-choice questions and covers all eight domains of the CISSP Common Body of Knowledge (CBK).

Earning a CISSP certification demonstrates that an individual has the knowledge and skills required to design, implement, and manage a comprehensive information security program, and can provide valuable expertise in protecting organizations against threats to their information and systems.

Job Roles: IT Security Analyst, IT Security Engineer, DevSecOps, IT Security Consultant, IT Security Manager.

CEH

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) qualification is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council). It is designed to validate the skills and knowledge of individuals in the field of ethical hacking and information security.

Ethical hackers, also known as white hat hackers, are professionals who use their technical skills and knowledge to identify vulnerabilities and weaknesses in computer systems and networks. They perform hacking activities with the permission of the system owner to help identify potential security risks and protect against unauthorized access or malicious attacks.

The CEH certification program provides comprehensive training in various aspects of ethical hacking, including network scanning, system vulnerabilities, malware threats, social engineering techniques, wireless network security, web application security, and more. It equips individuals with the tools and techniques used by hackers so they can better understand potential threats and take proactive measures to secure their organization's systems and networks.

To obtain the CEH certification, candidates need to pass an exam, which covers a wide range of topics related to ethical hacking. The exam tests their knowledge of hacking techniques, countermeasures, and ethical considerations. Additionally, candidates must adhere to a code of ethics outlined by the EC-Council, which emphasizes responsible and lawful use of their skills.

Job Roles: Ethical Hacker / Penetration Tester, IT Security Consultant, IT Security Engineer

ISACA

Certified Information Security Manager (CISM)

The Certified Information Security Manager (CISM) qualification is a professional certification provided by ISACA (formerly known as the Information Systems Audit and Control Association). CISM is a globally recognized certification specifically designed for information security management.

CISM focuses on the governance, risk management, incident management and strategic aspects of information security. It is intended for professionals who design and manage an enterprise's information security program. CISM certification holders are equipped with the knowledge and skills necessary to establish and manage an effective security program aligned with an organization's business objectives.

To gain the CISM certificate, candidates must meet specific experience requirements, pass the CISM exam, adhere to the ISACA Code of Professional Ethics, and commit to ongoing professional education through continuing professional education (CPE) credits.

The qualification demonstrates a candidate's expertise in designing and managing security programs, as well as their commitment to maintaining high professional standards.

Job Roles: Information Security Manager, IT auditors and IT Security Consultants

Certified Information Systems Auditor (CISA)

The Certified Information Systems Auditor (CISA) qualification is a globally recognized certification provided by ISACA (Information Systems Audit and Control Association). The CISA certification is specifically designed for professionals involved in the auditing, governance, systems acquisition, operations, control, protection of information assets and security of information systems.

To earn the CISA certification, candidates must meet specific experience requirements, pass the CISA exam, adhere to the ISACA Code of Professional Ethics, and commit to ongoing professional education through continuing professional education (CPE) credits.

Job Roles: IT Auditor, Compliance Officer, Security Auditor

CRISC - Certified in Risk and Information Systems Control

The CRISC (Certified in Risk and Information Systems Control) qualification is a professional certification provided by ISACA (Information Systems Audit and Control Association). CRISC is designed for professionals who manage enterprise risk and ensure the effectiveness of information systems controls.

The CRISC certification validates an individual's expertise in identifying and managing IT and business risk identification, assessment, response, mitigation, monitoring and reporting implementing and maintaining information system controls, and aligning risk management with business objectives.

To obtain the CRISC certification, candidates must meet specific experience requirements, pass the CRISC exam, adhere to the ISACA Code of Professional Ethics, and commit to ongoing professional education through continuing professional education.

Job Roles: IT Risk Managers, IT Auditors, Information Security Managers

Latest IT Jobs

Linux Red Hat Engineer

Surrey / £55,000

This is an exciting opportunity for an experienced Linux Red Hat Administrator to take a newly created position with a leading IT consultancy in Surrey. This position pays £55,000 and is based in the Dorking area offering hybrid working options.   To be considered for this position you will have previous experience with Red Hat...

Read more

IT Support Engineer

London - Central / £34,000

This is an exciting opportunity for an IT Support Analyst to join an MSP in Central London. This position pays £34,000 and is a hybrid work environment split between Central London (Bond Street & Green Park) and Work From Home.   To be considered for this IT Support Engineer position you will have excellent customer...

Read more

Graduate Cyber Security Analyst

Berkshire / £40,000

A multinational business based in the Reading area is looking for an articulate Graduate with a passion for Cyber Security to join its team. This company embrace flexibility, enabling the chosen candidate to work remotely 4 days per week. In this business-critical role, you will support the Information Security team in implementing and maintaining a...

Read more
View all live jobs

IT Salary Guide 2024

With the well documented shortage of IT skills putting pressure on businesses across the UK, demand for Information Technology skills is at an all-time high.

Stay informed with the very latest IT salary data to maintain and attract key talent. Explore salaries for IT roles in your region.

IT Salary Guide

finance professionals

Looking to hire?

More than 20,000 people register with the Ashdown Group every month. We have access to hundreds of high-calibre professionals living within an easy commute of your business.