No business today is safe from hackers, and computer security is a concern for all business leaders.
Business leaders have become aware of the issue and are increasingly looking for profiles whose main training is "computer security". But how do recruiters choose the right candidate from among several profiles? This is where certifications come in. A certification proves a certain level of competence.
In this article, I will introduce you to the best possible certifications in the field of security.
CEH (Certified Ethical Hacker)
This certification is undoubtedly the most coveted safety certification in the professional world.
She will introduce you to an interactive session during which you will be shown how to scan, test, penetrate and secure your systems. A security administrator must know how to penetrate a network, exploit web vulnerabilities, create backdoors, etc.
The training begins with a presentation of computer security, then to practice scans and detections of vulnerabilities on different networks and computer systems; then learn how to protect yourself against these attacks.
The official training for this certification is made up of the following chapters:
- Introduction to hack ethics
- Gather information on an evaluation target
- Collect information on the network and hosts (nodes)
- Crack passwords and increase the privileges of an account
- Gather data from a network
- DDOS attack (denial of service, Denial Of Service)
- Attack on applications
- Test the security of a wifi network
- Physical security
- Hacking Linux systems
- Override the security of a network
- Perform a penetration test
For more information on CEH certification, I invite you to see the following link: Certified ethical hacker ceh
CISSP (Certified Information Systems Security Professional)
It is an international certification recognized worldwide by security experts, with the aim of validating the knowledge of experts. The CISSP certification allows you to calibrate your level of competence both in terms of technical knowledge and risk analysis and systems audit.
The certification program has ten chapters:
- Access control systems and methodologies
- Telecommunications and Network Security
- Safety management practices
- Security of application and system development
- Security Architecture and Models
- Security of operations
- Business continuity and disaster recovery plan
- Law, investigations and ethics
- Physical security
For more details, visit the following site: http://www.isc2.org/cissp/default.aspx
CISM: (certificate for security managers)
This certification is of American origin and issued by ISACA (the Association for Audit and Control of Computer Systems), and mainly targets the population of Information Systems Security Managers, but also that of auditors / consultants in security, eager to demonstrate their experience and skills in the matter.
The certifications sanction both the success of the exam (200 multiple-choice questions in 4 hours) and the validation of five years of experience in the area of expertise, IT audit or security.
For more information: http://www.isaca.org/Certification/CISM-Certified-Information-Security-Manager/Pages/default.aspx
CHFI (Computer Hacking Forensic Investigator)
This training will give you the necessary qualifications to identify the traces left during the intrusion of a computer system by a third party and to correctly collect the evidence necessary for legal proceedings. The use of many essential tools will be taught during this training: software, hardware and specific techniques.
This training is suitable if you or your business needs the knowledge to identify, track down and judicially prosecute cyber criminals.
For more information, see the official website: https://www.eccouncil.org/programs/computer-hacking-forensic-investigator-chfi-fr/
The "Lead Auditor ISO / IEC 27001" certification certifies that the certified person has:
- Knowledge of the requirements of the ISO / IEC 27001 Standard.
- The know-how and personal qualities necessary to conduct the audit of a Management System, in accordance with the ISO 19011 standard.
The objective of this training is to acquire the necessary knowledge in order to be certified "Audit manager"Or"Information Security Management System auditor"and check its compliance with the ISO / IEC 27001 Standard.
For more information, I invite you to visit the official training website: http://www.lsti-certification.fr