SlideShare a Scribd company logo
Looking to upskill your knowledge and climb up the Cyber Security ladder? Confused by the industry certifications landscape and trying to decide
which one is right for you? Check out our handy guide to Cyber Security Professional Certifications currently available in Scotland (as of June 2019).
A GUIDE TO CYBER SECURITY
CAREER DEVELOPMENT
Cyber
Security
Analyst
Cyber
Security
Architect
Cyber
Security
Engineer
Cyber
Security
Instructor
Cyber
Security
Manager
Cyber
Security
Project
Manager
Cyber
Security
Researcher
Cyber
Security
Technician
DevSecOps
Developer
Forensic
Computer
Analyst
Incident
Responder
Penetration
Tester
Risk
Adviser
Security and
Compliance
Auditor
Security
Consultant
EXPERT
(5+ YEARS’
EXPERIENCE)
•	CASP+
•	CREST
Certified Threat
Intelligence
Manager
•	(ISC)2
CISSP
•	CASP+
•	CCIE Security
•	(ISC)2
CISSP
•	CASP+
•	CCIE Security
•	(ISC)2
CISSP
•	CASP+
•	(ISC)2
CISSP
•	ISACA CISA
•	ISACA CISM
•	EC-Council
CCISO
•	(ISC)2
CISSP
•	ISACA CGEIT
•	ISACA CISM
•	CASP+
•	(ISC)2
CISSP
•	CREST Certified
Malware Reverse
Engineer
•	(ISC)2
CISSP
•	GCTI
•	CASP+
•	(ISC)2
CISSP
•	(ISC)2
CISSP •	GCTI
•	GNFA
•	CREST Certified
Network
Intrusion Analyst
•	CREST Certified
Incident
Manager
•	CREST Certified
Simulated Attack
Manager
•	CASP+
•	ISACA CISA
•	ISACA CISM
•	(ISC)2
CISSP
•	ISACA CISA
•	(ISC)2
CISSP
•	ISACA CISA
•	ISACA CISM
ADVANCED
(3-5 YEARS’
EX-PERIENCE)
•	CREST
Registered
Threat
Intelligence
Analyst
•	CREST
Registered
Technical
Security
Architect
•	CCNP Security
•	CCNP Enterprise •	CCNP Security •	GSLC
•	PMI PMP
•	GCPM
•	PMI PMP
•	GREM
•	(ISC)2
CSSLP
•	CCNP Enterprise •	(ISC)2
CSSLP •	GASF •	CREST
Registered
Intrusion Analyst
•	CREST Certified
Infrastructure
Tester
•	CREST Certified
Simulated Attack
Specialist
•	ISACA CRISC
•	ISACA CRISC •	GCCC
•	ISO 27001
Auditor
•	CCNP Security
•	ISACA CRISC
INTERMEDIATE
(2-3 YEARS’
EXPERIENCE)
•	CompTIA CySA+
•	CREST
Practitioner
Threat
Intelligence
Analyst
•	Splunk Core
Certified Power
User
•	AWS Associate –
Solutions
Architect
•	Microsoft Azure
Administrator
Associate
•	PRINCE2
Practitioner
•	AWS Associate –
Solutions
Architect
•	Microsoft Azure
Administrator
Associate
•	CBCI
•	CompTIA CySA+
•	CompTIA
PenTest+
•	Cloud Security
Alliance CCSK
•	PRINCE2
Practitioner
•	CompTIA
Cloud+
•	PRINCE2
Practitioner
•	CompTIA
Cloud+
•	AWS Associate –
Solutions
Architect
•	MCSA
•	AWS Associate
– SysOps
Administrator
•	MCSA
•	GSSP
•	Scrum Alliance
CSM
•	GCFA •	CertNexus CFR
•	CREST
Practitioner
Intrusion Analyst
•	GCIA
•	CompTIA
PenTest+
•	CREST
Registered
Penetration
Tester
•	OSCP
•	CBCI
•	GDPR
Practitioner
•	ISO 27001
Practitioner
•	Cloud Security
Alliance CCSK
•	GDPR
Practitioner
•	ISO 27001
Practitioner
•	CBCI
•	CompTIA CySA+
•	CompTIA
PenTest+
•	PRINCE2
Practitioner
•	AWS Associate
– Solutions
Architect
FOUNDATION
(1-2 YEARS’
EXPERIENCE)
•	CCNA Cyber
Ops
•	CompTIA
Network+
•	CompTIA
Security+
•	GSEC
•	Splunk Core
Certified User
•	CCNA
•	CompTIA
Security+
•	CCNA
•	CompTIA
Security+
•	CompTIA
Server+
•	EC-Council CND
•	CCNA
•	CompTIA
Security+
•	CompTIA CTT+
•	CompTIA
Network+
•	CompTIA
Security+
•	EC-Council CEH
•	ITIL Foundation
•	CompTIA
Project+
•	CompTIA
Security+
•	CompTIA Linux+
•	CompTIA
Security+
•	LPIC-1
•	CompTIA
Network+
•	CompTIA
Security+
•	(ISC)2
SSCP
•	ITIL Foundation
•	CompTIA Linux+
•	GWEB
•	LPIC-1
•	CompTIA
Security+
•	EC-Council CHFI
•	GCFE
•	CompTIA
Security+
•	GCIH
•	(ISC)2
SSCP
•	CompTIA
Network+
•	CompTIA
Security+
•	CREST
Practitioner
Security Analyst
•	EC-Council CEH
•	CompTIA Linux+
•	LPIC-1
•	BCS CISMP
•	CompTIA
Security+
•	GSEC
•	(ISC)2
CAP
•	ISO 27001
Foundation
•	CompTIA
Security+
•	GSNA
•	(ISC)2
CAP
•	ISO 27001
Foundation
•	CCNA
•	CompTIA
Security+
•	EC-Council CEH
•	GSEC
EXPERIENCE
LEVEL
APM Group
FOUNDATION
•	ISO 27001 Foundation
INTERMEDIATE
•	GDPR Practitioner
•	ISO 27001 Practitioner
ADVANCED
•	ISO 27001 Auditor
Amazon Web Services
INTERMEDIATE
•	AWS Associate – Solutions Architect
•	AWS Associate – SysOps Administrator
Axelos
FOUNDATION
•	ITIL Foundation
INTERMEDIATE
•	PRINCE2 Practitioner
Business Continuity Institute (BCI)
INTERMEDIATE
•	CBCI: Certificate of the Business Continuity Institute
British Computer Society (BCS)
FOUNDATION
•	CISMP: Certificate of Information Security
Management Principles
Cisco Systems
FOUNDATION
•	CCNA: Cisco Certified Network Associate
•	CCNA Cyber Ops: Cisco Certified Network Associate
Cyber Operations
ADVANCED
•	CCNP Enterprise: Cisco Certified Network
Professional Enterprise
•	CCNP Security: Cisco Certified Network
Professional Security
EXPERT
•	CCIE Security: Cisco Certified Internetwork
Expert Security
CertNexus
INTERMEDIATE
•	CFR: CyberSec First Responder
CompTIA
FOUNDATION
•	CTT+: Certified Technical Trainer
•	Linux+
•	Network+
•	Project+
•	Security+
•	Server+
INTERMEDIATE
•	Cloud+
•	CySA+: Cyber Security Analyst
•	PenTest+: Penetration Tester
EXPERT
•	CASP+: CompTIA Advanced Security Practitioner
Cloud Security Alliance
INTERMEDIATE
•	CCSK: Certificate of Cloud Security Knowledge
CREST
FOUNDATION
•	Practitioner Security Analyst
INTERMEDIATE
•	Practitioner Threat Intelligence Analyst
•	Practitioner Intrusion Analyst
•	Registered Penetration Tester
ADVANCED
•	Registered Threat Intelligence Analyst
•	Registered Technical Security Architect
•	Registered Intrusion Analyst
•	Certified Infrastructure Tester
•	Certified Simulated Attack Specialist
EXPERT
•	Certified Threat Intelligence Manager
•	Certified Malware Reverse Engineer
•	Certified Network Intrusion Analyst
•	Certified Incident Manager
•	Certified Simulated Attack Manager
EC-Council
FOUNDATION
•	CEH: Certified Ethical Hacker
•	CHFI: Computer Hacking Forensics Investigator
•	CND: Certified Network Defender
EXPERT
•	CCISO: Certified Chief Information Security Officer
GIAC
FOUNDATION
•	GCFE: GIAC Certified Forensics Examiner
•	GCIH: GIAC Certified Incident Handler
•	GSNA: GIAC Systems and Network Auditors
•	GSEC: GIAC Security Essentials Certification
•	GWEB: GIAC Certified Web Application Defender
INTERMEDIATE
•	GCFA: GIAC Certified Forensic Analyst
•	GCIA: GIAC Certified Intrusion Analyst
•	GSSP: GIAC Secure Software Programmer
ADVANCED
•	GASF: GIAC Advanced Smartphone Forensics
•	GCCC: GIAC Critical Controls Certification
•	GCPM: GIAC Certified Project Manager Certification
•	GSLC: GIAC Security Leadership
•	GREM: GIAC Reverse Engineering Malware
EXPERT
•	GCTI: GIAC Cyber Threat Intelligence
•	GNFA: GIAC Network Forensic Analyst
ISACA
ADVANCED
•	CRISC: Certified in Risk and Information Systems
Control
EXPERT
•	CGEIT: Certified in the Governance of Enterprise IT
•	CISA: Certified Information Systems Auditor
•	CISM: Certified Information Security Manager
(ISC)2
FOUNDATION
•	CAP: Security Assessment and Authorisation
Certification
•	SSCP: Systems Security Certified Practitioner
ADVANCED
•	CSSLP: Certified Secure Software Lifecycle
Professional
EXPERT
•	CISSP: Certified Information Systems Security
Professional
Linux Professional Institute
FOUNDATION
•	LPIC-1: Systems Administrator
Microsoft
INTERMEDIATE
•	Microsoft Azure Administrator Associate
•	MCSA: Microsoft Certified Solutions Associate
Offensive Security
INTERMEDIATE
•	OSCP: Offensive Security Certified Professional
PMI
ADVANCED
•	PMP: Project Management Professional
Scrum Alliance
INTERMEDIATE
•	CSM: Certified ScrumMaster
Splunk
FOUNDATION
•	Splunk Core Certified User
INTERMEDIATE
•	Splunk Core Certified Power User

More Related Content

What's hot

Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
MITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdfMITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdf
ReZa AdineH
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
MITRE ATT&CK
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE - ATT&CKcon
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
ShivamSharma909
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
slametarrokhim1
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
Michael Furman
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Priyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
Sunny Neo
 

What's hot (20)

Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
MITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdfMITRE-Module 2 Slides.pdf
MITRE-Module 2 Slides.pdf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 

Similar to Cyber security career development paths

Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
Prasanna V
 
Jcv course contents
Jcv course contentsJcv course contents
Jcv course contents
Vasanti Dutta
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
Global Knowledge Training
 
Best Cybersecurity Certification Courses [2022]-vinsys
Best Cybersecurity Certification Courses [2022]-vinsysBest Cybersecurity Certification Courses [2022]-vinsys
Best Cybersecurity Certification Courses [2022]-vinsys
vinsys2
 
Level up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdfLevel up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdf
Brandon DeVault
 
Digital trust - recruitment presentation
Digital trust - recruitment presentationDigital trust - recruitment presentation
Digital trust - recruitment presentation
JennyBothn
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
infosec train
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
Ahmad Sharaf
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
SaraPia5
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Jason Mashak
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 
Best Professional Courses After Graduation - Get Started Now
Best Professional Courses After Graduation - Get Started NowBest Professional Courses After Graduation - Get Started Now
Best Professional Courses After Graduation - Get Started Now
Network Kings
 
Sertifikasi IS/IT Dunia 2013
Sertifikasi IS/IT Dunia 2013Sertifikasi IS/IT Dunia 2013
Sertifikasi IS/IT Dunia 2013Ratzman III
 
Secure DevOps: A Puma's Tail
Secure DevOps: A Puma's TailSecure DevOps: A Puma's Tail
Secure DevOps: A Puma's Tail
Puma Security, LLC
 
What's Next : A Trillion Event Logs, A Million Security Threat
What's Next : A Trillion Event  Logs, A Million Security ThreatWhat's Next : A Trillion Event  Logs, A Million Security Threat
What's Next : A Trillion Event Logs, A Million Security Threat
Alan Yau Ti Dun
 
Cisco security training
Cisco security trainingCisco security training
Cisco security training
qosnetworking
 

Similar to Cyber security career development paths (20)

Chandu cyber security career path
Chandu cyber security career pathChandu cyber security career path
Chandu cyber security career path
 
Cyber Security_Chintan Patel
Cyber Security_Chintan PatelCyber Security_Chintan Patel
Cyber Security_Chintan Patel
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
CGS - Security Training
CGS - Security TrainingCGS - Security Training
CGS - Security Training
 
Jcv course contents
Jcv course contentsJcv course contents
Jcv course contents
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Best Cybersecurity Certification Courses [2022]-vinsys
Best Cybersecurity Certification Courses [2022]-vinsysBest Cybersecurity Certification Courses [2022]-vinsys
Best Cybersecurity Certification Courses [2022]-vinsys
 
Level up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdfLevel up your SOC - Guide for a Resilient Education Program.pdf
Level up your SOC - Guide for a Resilient Education Program.pdf
 
Digital trust - recruitment presentation
Digital trust - recruitment presentationDigital trust - recruitment presentation
Digital trust - recruitment presentation
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Ccna security
Ccna securityCcna security
Ccna security
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Best Professional Courses After Graduation - Get Started Now
Best Professional Courses After Graduation - Get Started NowBest Professional Courses After Graduation - Get Started Now
Best Professional Courses After Graduation - Get Started Now
 
Sertifikasi IS/IT Dunia 2013
Sertifikasi IS/IT Dunia 2013Sertifikasi IS/IT Dunia 2013
Sertifikasi IS/IT Dunia 2013
 
Secure DevOps: A Puma's Tail
Secure DevOps: A Puma's TailSecure DevOps: A Puma's Tail
Secure DevOps: A Puma's Tail
 
What's Next : A Trillion Event Logs, A Million Security Threat
What's Next : A Trillion Event  Logs, A Million Security ThreatWhat's Next : A Trillion Event  Logs, A Million Security Threat
What's Next : A Trillion Event Logs, A Million Security Threat
 
Cisco security training
Cisco security trainingCisco security training
Cisco security training
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Cyber security career development paths

  • 1. Looking to upskill your knowledge and climb up the Cyber Security ladder? Confused by the industry certifications landscape and trying to decide which one is right for you? Check out our handy guide to Cyber Security Professional Certifications currently available in Scotland (as of June 2019). A GUIDE TO CYBER SECURITY CAREER DEVELOPMENT Cyber Security Analyst Cyber Security Architect Cyber Security Engineer Cyber Security Instructor Cyber Security Manager Cyber Security Project Manager Cyber Security Researcher Cyber Security Technician DevSecOps Developer Forensic Computer Analyst Incident Responder Penetration Tester Risk Adviser Security and Compliance Auditor Security Consultant EXPERT (5+ YEARS’ EXPERIENCE) • CASP+ • CREST Certified Threat Intelligence Manager • (ISC)2 CISSP • CASP+ • CCIE Security • (ISC)2 CISSP • CASP+ • CCIE Security • (ISC)2 CISSP • CASP+ • (ISC)2 CISSP • ISACA CISA • ISACA CISM • EC-Council CCISO • (ISC)2 CISSP • ISACA CGEIT • ISACA CISM • CASP+ • (ISC)2 CISSP • CREST Certified Malware Reverse Engineer • (ISC)2 CISSP • GCTI • CASP+ • (ISC)2 CISSP • (ISC)2 CISSP • GCTI • GNFA • CREST Certified Network Intrusion Analyst • CREST Certified Incident Manager • CREST Certified Simulated Attack Manager • CASP+ • ISACA CISA • ISACA CISM • (ISC)2 CISSP • ISACA CISA • (ISC)2 CISSP • ISACA CISA • ISACA CISM ADVANCED (3-5 YEARS’ EX-PERIENCE) • CREST Registered Threat Intelligence Analyst • CREST Registered Technical Security Architect • CCNP Security • CCNP Enterprise • CCNP Security • GSLC • PMI PMP • GCPM • PMI PMP • GREM • (ISC)2 CSSLP • CCNP Enterprise • (ISC)2 CSSLP • GASF • CREST Registered Intrusion Analyst • CREST Certified Infrastructure Tester • CREST Certified Simulated Attack Specialist • ISACA CRISC • ISACA CRISC • GCCC • ISO 27001 Auditor • CCNP Security • ISACA CRISC INTERMEDIATE (2-3 YEARS’ EXPERIENCE) • CompTIA CySA+ • CREST Practitioner Threat Intelligence Analyst • Splunk Core Certified Power User • AWS Associate – Solutions Architect • Microsoft Azure Administrator Associate • PRINCE2 Practitioner • AWS Associate – Solutions Architect • Microsoft Azure Administrator Associate • CBCI • CompTIA CySA+ • CompTIA PenTest+ • Cloud Security Alliance CCSK • PRINCE2 Practitioner • CompTIA Cloud+ • PRINCE2 Practitioner • CompTIA Cloud+ • AWS Associate – Solutions Architect • MCSA • AWS Associate – SysOps Administrator • MCSA • GSSP • Scrum Alliance CSM • GCFA • CertNexus CFR • CREST Practitioner Intrusion Analyst • GCIA • CompTIA PenTest+ • CREST Registered Penetration Tester • OSCP • CBCI • GDPR Practitioner • ISO 27001 Practitioner • Cloud Security Alliance CCSK • GDPR Practitioner • ISO 27001 Practitioner • CBCI • CompTIA CySA+ • CompTIA PenTest+ • PRINCE2 Practitioner • AWS Associate – Solutions Architect FOUNDATION (1-2 YEARS’ EXPERIENCE) • CCNA Cyber Ops • CompTIA Network+ • CompTIA Security+ • GSEC • Splunk Core Certified User • CCNA • CompTIA Security+ • CCNA • CompTIA Security+ • CompTIA Server+ • EC-Council CND • CCNA • CompTIA Security+ • CompTIA CTT+ • CompTIA Network+ • CompTIA Security+ • EC-Council CEH • ITIL Foundation • CompTIA Project+ • CompTIA Security+ • CompTIA Linux+ • CompTIA Security+ • LPIC-1 • CompTIA Network+ • CompTIA Security+ • (ISC)2 SSCP • ITIL Foundation • CompTIA Linux+ • GWEB • LPIC-1 • CompTIA Security+ • EC-Council CHFI • GCFE • CompTIA Security+ • GCIH • (ISC)2 SSCP • CompTIA Network+ • CompTIA Security+ • CREST Practitioner Security Analyst • EC-Council CEH • CompTIA Linux+ • LPIC-1 • BCS CISMP • CompTIA Security+ • GSEC • (ISC)2 CAP • ISO 27001 Foundation • CompTIA Security+ • GSNA • (ISC)2 CAP • ISO 27001 Foundation • CCNA • CompTIA Security+ • EC-Council CEH • GSEC EXPERIENCE LEVEL
  • 2. APM Group FOUNDATION • ISO 27001 Foundation INTERMEDIATE • GDPR Practitioner • ISO 27001 Practitioner ADVANCED • ISO 27001 Auditor Amazon Web Services INTERMEDIATE • AWS Associate – Solutions Architect • AWS Associate – SysOps Administrator Axelos FOUNDATION • ITIL Foundation INTERMEDIATE • PRINCE2 Practitioner Business Continuity Institute (BCI) INTERMEDIATE • CBCI: Certificate of the Business Continuity Institute British Computer Society (BCS) FOUNDATION • CISMP: Certificate of Information Security Management Principles Cisco Systems FOUNDATION • CCNA: Cisco Certified Network Associate • CCNA Cyber Ops: Cisco Certified Network Associate Cyber Operations ADVANCED • CCNP Enterprise: Cisco Certified Network Professional Enterprise • CCNP Security: Cisco Certified Network Professional Security EXPERT • CCIE Security: Cisco Certified Internetwork Expert Security CertNexus INTERMEDIATE • CFR: CyberSec First Responder CompTIA FOUNDATION • CTT+: Certified Technical Trainer • Linux+ • Network+ • Project+ • Security+ • Server+ INTERMEDIATE • Cloud+ • CySA+: Cyber Security Analyst • PenTest+: Penetration Tester EXPERT • CASP+: CompTIA Advanced Security Practitioner Cloud Security Alliance INTERMEDIATE • CCSK: Certificate of Cloud Security Knowledge CREST FOUNDATION • Practitioner Security Analyst INTERMEDIATE • Practitioner Threat Intelligence Analyst • Practitioner Intrusion Analyst • Registered Penetration Tester ADVANCED • Registered Threat Intelligence Analyst • Registered Technical Security Architect • Registered Intrusion Analyst • Certified Infrastructure Tester • Certified Simulated Attack Specialist EXPERT • Certified Threat Intelligence Manager • Certified Malware Reverse Engineer • Certified Network Intrusion Analyst • Certified Incident Manager • Certified Simulated Attack Manager EC-Council FOUNDATION • CEH: Certified Ethical Hacker • CHFI: Computer Hacking Forensics Investigator • CND: Certified Network Defender EXPERT • CCISO: Certified Chief Information Security Officer GIAC FOUNDATION • GCFE: GIAC Certified Forensics Examiner • GCIH: GIAC Certified Incident Handler • GSNA: GIAC Systems and Network Auditors • GSEC: GIAC Security Essentials Certification • GWEB: GIAC Certified Web Application Defender INTERMEDIATE • GCFA: GIAC Certified Forensic Analyst • GCIA: GIAC Certified Intrusion Analyst • GSSP: GIAC Secure Software Programmer ADVANCED • GASF: GIAC Advanced Smartphone Forensics • GCCC: GIAC Critical Controls Certification • GCPM: GIAC Certified Project Manager Certification • GSLC: GIAC Security Leadership • GREM: GIAC Reverse Engineering Malware EXPERT • GCTI: GIAC Cyber Threat Intelligence • GNFA: GIAC Network Forensic Analyst ISACA ADVANCED • CRISC: Certified in Risk and Information Systems Control EXPERT • CGEIT: Certified in the Governance of Enterprise IT • CISA: Certified Information Systems Auditor • CISM: Certified Information Security Manager (ISC)2 FOUNDATION • CAP: Security Assessment and Authorisation Certification • SSCP: Systems Security Certified Practitioner ADVANCED • CSSLP: Certified Secure Software Lifecycle Professional EXPERT • CISSP: Certified Information Systems Security Professional Linux Professional Institute FOUNDATION • LPIC-1: Systems Administrator Microsoft INTERMEDIATE • Microsoft Azure Administrator Associate • MCSA: Microsoft Certified Solutions Associate Offensive Security INTERMEDIATE • OSCP: Offensive Security Certified Professional PMI ADVANCED • PMP: Project Management Professional Scrum Alliance INTERMEDIATE • CSM: Certified ScrumMaster Splunk FOUNDATION • Splunk Core Certified User INTERMEDIATE • Splunk Core Certified Power User