Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Valid certifications

Posted on 2012-03-13
2
Medium Priority
?
430 Views
Last Modified: 2016-03-23
I wanted to know what other valid certifications are out there besides MCITP, VMware, Cisco?  I'm looking to probably go more the security path and I wanted to know what other certifications there are out there besides the ones mentioned?  I'd like to stay within the networking/security field, just would like to be in  a more "professional" field/company.

Thanks for your thoughts.
0
Comment
Question by:vulture71
2 Comments
 
LVL 96

Expert Comment

by:Lee W, MVP
ID: 37718297
For security check out CISSP.  For other certs, check out the dozens or more that you can take an exam in at www.prometric.com
0
 
LVL 124

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 37719153
ISC2's Certified Secure Software Lifecycle Professional (CSSLP) certification
Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Ethical Hacker (CEH)
GIAC's Certified Intrusion Analyst certification
Certified Penetration Tester (CPT)
Certified Expert Penetration Tester (CEPT)
Certified Wireless Security Professional (CWSP)
GIAC Certified Windows Security Administrator (GCWN)
CheckPoint Certified Security Administrator
CheckPoint Certified Security Expert.
CyberSecurity Forensic Analyst and the EC-Council/Certified Hacking Forensic Investigator (CHFI) certifications

Checkout your local IT Training Centre for Courses.
0

Featured Post

WatchGuard Case Study: Museum of Flight

“With limited money and limited staffing, we didn’t have a lot of choices in terms of what we could do to bring efficiency. WatchGuard played a central part in changing that.” To provide strong, secure Wi-Fi access within the museum, Hunter chose to deploy WatchGuard’s AP120 APs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
What we learned in Webroot's webinar on multi-vector protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question