Best Professional Certification Program & Best Professional Training Program

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories. Last but certainly not least are the Professional categories.

Best Professional Certification Program

Programs are defined as professional industry groups offering certifications to IT security professionals wishing to receive educational experience and credentials. Entrants can include organizations in the industry granting certifications for the training and knowledge they provide.

Finalists

  • Information System Audit and Control Association for Certified Information Security Manager (CISM)
  • (ISC)2 for Certified Information Systems Security Professional (CISSP)
  • (ISC)2 for Certified Secure Software Lifecycle Professional (CSSLP)
  • Global Information Assurance Certification Program (GIAC) for GIAC Certified Web Application Penetration Tester (GWAPT)
  • Global Information Assurance Certification Program (GIAC) for GIAC Security Expert (GSE)

Best Professional Training Program

Programs are defined as those geared toward strengthening expertise of information security professionals via training, by an outside industry expert, on secure coding, end-user awareness and more. Entrants can include companies offering such training and which does not conclude with the winning of a particular professional certification.

Finalists

  • EC-Council for Certified Ethical Hacker (CEH)
  • (ISC)2 for (ISC)2 Information Security Education and Certification
  • MANDIANT for MANDIANT Professional Education Program
  • SANS Institute for SANS Institute
  • Secure Ninja for Secure Ninja
  • Security Innovation for TeamProfessor & TeamMentor
Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.