Logo

CISSP

The CISSP covers the fundamental elements of the entire cybersecurity field – from security and risk management to communication and network security to security testing and operations. 

CEH (Certified Ethical Hacker)

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

CCNA

The CCNA certification validates your skills and knowledge in network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability

CISA

CISA is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems. CISA candidates must have a minimum of five years of professional experience in information systems auditing, control, or security.

GREM

The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code.
GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.

GSEC

The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.

GCFA

GCFA holders have demonstrated the knowledge, skills and ability to conduct formal incident investigations and handle advanced incident handling scenarios, including interal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers, and complex digital forensic cases. Professionals holding the GCFA are qualified to work in the information security, computer forensics and incident response fields.

GCFE

The GIAC Certified Forensic Examiner (GCFE) certification validates a practitioner's knowledge of computer forensic analysis, with an emphasis on core skills required to collect and analyze data from Windows computer systems.

Microsoft Certified Professional (Systems Engineer) - MCPSE

To obtain MCSE certification, you are required to pass five exams which comprise of approximately 50 questions each. Your answers must show your ability to design, install, administer and troubleshoot a Microsoft-server-based computer and networking systems.

ITIL

ITIL certifications demonstrate that you are educated in service management best practices, utilizing processes, terminology, and methods that are common in modern IT. ITIL-certified professionals are in high demand: they possess the skills to grow and transform the business.

ISO 27001

ISO 27001 certification demonstrates that your organization has invested in the people, processes, and technology (e.g. tools and systems) to protect your organization's data and provides. an independent, expert assessment of whether your data is sufficiently protected

CSTE

The Certified Software Tester (CSTE) certification is intended to establish standards for initial qualification and provide direction for the testing function through an aggressive educational program. Acquiring the designation ofCertified Software Tester (CSTE) indicates a professional level of competence in the principles and practices of quality control in the IT profession.

CSM Scrum Master

Certified ScrumMaster (CSM) is an entry-level credential designed to give professionals getting started as Scrum practitioners an understanding of the project management methodology. ... Professionals who have earned the CSM can fill the role of either Scrum Master or Scrum team member.

CompTIA Network+

The CompTIA Network+ certification is an IT certification exam that verifies you have the essential knowledge and skills in networking to develop a career in IT infrastructure. Unlike other vendor-specific networking certifications, CompTIA Network+ prepares you to support the network regardless of the platform.

CompTIA A+

CompTIA A+ certification is earned by passing a set of two exams – created by IT industry professionals – that validate skills needed for entry-level IT jobs. That said, CompTIA A+ is not just about PC repair. CompTIA A+ candidates are better prepared to troubleshoot and problem solve a wider variety of issues, ranging from networking and operating systems to mobile devices and security.

IASSC

If a business or professional trainer has been accredited by IASSC™ it means IASSC has determined they meet certain Lean Six Sigma best-practice standards and criteria established by IASSC. Each Accreditation has its own standards and criteria.

FBI Certified Digital Forensic Examiner

Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media.

FBI Certified Digital Forensics Laboratory Director

The FBI Laboratory is a division within the United States Federal Bureau of Investigation that provides forensic analysis support services to the FBI, as well as to state and local law enforcement agencies free of charge.

FBI Certified Intelligence Officer

Intelligence functions are woven throughout the fabric of the Bureau, and are embedded in every aspect of the FBI workforce and organization -- the Agents, the analysts, the Laboratory, the Cyber Division, the Investigative Technologies Division, and even training.

Still have questions? Let's chat.

Logo

COSECURE, an ancillary business of Cozen O'Connor, has been on the leading edge of cyber security and risk management for over 20 years and are actively protecting global Fortune 100 companies, law & technology firms, and high net worth individuals.

© 2022 COSECURE Terms & Conditions Privacy Policy