Certifications

Certifications | News, how-tos, features, reviews, and videos

Data streams through a businessman's head. / mindset / analysis / strategy / skills / knowledge
A virtual checkmark in digital system / standards / quality control / certification / certificates

A woman considers a career opportunity. [ woman / abstract light bursts / career ladder ]

6 security analyst certifications to advance your career

Whether you're just starting out in your security career or you're on your way to the top, these certs can give you a leg up.

certificate / gold seal certification

(ISC)2 pilots new entry-level cybersecurity certification to tackle workforce shortages

New certification aims to validate knowledge of foundational cybersecurity concepts and best practices to address skills gap. Is another cybersecurity qualification the answer?

job growth climbing the corporate ladder promotion stairs corporate govenernance new job nathan dum

CRISC certification: Your ticket to the C-suite?

Certified in Risk and Information Systems Control (CRISC) is a certification that focuses on enterprise IT risk management. Learn about the exam, prerequisites, study guides, and potential salary.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

8 top cloud security certifications

Cloud security skills are in high demand. These certs will help you demonstrate your cloud security know-how.

Strategic world map to certification in a binary world.

CDPSE certification: Requirements, exam, and cost

The Certified Data Privacy Solutions Engineer (CDPSE) certification is new on the scene, but the privacy-focused cert is already in increasing demand.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Certified Cloud Security Professional (CCSP): Exam, cost, and requirements

Get answers to your burning questions about this cloud security certification and whether it's the right cert for you.

A virtual checkmark in digital system / standards / quality control / certification / certificates

Certified ethical hacker: CEH certification cost, training, and value

Learn how CEH certification will impact your job and salary and how to decide if this cert is right for you.

spot itleadership cio superhero businessman by yuganov konstantin shutterstock 373650874 2400x1600

Real IT leadership: Selling the transformative dream

It's one thing to cook up a great new initiative, but making it happen requires powers of persuasion, solid partnerships, and access to genuine technical insight.

virtual certificate icon / certification

CompTIA Security+: Prerequisites, objectives, and cost

Learn how CompTIA Security+ certification will impact your job and salary and how to decide if this cert is right for you.

data scientist face in profile with binary numbers analystics

Top 5 skills a SOC analyst needs

Whether building a new security operations center or revamping an existing one, staffing it with analysts that are equipped with these skills should be priority number one.

certification college degree education graduation by cole keister via unsplash

Getting the right certifications: Advice from Indian CSOs

Having the right certifications, whether Indian or international, can help a security team perform better.

'expert knowledge' stamp of certification

CISSP certification: Requirements, training, and cost

Certified Information Systems Security Professional, or CISSP, is a certification for advanced IT professionals who want to demonstrate that they can design, implement, and manage a cybersecurity program at the enterprise level

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Load More
You Might Also Like