The Offensive Security Certified Professional (OSCP) is the world’s first completely hands on offensive information security certification. The OSCP challenges the students to prove they have a clear practical understanding of the penetration testing process and lifecycle through an arduous twenty four (24) hour certification exam.
The OSCP exam consists of a dedicated vulnerable network, which is designed to be compromised within a 24-hour time period. The exam is entirely hands-on and is completed with the examinee submitting an in-depth penetration test report of the OSCP examination network and PWK labs. The coveted OSCP certification is awarded to students who successfully gain administrative access to systems on the vulnerable network.
The Offensive Security Wireless Professional (OSWP) is the only practical wireless attacks certification in the security field today. The OSWP challenges the students to prove they have the practical ability to perform 802.11 wireless audits using open source tools through a hands-on, four (4) hour, certification exam.
The OSWP exam consists of several dedicated wireless networks with various configurations and vulnerabilities. The examinee is tasked with identifying, analyzing, and attacking each of the wireless networks presented to them, with the goal of gaining access to the network encryption keys.
The Student must submit the correct encryption codes for all networks, as well as the attack vectors used to obtain them in order to be awarded the OSWP certification.
Certified Information Systems Auditor (CISA) is a globally recognized certification in the field of audit, control and security of information systems. CISA gained worldwide acceptance having uniform certification criteria, the certification has a high degree of visibility and recognition in the fields of IT security, IT audit, IT risk management and governance. Vacancies in the areas of IT security management, IT audit or IT risk management often ask for a CISA certification. The certification is extremely challenging and is associated with a high failure rate. CISA is awarded by ISACA.
CISSP® certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. This was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.
The CISSP exam tests one’s competence in the 10 CISSP domains of the (ISC)²® common body of knowledge (CBK®), which cover critical topics in security today, including risk management, cloud computing, mobile security, application development security and more. Candidates must have a minimum of five years of paid full-time work experience in 2 of the 10 domains. This vast breadth of knowledge and the experience it takes to pass the exam is what sets the CISSP apart.
LPIC-1 is the first certification in LPI’s multi-level Linux Professional certification program. The LPIC-1 validate our ability to perform maintenance tasks with the command line, install & configure a computer running Linux and be able to configure basic networking.
LPIC-2 is the second certification in LPI’s multi-level professional certification program. The LPIC-2 validates our ability to administer small to medium–sized mixed networks.
“Introduction to Cyber Warfare and Operations Design” is an approved course by The University of Fairfax (USA) and it carries a .5 credit toward a Masters or Doctorate degree from The University of Fairfax.
The University of Fairfax is an accredited, cybersecurity graduate university which seeks to address the growing shortage of cybersecurity professionals who can conduct cutting-edge research. The University of Fairfax offers online graduate programs with curricula exclusively focused on cybersecurity. Founded in response to 9/11, the University of Fairfax is accredited by the Accrediting Commission of the Distance Education and Training Council (DETC). The Accrediting Commission of DETC is listed by the U.S. Department of Education as a nationally recognized accrediting agency and is a recognized member of the Council for Higher Education Accreditation (CHEA). The University of Fairfax has been certified by the State Council of Higher Education in Virginia (SCHEV) to operate in the state of Virginia. The University of Fairfax is an Authorized Education Partner and CPE Provider of (ISC) ®, and has received National Security Agency (NSA) authorization for awarding both the NSA 4011 and 4012 certifications. UoF is also a participant in the Yellow Ribbon Program for GI Bill recipients, and one of Military Advanced Education’s 2014 Top Military-Friendly Colleges & Universities.
The eCPPT designation stands for eLearnSecurity Certified Professional Penetration Tester. eCPPT is a 100% practical and highly respected Ethical Hacking and Penetration Testing Professional certification counting certified professional in all the five contintents.
By obtaining the eCPPT Gold, our skills in the following areas are assessed and certified:
- Penetration testing processes and methodologies
- Vulnerability Assessment of Networks
- Vulnerability Assessment of Web Applications
- Advanced Exploitation with Metasploit
- Performing Attacks in Pivoting
- Web application Manual exploitation
- Information Gathering and Reconnaissance
- Scanning and Profiling the target
- Privilege escalation and Persistence
- Exploit Development
- Advanced Reporting skills and Remediation
Windows Server 2008 Network Infrastructure Configuration exam measures our ability to accomplish the technical tasks listed below:
- Configuring addressing and services (21%)
- Configuring names resolution (22%)
- Configuring network access (18%)
- Configuring file and print services (20%)
- Monitoring and managing a network infrastructure (20%)
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credentials are intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering Windows Server 2008 R2 in an environment that has the following characteristics:
- 250 to 5000 or more users
- Multiple physical locations
- Multiple domain controllers
- Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, Public Key Infrastructure, remote access, remote desktop, virtualisation, and client computer management
- Connectivity requirements such as connecting branch offices and individual users in remote locations to corporate resources and connecting corporate networks
The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.
The Offensive Security Certified Expert (OSCE) has an extremely challenging exam wherein students are required to demonstrate that they comprehend not only the material directly covered in the CTP course, but that they also fully grasp the underlying concepts presented throughout the course and can apply them in unknown situations. The OSCE exam challenges the students to prove that they have a clear and practical understanding of advanced penetration testing skills through an arduous forty-eight hour certification exam.
The OSCE exam consists of a dedicated vulnerable network, which is designed to be compromised within a 48-hour time period. The exam is entirely hands-on and is completed with the examinee submitting an in-depth penetration test report of the OSCE examination network. The coveted OSCE certification is awarded to students who successfully gain administrative access to systems on the target network.