(ISC)2

  • 1
  • 8
  • 95
  • 8
  • 1

(ISC)2 certifications are some of the most valued certifications available to IT security professionals — and employers. There’s a reason for that. (ISC)2 has a reputation for validating not only security knowledge, but also expertise by maintaining a stringent qualification regime for all its certifications. Unlike many certifications, which test proficiency through the knowledge on the exam, (ISC)2 requires documented work experience and a sponsorship to earn their certification. These requirements mean (ISC)2 training is tailored to IT professionals with some security experience already.

(ISC)2 Certification Courses

Certification-focused training

(ISC)2 certifications are recognized worldwide as symbols of excellence in IT security. Not only are their certifications rigorous, they also have a work experience and endorsement requirement that further solidifies their standing in the private and public sectors. (ISC)2 standards are tough, but that’s exactly why these certifications are among the most valued by IT security professionals and their employers.

(ISC)2 Certification Training Paths

The (ISC)2 certification path consists of three levels — Practitioner, Professional, and Concentrations. Where security professionals start on the (ISC)2 certification roadmap depends on their level of experience. In most vendor certification programs, IT professionals automatically earn a certification after passing one or more exams. However, security professionals who pass an exam in the (ISC)2 certification path must then submit an application to receive their credential. To earn an (ISC)2 certification, security professionals must pass an exam, provide documents proving two to five years of specialized experience, and receive an endorsement from another (ISC)2 member. Security professionals who pass an exam without the required experience will become an Associate until they gain the work experience required by the (ISC)2 certification track. CBT Nuggets offers online (ISC)2 certification training for the most popular exam: CISSP.

(ISC)2 Professional certifications

(ISC)2 professional certifications are arguably the most comprehensive sets of cybersecurity certifications in the industry. The CISSP maintains a particularly high status in the industry because it meets the requirements of DoDD 8140.01 — the security training framework for the U.S. Department of Defense.

Recommended Experience: 5 years

More on our blog

  • A Complete (ISC)2 Certification Guide

    Find out everything you need to know about (ISC)² certifications with this guide. Discover course requirements, salary information, exam costs and much more.

  • This Week: Earning Your CISSP

    This week, we covered how to find a sponsor, what counts as CISSP work experience, how to find a sponsor, and whether to even earn the CISSP.

  • How Many CISSPs Are There In the World?

    The highest concentrations of CISSP certification holders in the world are in Singapore, United States, Cayman Islands, and Bermuda. Here’s the complete list of the number of CISSPs by country per 100,000 people.

More on our YouTube channel

MicroNuggets: CISSP Backup Types Explained

In this video, Keith Barker covers backup types. There are two types of people in the world, those who've lost data, and those who have yet to. In the world of protecting data, there are three types: full, incremental and differential -- Keith explains the difference.

Welcome to CISSP 2015

In this video, Keith Barker introduces his series of videos that prepare learners for taking the CISSP. Keith covers his tips and recommendations for how to make the time to succeed and create habits that will ensure success in taking the (ISC)2 certifying exam.

Train free for a week.

Sign upExplore options for IT teams