8 Cyber-Security Certifications To Boost Your IT Career

...

Cyber-security skills are in high demand across all industries. These certifications can help IT managers boost their security know-how and protect their organizations.

Businesses are scrambling to hire IT professionals with knowledge and experience in cyber-security. A shortage of skilled cyber-security practitioners is leaving organizations across all industries vulnerable to attack.

The risk is severe. Research firm Vanson Bourne was commissioned by Intel Security to survey IT decision-makers in the US, UK, France, Germany, Australia, Japan, Mexico, and Israel. Most of the survey's 775 respondents report a shortage of cyber-security talent; one in three said this makes them key targets for hackers.

Highly technical skills such as secure software development, intrusion detection, and attack mitigation, are among the most valued. Demand for comparatively "soft" skills like collaboration and communication is weaker in the IT security sector than it is in IT overall.

[More on Security: 10 IoT Security Best Practices for IT Pros.]

Part of the skills shortage stems from a lack of adequate training for cyber-security professionals. Many companies require new hires to have at least a bachelor's degree in a relevant field; however, a degree doesn't necessary mean an applicant has the right security skills.

Hands-on experience and professional certifications are considered more useful than degree programs for training cyber-security professionals. Some IT decision-makers also consider hacking competitions to be valuable places for skill development.

Professional certifications are valuable whether you're a seasoned cyber-security practitioners or a new entrant to the field. Here, we highlight several options for IT professionals hoping to boost their security skills or to drive skill development within their teams.

The certifications in this roundup come from a variety of organizations and cover a broad range of skills. Have you pursued any of these certifications? Would you suggest any of these to aspiring cyber-security pros? Please share your thoughts and recommendations in the comments section below.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Yahoo Expands Board to Appease Contentious Investor

    As part of the agreement, Starboard has withdrawn its slate of nominees to the Yahoo board.The board and management "remain focused and dedicated to the exploration of strategic alternatives" and the "execution of strategy for the operating business," Yahoo spokesperson Rebecca Neufeld told the E-Commerce Times.
  • 5300c769af79e

    The Social Takeover: The Top 5 Social Media Threats

    Download The face of cyber security is shifting.With the advent of social media, the adversary has found a new vehicle for tried and true threats as well as a whole�new breed of potential attacks, many of which are only beginning to take full form.
  • 5300c769af79e

    iPhone 7 Rumors: Improved Camera, Quadraphonic Speakers

    To help you optimize security as you cope with complexity, InformationWeek is offering you an excl The iPhone 7 rumor mill continues to churn out photos and information indicating a redesigned rear case and improved camera specs.The photos also show three memory chips placed next to the camera, including a 256GB chip, which would be a first for the iPhone.
  • 5300c769af79e

    The 4 Fundamental Attributes of Customer Loyalty, Part 3

    This is the second in a four-part series on modern approaches to improving customer loyalty through customer engagement.The third of four attributes of customer loyalty programs is contextual interaction, and it might not be obvious because it can mean different things depending on the circumstances.