Now there are quite a lot of supplier safety certifications. How to choose the certification that best meets your educational or professional needs? This is not difficult. In the latest supplier IT certification guide in this article, you will see the security certification from different suppliers in alphabetical order, a brief introduction to each certification and links to detailed instructions. We also provide some tips to help you choose the right certification. I hope this guide can meet your needs and answer your questions.

Compared with choosing vendor neutral security authentication, choosing vendor security authentication is much simpler. In the case of vendor neutrality, you must evaluate the advantages and disadvantages of various schemes, and then select a feasible option. In terms of specific suppliers, you only need to solve the following three problems:

1: Check your enterprise’s security infrastructure to see which suppliers’ products or services are available.

2: Check this guide (if not here, check the supplier’s website) to determine whether there is a certification applicable to your enterprise’s products or services.

3: Determine whether it is worth spending time and money to obtain relevant certificates (or supporting employees to obtain certificates).

In an environment, if every qualified IT security professional has many employment opportunities, it is difficult to exaggerate his personal interests. This may explain why many employer funded certifications have return clauses, which is a strategy for enterprises to cultivate and retain employees, but also help to improve internal expertise.

Table 1: change in figures (% Δ Means “percentage change”)

Count               2012 to 2013 % Δ

Basic                8      8    0

Intermediate          20     20   0

Advanced            10     11   10

Total                38     39    3

We began to investigate information security certification in 2001. Since the last update in 2012, there have been some changes. At the same time, we added different elements, such as security certification from Fortinet, IBM, McAfee, Microsoft and SonicWALL (now Dell). However, if you look at the summary table, you will find that the number of supplier certificates has not changed since 2010. There is no increase in the basic or intermediate categories, but a new advanced certification has been added. Overall, suppliers will continue to invest in safety related certification programs across the board. This means that there will be only a few changes, as described in our overview. Now let’s look at all these supplier safety related certification schemes.

This certification means that the certified personnel are assistant professionals who can install, troubleshoot and monitor Cisco routing and switching network equipment. Personnel with CCNA security certification know how to build security infrastructure, can identify network threats and vulnerabilities, and can mitigate security threats. CCNA certificate holders have the necessary technical skills and expertise to maintain access control lists (ACLS), virtual LANs (VLANs), and routing protocols (IP, Ethernet, and gateways). To obtain this certification, you need to successfully pass two exams.

Details: Cisco company 

Prerequisite: CCSA R75 training; Six months to one year experience in using check point products.

Personnel with check point basic level certification can manage the basic installation of check point 3D security system products, such as security gateway, firewall, intelligent console, remote access VPN, IPSE VPN, user directory, anti spam / virus / mail, URL filtering and identity awareness. Certificate holders also have the necessary skills to configure these systems and manage daily operations, mainly including protecting Internet communication security, backing up and restoring the network, upgrading products, solving network connection problems, configuring security policies, protecting e-mail, protecting e-mail content, protecting the network from intrusion and other threats, analyzing attacks Manage user access in the enterprise LAN environment and configure channels for remote access to enterprise resources. Those who have obtained CCSA R70 and above certification must complete two training courses and pass the examination to obtain certification again.

Details: Check Point company 

Preconditions: FCESP has no preconditions. However, it is highly recommended that you attend the 221-Fortimail email filtering training course. Through FCESP authentication, you can configure, manage, monitor and manage fortimate devices, standardize the use of enterprise resources using smtps (SMTP over TLS) and S / MIME protocols, and resist spam, malware and message propagation threats. You must be able to understand Fortimail management and configuration functions and pass an exam to obtain this certification.

Details: Fortinet

FCNSA – Fortinet Certified Network Security Administrator

Preconditions: fcnsa has no preconditions. However, it is highly recommended that you attend the 201 FortiGate multi threat security system training course. Fcesp certification means that you can configure, manage, monitor and manage FortiGate devices, as well as use VPN and firewall policies. You must understand Fortinet products, hardware and services, and pass an exam to obtain this certification.

Details: Fortinet

This certification is applicable to network security experts, such as penetration testers, auditors, consultants and administrators. You need to be familiar with the following areas:

Configure and count inventory

Vulnerability identification

Exploit vulnerability

Expand influence

You must have one to three years of experience and pass an exam to obtain McAfee assessment certification.

Details: McAfee

Through this certification, you can install, configure, manage and troubleshoot specific McAfee products, such as epolicy orchestrator, network security platform or server host intrusion protection products. You must have one to three years of experience in this product and pass a corresponding examination to obtain the certification.

Details: McAfee

This certification was originally a “super entry-level” academic certification for students. It has been for everyone since 2012, so now we put it in this guide. The certification has more than a dozen different MTA certifications in three different fields (four certifications for IT infrastructure; 1 Database; 7 Developments), almost all of these certifications have a security factor or subject area, so we cover them.

In order to obtain MCTs certification, you must pass the corresponding examination.

Details: Microsoft

This security certification program focuses on data protection, high availability and security skills related to Symantec solutions. To become a Symantec Certified Expert, you must select a key area and pass the exam. All of these tests cover core elements, including installation, configuration, product management, daily operation and troubleshooting of selected key areas. As of the time of writing this article, the following exams are available:

1:Exam 250-252: Administration of Veritas Storage Foundation 6.0 for Unix

2:Exam 250-253: Administration of Veritas Cluster Server 6.0 for Unix

3:Exam 250-271: Administration of Symantec NetBackup 7.5 for Unix

4:Exam 250-310: Administration of Symantec Enterprise Vault 10.0 for Exchange

5:Exam 250-315: Administration of Symantec Endpoint Protection 12.1

6:Exam 250-316: Administration of Symantec Backup Exec 2012

7:Exam 250-352: Administration of Veritas Storage Foundation and High Availability Solutions 6.0 for Windows

8:Exam 250-371: Administration of Symantec NetBackup 7.5 for Windows

9:Exam 250-402: Administration of Symantec Client Management Suite 7.1 / 7.x

10:Exam 250-403: Administration of Symantec Management Platform 7.1

11:Exam 250-406: Administration of Symantec Clearwell eDiscovery Platform 7.x

12:Exam 250-512: Administration of Symantec Data Loss Prevention 11.5

13:Exam 250-530: Administration of Symantec Network Access Control 12.1

Details: Symantec spoto saa co3