The Voice of IT Certification

CERTIFICATION WATCH

Get the latest certification news by email!

*





*


Our Other Sites

GoExam: Certification practice tests with free demos to download.

GoTraining: Get Training on what you need.

CertificationBooks: Find the certification book you're looking for.

Free Tech Pubs: Free computer industry magazines, newsletters, and whitepapers.

SearchCertify: links, links and more certification links!


EC Council Certifications

EC-Council Secure Computer User (ESCU)

Skill Level: End User                          Status: Active
For individuals who have the knowledge and skills to protect their information assets from various computer and network security threats.

EC-Council Certified Secure Programmer (ECSP)

Skill Level: Foundation                          Status: Active
For individuals who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework. It is designed for developers who have C#, C++ and Java development skills.

EC-Council Certified VoIP Professional (ECVP)

Skill Level: Foundation                          Status: Active
For individuals who work with VoIP technologies including concepts, implementation and deployment. VoIP is the family of technologies that allow IP networks to be used for voice applications, such as telephony, voice instant messaging, and teleconferencing. VoIP entails solutions at almost every layer of an IP network from specialized voice applications (like Skype) all the way down to low-level quality measures that keep those applications running smoothly.

EC-Council Network Security Administrator (ENSA)

Skill Level: Foundation                          Status: Active
For individuals who evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies.

Network5

Skill Level: Foundation                          Status: Active
For individuals who wish to demonstrate basic networking skills. Network 5 is not meant for office goers alone. If you are somebody who banks online, accesses work online, travels extensively and yet stay connected, logs onto wireless networks, subscribe to a broadband connection or use a computer system at work /home, you need to have Network 5 to help you stay abreast in this networked world.

 

Security5

Skill Level: Foundation                          Status: Being phased out
For entry level professionals in the computer security field. Security5 stands for 5 components of IT Security: firewalls, anti-virus, IDS, Networking and Web security. If you are someone who banks online, pays utility bills online, shops online, have children chatting online, downloads shareware and games, communicates over email, subscribes to a broadband connection or someome who uses a computer system at work /home, then you need to have Security 5 training to help you guard your information assets.

Wireless5

Skill Level: Foundation                          Status: Active
For individuals who wish to demonstrate basic knowledge of wireless technologies. Wireless 5 seeks to break the myths of wireless computing. You will understand the security aspects of wireless and what you can do to secure your access.

Certified e-Business Professional (CEP)

Skill Level: Intermediate                          Status: Unknown
For individuals wishing to prove their expertise in E-Commerce standards and procedures in technical, content management and business management areas.

Certified Ethical Hacker (CEH)

Skill Level: Intermediate                          Status: Active
For individuals who are responsible for securing (or testing the security of) computer networks. Covers common exploits, vulnerabilities, and countermeasures using hacker techniques and tools.

Certified Network Defense Architect (CNDA)

Skill Level: Intermediate                          Status: Unknown
For United States Government and Military Agency employees who are responsible for network defense. The CNDA is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Other than the name, the content is the same as the Certified Ethical Hacker (CEH).