النسخة العربية

Oman National CERT Towards a safe cyber environment

The National cybersecurity industry Campaign

The National cybersecurity industry Campaign

The Oman National CERT as a center within the Ministry of Transport, Communications and Information Technology have worked on preparing a program and an executive plan to develop the cybersecurity industry ...

View
Regional Cybersecurity week 2022

Regional Cybersecurity week 2022

The 10th Regional Cybersecurity Week is organized by ITU Arab Regional Cybersecurity Centre (ITU-ARCC) in Muscat, Sultanate of Oman from the 06 to 10 of November 2022.

View
INNOVATE OMAN

INNOVATE OMAN

We are very excited to launch Innovate Oman with the UK Oman Digital Hub , Plexal , CyLon , Imperial College London , and AL JABR . We’re supporting digital innovators in Oman through hackathons, accelerators and mentoring. Apply for our first cyber hackathon and we’ll help you build your pitch.

View
Oman 3rd best Arab country in Cybersecurity Index 2020

Oman 3rd best Arab country in Cybersecurity Index 2020

Oman has been ranked third in the Arab world and 21st globally in the Global Cybersecurity Index 2020 report released by the International Telecommunication Union (ITU).

View
Innovation Hub Oman’s 1st Virtual Hackathon

Innovation Hub Oman’s 1st Virtual Hackathon

Under the theme innovation in Fintech and Cybersecurity, Oman National CERT is partnering with Oman Arab Bank to host Oman’s 1st 24 hours virtual hackathon on 2nd and 3rd April 2021.The registration is open for all students and professionals. Join us by registering at www.oabinnovation.com

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Information Security Certificates

Information Security Certificates

Information Security Certificates

We have gathered the internationaly approved Information Security certificates for your reference





  • Advanced Information Security Certification (AISC)
  • The AIS Certification (Advanced Information Security) include advanced information security classes. These classes include PKI & certificate management, Security Policies and Services Oriented Architecture and IDS monitoring classes. In order to qualify for the AIS certification you have to complete the 4 Anti-Hacking Certification classes and the 4 AIS classes. The AIS classes are hands-on classes with performance based testing, the labs and experience exceed users expectations.

  • View Certificate Details

  • Anti-Hacking Certification (AHC)
  • The Anti-Hacking Certification offers the basics of performance based computer security education. From building a blueprint of your critical assets with Network Penetration Testing class, to knowing how a hacker thinks, and where the compromise happened inside your network, this certification exceeds users expectations for labs and experience.

  • View Certificate Details

  • Certified Ethical Hacker (CEH)
  • The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

  • View Certificate Details

  • Certified FISMA Compliance Practitioner (CFCP)
  • he Certified FISMA Compliance Practitioner (CFCP) exam is the only exam that tests for competencies in understanding FISMA compliance concepts related to the Federal Information Security Management Act. You must be knowledgeable about all of the different FISMA compliance methodologies to pass the exam.

  • View Certificate Details

  • Certified Identity Theft Risk Management Specialist (CITRMS®)
  • The Certified Identity Theft Risk Management Specialist (CITRMS®) certification program is the nation’s only training program specifically developed for professionals who are dedicated to educating and assisting clients, customers, businesses, and the general public in combating the epidemic of Identity Theft and related fraud. CITRMS®-qualified professionals are employed by a wide range of organizations including financial institutions; mortgage, real estate, and financial services firms; law enforcement, and other government agencies.

  • View Certificate Details


  • Certified Information Security Manager (CISM)
  • The CISM designation is awarded by the Information Systems Audit and Control Association. That is a new certification and is specifically geared toward experienced information security professionals. CISM is business-oriented and focused on information risk management while addressing management, design and technical security issues at the conceptual level. It is for the individual who must maintain a view of the "big picture" by managing, designing, overseeing and assessing an enterprise's information security.

  • View Certificate Details

  • Certified Information Systems Security Professional (CISSP)
  • The Certified Information Systems Security Professional (CISSP) is a certification for information security professionals. This certification is obtained through the International Information Systems Security Certification Consortium (ISC)2 for the purpose of recognizing individuals who have distinguished themselves as an experienced, knowledgeable, and proficient information security practitioner. The CISSP certificate also provides a means of identifying those persons who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in the information security profession.

  • View Certificate Details

  • Certified Protection Professional (CPP)
  • To meet these needs, the American Society for Industrial Security (ASIS) International administers the Certified Protection Professional (CPP) program. More than 8,000 professionals have earned the designation of CPP. This group of professionals has demonstrated its competency in the areas of security solutions and best-business practices through an intensive qualification and testing program. As a result, these men and women have been awarded the coveted designation of CPP, and are recognized as proven leaders in their profession. The CPP designation identifies professionals as dedicated to the security profession and recognizes their ability to perform to exemplary standards.

  • View Certificate Details

  • Computer Hacking Forensic Investigator Certification (CHFI)
  • EC Council - Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

  • View Certificate Details

  • Computer Technology Industry Association (CompTIA) (Security+)
  • CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. It is an international, vendor-neutral certification that is taught at colleges, universities and commercial training centers around the world. Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience, with an emphasis on security.

  • View Certificate Details

  • EC-Council Certified Security Analyst (ECSA)
  • EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.

  • View Certificate Details

  • GIAC Assessing and Auditing Wireless Networks (GAWN)
  • The GAWN certification is designed for technologists who need to assess the security of wireless networks. The certification focuses on the different security mechanisms for wireless networks, the tools and techniques used to evaluate and exploit weaknesses, and techniques used to analyze wireless networks. Students will not only gain experience using tools to assess wireless networks, they will understand how the tools operate and the weaknesses in protocols that they evaluate.

  • View Certificate Details

  • GIAC Certified Enterprise Defender (GCED)
  • The GCED builds on the security skills measured by the GSEC (no overlap). It assesses more advanced, technical skills that are needed to defend the enterprise environment and protect an organization as a whole. Knowledge, skills and abilities assessed are taken from the areas of Defensive Network Infrastructure, Packet Analysis, Penetration Testing, Incident Handling, and Malware Removal.

  • View Certificate Details





  • GIAC Certified Web Application Defender
  • The GIAC Web Application Defender certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common web application errors that lead to most security problems. The successful candidate will have hands-on experience using current tools to detect and prevent Input Validation flaws, Cross-site scripting (XSS), and SQL Injection as well as an in-depth understanding of authentication, access control, and session management, their weaknesses, and how they are best defended. GIAC Certified Web Application Defenders (GWEB) have the knowledge, skills, and abilities to secure web applications and recognize and mitigate security weaknesses in existing web applications.

  • View Certificate Details


  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
  • Security personnel whose job duties involve assessing target networks, systems and applications to find vulnerabilities. The GXPN certifies that candidates have the knowledge, skills, and ability to conduct advanced penetration tests, how to model the abilities of an advanced attacker to find significant security flaws in systems, and demonstrate the business risk associated with these flaws.

  • View Certificate Details

  • GIAC Information Security Fundamentals (GISF)
  • Proficient infosec administrators can network well on the eight layer of the ISO model (political) and the material contained in this track will help them to bridge the gap that often exists between managers and system administrators. GISF candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

  • View Certificate Details

  • GIAC Information Security Professional (GISP)
  • Security Professionals that want to fill the gaps in their understanding of technical information security; System, Security, and Network Administrators that want to understand the pragmatic applications of the Common Body of Knowledge; managers that want to understand information security beyond simple terminology and concepts; anyone new to information security with some background in information systems and networking. Candidates may also wish to use this certification as an independent assessment of your mastery of the (ISC)2 Common Body of Knowledge.

  • View Certificate Details

  • GIAC Penetration Tester (GPEN)
  • The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.

  • View Certificate Details

  • GIAC Secure Software Programmer- .NET
  • Individuals who are responsible for coding secure software applications using .NET, identifying shortfalls in the security knowledge of other programmers, ensuring other programmers have adequate secure coding skills, and advanced secure programming skills. The GIAC Secure Software Programmers certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common programming errors that lead to most security problems.

  • View Certificate Details

  • GIAC Secure Software Programmer-Java
  • Individuals who are responsible for coding secure software applications, identifying shortfalls in the security knowledge of other programmers, ensuring other programmers have adequate secure coding skills, and advanced secure programming skills. The GIAC Secure Software Programmers certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common programming errors that lead to most security problems.

  • View Certificate Details

  • GIAC Security Essentials (GSEC)
  • GIAC Security Essential Certification (GSEC) is a vendor-neutral certification that validates an individual’s understanding of information security. Professionals holding a GSEC certificate can prove they have the skills required for IT security-related fields. The GSEC certification is designed to show that the successful candidate has an understanding of technical information security and knowledge on the ten domains of knowledge as determined by GIAC.

  • View Certificate Details


  • GIAC Web Application Penetration Tester (GWAPT)
  • Web applications one of the most significant points of vulnerability in organizations today. Most organizations have them (both web applications and the vulnerabilities associated with them). Web app holes have resulted in the theft of millions of credit cards, major financial loss, and damaged reputations for hundreds of enterprises. The number of computers compromised by visiting web sites altered by attackers is too high to count. This certification measures and individuals understanding of web application exploits and penetration testing methodology. Check your web applications for holes before the bad guys do.

  • View Certificate Details

  • Global Information Assurance Certification (GIAC)
  • SANS' GIAC Training and Certification Program is designed to serve the people who are or will be responsible for managing and protecting important information systems and networks. GIAC course specifications were developed through a consensus process that involved more than a hundred members of SANS' faculty and other experienced security practitioners. They combine the opinions, knowledge, and expertise of many of the world's most experienced front-line security and system administrators, intrusion detection analysts, consultants, auditors, and managers.

  • View Certificate Details

  • International Systems Security Professional Certification Scheme (ISSPCS)
  • ISSPCS is a global and open certification scheme for Information and Systems Security Professionals based on essential security principles. ISSPCS certification identifies the holder as a knowledgeable and practical individual in the field of Information Security and provides a practical solution to the issue of continually changing information security processes and best practices.

  • View Certificate Details

  • Licensed Penetration Tester (LPT)
  • EC-Council’s Licensed Penetration Tester (LPT) is a natural evolution and extended value addition to its series of security related professional certifications. The Licensed Penetration Tester standardizes the knowledge base for penetration testing professionals by incorporating the best practices followed by experienced experts in the field.

  • View Certificate Details



  • SCSE - Symantec Certified Security Engineer
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • View Certificate Details

  • SCSP - Symantec Certified Security Practitioner
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • View Certificate Details

  • Software Security Engineering Certification (SSEC)
  • Security University Software Security Engineer Certification is a number of classes that make a Software Security Engineer Certification. This certification is for anyone interested in securing software from flaws and bugs, with how to break code, and best practices for checking your code, to penetration testing your code. These classes and certification are new and will provide consistent, extreme hands-on software security labs and classes with trademarked escalating workshops and performance based training for security, IT professionals and now coding /developers.

  • View Certificate Details

  • SPS - Symantec Product Specialist
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • View Certificate Details

  • STA - Symantec Technology Architect
  • Symantec offers four levels of Certification for Security professionals ranging from Product Specialists (SPS) in individual Symantec products through Security Practitioners (SCSP) who demonstrate a broad knowledge of both Symantec Products and vendor neutral Security technologies.

  • View Certificate Details

  • Systems Security Certified Practitioner (SSCP)
  • SSCP Certification was designed to recognize an international standard for practitioners of information security [IS] and understanding of a Common Body of Knowledge (CBK). It focuses on practices, roles and responsibilities as defined by experts from major IS industries. Certification can enhance an IS career and provide added credibility.

  • View Certificate Details

  • Scroll Up