IT certifications
The Open Group Certified Architect (Open CA) program plans to incorporate dedicated business architecture and enterprise architecture in the program. This will enable IT professionals to become an Open CA in IT architecture, business architecture, and enterprise architecture.
The PMI-ACP certification is focused on training in principles, practices, tools and techniques across Agile methodologies, which is a growing approach to project management.
The GCFA certification focuses on building skills for collecting and analyzing data from Windows and Linux computer systems. It demonstrates the ability to conduct formal incident investigations and handle advanced incidents, such as data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers and complex digital forensic cases.
CyberSecurity Forensic Analyst (CSFA) certification is geared toward qualifying digital forensic professionals with the skills to conduct a comprehensive forensic examination of a computer system or other digital/electronic devices.
A Certified ScrumMaster is trained in Scrum (an Agile product development platform) values, practices and applications beyond a typical project manager.
The CWSP certification is a professional-level wireless LAN certification for the CWNP Program. This certification demonstrates the skills to secure enterprise WiFi networks from hackers on any WiFi equipment.
CCP focuses on a data scientist’s skills in big data. Candidates are required to design and develop a production-ready data science solution that is peer-evaluated for accuracy, scalability and robustness.
VMware Certified Design Expert-Cloud (VCDX-Cloud), the highest level of certification offered by VMware, is focused on vSphere and cloud infrastructure design skills, including comprehensive management and security.
The Certified Ethical Hacker certification provides hands-on training on how to conduct ethical hacking. It covers 19 of the most current security domains.
The CHFI v8 Program is designed to certify candidates in computer forensics from a vendor-neutral perspective and provides application knowledge for those focused on network infrastructure integrity.