isc2 logo

When you earn an (ISC)² certification, you also become an (ISC)² Member. This means:  

  • InfoSecurity Professional MagazineFree publications like InfoSecurity Professional Magazine
  • Free (ISC)² local Secure Events 
  • isc2 congress logo 2015Deep discounts on industry conferences like (ISC)² Security Congress
  • The ability to join or start a local (ISC)² Chapter
  • Volunteering opportunites such as the (ISC)² Foundation Safe and Secure Online program to help keep kids cyber safe
  • Professional recognition through (ISC)² Awards programs
  • Much more

Learn more about being an (ISC)² Member >> 

(ISC)² Information Security Certification Programs

Why Certification Matters

In a world fraught with security threats, the need for skilled and knowledgeable information security professionals has never been greater. Your experience in the field is an important component of your value to an employer, but experience isn’t enough. Employers need something quantifiable and verifiable to show them you have the expertise they need. 

The Value of (ISC)²® Certification

(ISC)² is acknowledged as the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. Our reputation has earned our information security certifications and information security training programs recognition as the Gold Standard of the industry.

When you become certified through (ISC)², you gain:

  • Tested and verifiable proof of proficiency in your field.
  • Higher salary and promotion potential.
  • Entry into one of the largest communities of recognized information security professionals in the world.
  • Access to unparalleled global resources, peer networking, mentoring, and a wealth of ongoing information security opportunities.

Our World-Class Certifications 


CISSP recognizes information security leaders with the knowledge and experience to design, develop, and manage the overall security posture of an organization.

Learn more >>  

  CCSP Logo

CCSP recognizes knowledge and competency in applying best practices to cloud security architecture, design, operations, and service orchestration.

Learn more >>   



SSCP recognizes practitioners in information security or IT operational roles with hands-on, technical skills to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

Learn more >>

 Logo CAP

CAP recognizes the key qualifications of managers responsible for authorizing and maintaining information systems.

Learn more >>


CSSLP recognizes the key qualifications of developers building secure software applications.

Learn more >>

 Logo CCFP

CCFP recognizes cyber forensics professionals with the knowledge and experience in forensics techniques and procedures to support investigations.

Learn more >>


HCISPP recognizes the key qualifications of healthcare information security and privacy practitioners with the knowledge required to successfully implement, manage, or assess security and privacy controls for healthcare and patient information.

Learn more >>

 Logo CISSP Concentrations

CISSP Concentrations recognize CISSPs who expand their knowledge into specific subject matter areas such as architecture, engineering, and management.  

Learn more >>