Certifications

Helping our clients strengthen the security of their networks, applications, premises and people is our top priority. To guarantee we provide offensive security solutions of the highest quality, our team holds a number of industry certifications demonstrating high standards of proficiency.
Offensive Security Certified Professional (OSCP)
Offensive Security Certified Professional (OSCP)
The world’s first completely hands-on offensive information security certification. The OSCP challenges students to demonstrate “understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.”
Offensive Security Wireless Professional (OSWP)
Offensive Security Wireless Professional (OSWP)
An OSWP certification proves an individual has the practical ability to perform 802.11 wireless audits using open source tools on several dedicated wireless networks with various configurations and vulnerabilities.
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)
The first information security credential to meet the strict conditions of ISO/IEC Standard 17024, the CISSP “focuses on the practical application of cybersecurity knowledge and tools.” Exploring “actual, on-the-job issues and risks,” this certification values a systematic approach to cybersecurity.
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
The CEH certification from the EC-Council recognizes an understanding of how to identify weaknesses and vulnerabilities in target systems, and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner.
GIAC Certified Incident Handler (GCIH)
GIAC Certified Incident Handler (GCIH)
The GIAC Incident Handler certification validates a practitioner's ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors, and tools, as well as defend against and respond to such attacks when they occur.
GIAC Certified Web Application Defender (GWEB)
GIAC Certified Web Application Defender (GWEB)
The GIAC Web Application Defender certification allows candidates to demonstrate mastery of the security knowledge and skills needed to deal with common web application errors that lead to most security problems. The successful candidate will have hands-on experience using current tools to detect and prevent input validation flaws, cross-site scripting (XSS), and SQL injection as well as an in-depth understanding of authentication, access control, and session management, their weaknesses, and how they are best defended. GIAC Certified Web Application Defenders (GWEB) have the knowledge, skills, and abilities to secure web applications and recognize and mitigate security weaknesses in existing web applications.
Adversary Tactics: Red Team Operations SpecterOps
Adversary Tactics: Red Team Operations SpecterOps
Adversary Tactics: Red Team Operations SpecterOps gives you the tools to execute effective red team operations. This course explores the foundation of Red Teaming and how to simulate advanced threat actors, providing defensive staff with visibility in how a thinking adversary would operate against them.
Cisco Certified Networking Associate (CCNA)
Cisco Certified Networking Associate (CCNA)
Achieving CCNA certification is the first step in preparing for a career in IT technologies. To earn CCNA certification, you pass one exam that covers a broad range of fundamentals for IT careers, based on the latest networking technologies, software development skills, and job roles. CCNA gives you the foundation you need to take your career in any direction.
Cisco Certified Networking Associate Cyber Ops (CCNA Cyber Ops)
Cisco Certified Networking Associate Cyber Ops (CCNA Cyber Ops)
Achieving the Cisco Certified CyberOps Associate certification ignites your career in cybersecurity operations. To earn the CyberOps Associate certification, you pass one exam that covers the fundamentals of cybersecurity operations, skills, and procedures.
CCNA Security Certification
Cisco Certified Networking Associate Security (CCNA Security)
With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting, and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.
Click Here For Ring0, Immunity Inc.
Click Here For Ring0, Immunity Inc.
Immunity's Click Here for Ring0 class teaches both Windows clientside exploitation as well as Windows kernel exploitation. These two combined courses complement each other perfectly through hands-on exploitation that takes the student from gaining remote access to elevating privileges on modern Windows systems. This is an intermediate class that requires a solid grasp of userland and kernel debugging on Windows platforms.
CompTIA PenTest+
CompTIA PenTest+
CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Successful candidates will have the intermediate skills required to customize assessment frameworks to effectively collaborate on and report findings.
CompTIA Security+ Certification
CompTIA Security+
CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career. Establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
The GIAC Exploit Researcher and Advanced Penetration Tester certification validates a practitioner's ability to find and mitigate significant security flaws in systems and networks. GXPN certification holders have the skills to conduct advanced penetration tests and model the behavior of attackers to improve system security, and the knowledge to demonstrate the business risk associated with these behaviors.
GIAC Certified Incident Handler (GCIH)
GIAC Certified Incident Handler (GCIH)
The GIAC Incident Handler certification validates a practitioner's ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
GIAC Python Coder (GPYC)
GIAC Python Coder (GPYC)
The GIAC Python Coder (GPYC) certification validates a practitioner's understanding of core programming concepts, and the ability to write and analyze working code using the Python programming language. GPYC certification holders have demonstrated knowledge of common python libraries, creating custom tools, collecting information about a system or network, interacting with websites and databases, and automating testing.
GIAC Security Essentials (GSEC) Certification
GIAC Security Essentials (GSEC)
The GIAC Security Essentials (GSEC) certification validates a practitioner's knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.
GIAC Web Application Penetration Tester (GWAPT)
GIAC Web Application Penetration Tester (GWAPT)
The GIAC Web Application Penetration Tester (GWAPT) certification validates a practitioner's ability to better secure organizations through penetration testing and a thorough understanding of web application security issues. GWAPT certification holders have demonstrated knowledge of web application exploits and penetration testing methodology.
McAfee ePolicy Orchestrator (ePO)
McAfee ePolicy Orchestrator (ePO), Host-Based Security System (HBSS) Defense Information Systems Agency (DISA)
This exam validates that the successful candidate has the knowledge and skills necessary to successfully install, configure, and manage the McAfee solution. It is intended for security professionals with one to three years of experience using the McAfee product.
The Assured Compliance Assessment Solution (ACAS)
Nessus Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA)
The Assured Compliance Assessment Solution (ACAS) is the mandated enterprise vulnerability scanning capability for networks and components that are owned or operated by the Department of Defense (DoD).
Evolve Security Certified Professional (ESCP)
Evolve Security Certified Professional (ESCP)
Evolve Security Academy offers holistic cybersecurity education as well as advanced tracks on specific areas within cybersecurity. The Cybersecurity Bootcamp provides hands-on and immersive training, giving students the concrete and practical skills they will actually need on the job. Students gain real work experience through the live security assessment work they perform on non-profit organizations. Successful graduates of the cybersecurity bootcamps will receive a designation of Evolve Security Certified Professional (ESCP) certification after successful completion of written and lab exams, and preparation for the CompTIA Security+ certification.

Featured On

National TV news and media outlets often consult with us for our expertise as a boutique, high-touch ethical hacking firm highly trained in a narrow field of cybersecurity. Please click on any logo below to view the featured story.

Get your FREE security evaluation today. Learn how our experts can reduce your organization's security risk

Test the effectiveness of your own security controls before malicious parties do it for you. Our security experts are here to help — schedule a call today.
Consultation Request