(1)CISP-A (Certified Information System Auditor), the certificate holder is mainly engaged in information system audit. On the basis of fully mastering the basic knowledge and skills of information security, it has strong practical ability of information security risk assessment and security inspection.
(2)CISD (registered information security developer), the certificate holder is mainly engaged in software development related work. On the basis of fully mastering the basic knowledge and skills of information security, I have a strong ability to develop information system security, register personal information protection professionals, and master application security.
(3)CISP-PTE (registered penetration test engineer), the holder is mainly engaged in penetration testing in the field of information security technology, and has the basic knowledge and ability to verify vulnerabilities, formulate penetration test schemes and test plans, write test cases, conduct tests and output test reports.
(4)CISP-PTS (Registered Penetration Testing Cisai Network), the certificate holder is mainly engaged in advanced penetration testing in the field of information security technology, and has strong knowledge and ability in vulnerability research, code analysis, latest network security dynamic tracking research, and planning solutions.
(5)CISP-IRE (registered emergency response engineer), the certificate holder is mainly engaged in emergency response in the field of information security technology, and has the basic knowledge and ability to implement emergency response event monitoring, emergency response event analysis and disposal.
(6)CISP-IRS (registered emergency response expert), the holder is mainly engaged in the advanced analysis and planning management of emergency response in the field of information security technology, and has the knowledge and ability to trace the source of network security incidents, plan and formulate emergency response plans for major network security incidents, and coordinate the management of emergency implementation and disposal processes.
(7)CISP-CTE (Certified Information Security Professional-Cryptographic Technology Expert), the certificate holder grasps the basic theory of cryptography, cryptographic laws and regulations, cryptographic application and cryptographic engineering implementation, and provides services for the implementation and application of cryptography in party and government organs, key information infrastructure, Internet and other fields.
(8)CISP-F (Electronic Data Forensics), the holder has mastered the laws, regulations and standards of electronic data forensics, as well as the main technologies of electronic data forensics, and has the knowledge, skills and quality standards of professionals engaged in electronic data forensics, and can engage in professional work such as network security maintenance and electronic data forensics in government agencies, institutions or enterprises.
(9)CISM-F (electronic data forensics staff), the holder knows the laws, regulations and standards of electronic data forensics and the main technologies of electronic data forensics, has the knowledge, skills and quality standards of general staff engaged in electronic data forensics, and can engage in basic work such as network security maintenance and electronic data forensics in government agencies, institutions or enterprises.
(10)CISP-DSG (registered data security governance professional), the certificate holder has the ability of data security governance process, which can help all kinds of institutions solve the problems of data security top-level design and management system construction, and improve the information security management ability of enterprises and institutions.
(1 1)CISP-PIP (registered personal information protection professional), which is mainly for domestic information security professionals in the fields of data protection, information auditing, organizational compliance, risk management, etc., and aims to strengthen the protection of users' personal information, take into account the important data protection needs and industry regulatory requirements in the fields of medical health and finance, and cultivate a strong professional team of data security protection in China.
(12)CISP-ICSSE (registered industrial control system security engineer), the holder is mainly engaged in the work of industrial control system security direction in the field of information security technology, and has the basic knowledge and ability to formulate industrial control security threat response plan, carry out industrial control system security protection design, establish industrial control security emergency response system and implement safety management.
(13)CISP-CSE (registered cloud security engineer), the holder has mastered the knowledge of cloud computing architecture and key technologies, cloud computing security threat and demand analysis, cloud computing security technology, cloud computing security protection application, cloud computing security management, cloud security policies, regulations and standards, and has the ability to engage in cloud computing security planning and system operation and maintenance, and can engage in cloud computing security design and security operation and maintenance.
(14)CISP-BDSA (registered big data security analyst), the holder has mastered the knowledge of big data analysis process, data analysis algorithm principle, big data system engineering realization, common cases of big data security analysis, big data system security laws and regulations, etc. , has the theoretical basis and practical ability of big data security analysis, and can engage in big data security analysis and security management.
(15)CISP-BR (Belt and Road Registered Information Security Personnel), the certificate holder has mastered international network security laws, regulations, standards and specifications, as well as security guarantee and main technologies, and is engaged in the construction, operation, maintenance and management of information systems in information security enterprises, information security assessment agencies, government agencies, enterprises and institutions in various countries.
Free CISP learning materials and knowledge map: /CISP/XZL/N 125.html? fcode=h 1000026