Global Certifications

NCIIPC-QCI Conformity Assessment Framework for Cybersecurity of CSEs

The implementation, operation and management of cyber security in CSEs requires to be assessed by independent accredited Certification Bodies (CBs) and Inspection Bodies (IBs) for compliance with prescribed standards for the sectors. Further, the CSEs require competent cyber security professionals, who are assessed and certified by independent accredited Personnel Certification Bodies (PrCBs). The CSEs also require competent consultancy organisations (COs) and training bodies (TBs), whose expertise and competence is assessed and certified by independent Accreditation Bodies (ABs).

NCIIPC and Quality Council of India (QCI) have formulated and designed a comprehensive Scheme for “Conformity Assessment Framework for Cybersecurity of Critical Sector Entities”. The objective of the Scheme is to establish robust cybersecurity accreditation, certification and inspection processes for

  • critical sector entities (CSEs)
  • cybersecurity professionals
  • consulting organisations (COs)
  • training bodies (TBs)

The Scheme incorporates the international framework for accreditation of conformity assessment bodies, viz,  CBs, IBs and PrCBs, which is the most appropriate mechanism to ensure quality, integrity, consistency and standardisation.

The CAF for cyber security of CSEs comprises of the following Schemes:

  • Certification Scheme for Cyber Security Management System (CSMS) at Levels 1,2 and 3.
  • Inspection Scheme for Information Technology and Industrial Control Systems (IT/ICS).
  • Personnel Certification Scheme for Cyber Security Professionals.
  • Accreditation Scheme for IT/ICS Consultancy Organisations (COs).
  • Accreditation Scheme for IT/ICS Training Bodies (TBs).

Details of the Scheme are available on NCIIPC and QCI websites.

The outcomes delivered by the Schemes are as under:

  • Pool of accredited CBs & IBs: The Government, Regulators, NCIIPC, CSEs and other organisations will have a pool of accredited CBs and IBs for carrying out conformity assessment and/ or inspection of an organisation’s information infrastructure and information security/ cybersecurity management system (ISMS/ CSMS).

  • Pool of accredited PrCBs and certified Cyber Security Professionals: All organisations will have an indigenous pool of certified cybersecurity professionals, who are assessed and certified by accredited PrCBs for their competence (knowledge, skills, expertise) to implement and ensure IT and OT cyber resilience. The competency certification of cybersecurity professionals is closely aligned with the workforce competency described here.

  • Pool of accredited COs and TBs: All organisations will have an indigenous pool of accredited COs and TBs with independently certified expertise and competence, to provide them cybersecurity consultancy services and train their workforce. The COs and TBs themselves will leverage the established pool of CSPs for delivering their services.

The Scheme as a whole is adapted to the cybersecurity requirements of CSEs and other organisations of the Indian ecosystem. It is expected to contribute to building national capacity in the cybersecurity domain.

Global Certifications

An illustrative list of cybersecurity certifications offered by global certifying bodies has been compiled from publicly available information and is given below. It also gives a generic mapping of the certifications to the domains defined here. The list has not been vetted for correctness and completeness. Suggestions for improvements and rectification of errors are welcome.

.Issuing BodyCertificationDescriptionIndicative Domain(s)
1ISACACISACertified Information Security AuditorGovernance, Risk and Compliance
2ISACACRISCCertified in Risk and Information Systems ControlGovernance, Risk and Compliance
3ISACACISMCertified Information Security ManagerCyber Defence
4ISACACGEITCertified in the Governance of Enterprise ITGovernance, Risk and Compliance
5ISACACSX–PCybersecurity Practitioner CertificationCyber Defence
6ISACACDPSECertified Data Privacy Solutions EngineerApplications & Data Security Administration
7ISACAITCAInformation Technology Certified AssociateCyber Defence
8ISACACETCertified in Emerging Technology CertificationTechnology & System Security Architecture
9ISACACOBIT FoundationCOBIT Foundation CertificatesGovernance, Risk and Compliance
10ISACACOBIT DesignCOBIT Design and ImplementationGovernance, Risk and Compliance
11ISACACOBIT and NISTImplementing the NIST Cybersecurity Framework Using COBIT 2019Governance, Risk and Compliance
12ISACAIT RISKIT Risk Fundamentals CertificateGovernance, Risk and Compliance
13ISACACCAKCertificate in Cloud Auditing KnowledgeGovernance, Risk and Compliance
14ISACACSX NEXUSCSX Nexus Cybersecurity CertificatesGovernance, Risk and Compliance
15ISACACYBERSECURITY AUDITCybersecurity Audit Certificate ProgramGovernance, Risk and Compliance
16ISACACOMPUTINGComputing Fundamentals CertificateSecurity Support Services
17ISACANETWORKS AND INFRANetworks and Infrastructure Fundamentals CertificateNetwork & Systems Security Administration
18ISACACYBERSECURITYCybersecurity Fundamentals CertificateSecurity Support Services
19ISACAS/W DEVELOPMENTSoftware Development Fundamentals CertificateSecure Software Development
20ISACACLOUDCloud Fundamentals CertificateTechnology & System Security Architecture
21ISACABLOCKCHAINBlockchain Fundamentals CertificateTechnology & System Security Architecture
22ISACAIOTIoT Fundamentals CertificateICS Cybersecurity
23ISACAAIArtificial Intelligence Fundamentals CertificateTechnology & System Security Architecture
24ISC2CISSPCertified Information Systems Security ProfessionalCyber Defence
25ISC2SSCPSystem Security Certified PractitionerSystem Security Administration
26ISC2CCSPCertified Cloud Security ProfessionalSystem Security Administration
27ISC2CAPCertified Authorisation ProfessionalGovernance, Risk and Compliance
28ISC2CSSLPCertified Secure Software Lifecycle ProfessionalSecure Software Development
29ISC2HCISSPHealthcare Information Systems Security ProfessionalCyber Defence
30ISC2CISSP ISAPInformation System Security Engineering ProfessionalTechnology & System Security Architecture
31ISC2CISSP ISEPInformation System Security Management ProfessionalSystem Security Administration
32ISC2CISSP ISMPInformation System Security Architecture ProfessionalTechnology and System Security Architecture
33GIACGSECGIAC Security Essentials (GSEC)Cyber Defence
34GIACGCIAGIAC Certified Intrusion Analyst (GCIA)Cyber Defence
35GIACGMONGIAC Continuous Monitoring Certification (GMON)Cyber Defence
36GIACGCPMGIAC Certified Project Manager (GCPM)Cybersecurity Training & Awareness
37GIACGPENGIAC Penetration Tester (GPEN)Cyber Defence
38GIACGSOMGIAC Security Operations Manager (GSOM)Security Operations
39GIACGOSIGIAC Open Source Intelligence (GOSI)Cyber Vulnerability, Threat and Risk Management
40GIACGNFAGIAC Network Forensic Analyst (GNFA)Cyber Defence
41GIACGXPNGIAC Exploit Researcher and Advanced Penetration Tester (GXPN)Cyber Defence
42GIACGWAPTGIAC Web Application Penetration Tester (GWAPT)Cyber Defence
43GIACGREMGIAC Reverse Engineering Malware (GREM)Cyber Defence
44GIACGCIHGIAC Certified Incident Handler (GCIH)Cyber Vulnerability, Threat and Risk Management
45GIACGCCCGIAC Critical Controls Certification (GCCC)Cyber Vulnerability, Threat and Risk Management
46GIACGCFAGIAC Certified Forensic Analyst (GCFA)Cyber Forensics and Investigation
47GIACGCFSGIAC Certified Forensic Examiner (GCFE)Cyber Forensics and Investigation
48GIACGSTRTGIAC Strategic Planning, Policy, and Leadership (GSTRT)Governance, Risk and Compliance
49GIACGISPGIAC Information Security Professional (GISP) 
50GIACGLEGGIAC Law of Data Security & Investigations (GLEG)Governance, Risk and Compliance
51GIACGWEBGIAC Certified Web Application Defender (GWEB)Applications and Data Security Administration
52GIACGSOCGIAC Security Operations Certified (GSOC)Security Operations
53GIACGSNAGIAC Systems and Network Auditor (GSNA)System Security Administration, Network Security Administration
54GIACGSLCGIAC Security Leadership (GSLC)Governance, Risk & Compliance
55GIACGRIDGIAC Response and Industrial Defence (GRID)Cyber Vulnerability, Threat and Risk Management
56GIACGPYCGIAC Python Coder (GPYC)Multiple domains
57GIACGPCSGIAC Public Cloud Security (GPCS)System Security Administration
58GIACGMOBGIAC Mobile Device Security Analyst (GMOB)System Security Administration
59GIACGISFGIAC Information Security Fundamentals (GISF)Cyber Defence
60GIACGICSPGlobal Industrial CSP (GICSP)Cyber Vulnerability, Threat and Risk Management
61GIACGFACTGIAC Foundational Cybersecurity Technologies (GFACT)Cyber Vulnerability, Threat and Risk Management
62GIACGEVAGIAC Enterprise Vulnerability Assessor (GEVA)Cyber Defence
63GIACGDSAGIAC Defensible Security Architecture (GDSA)Cyber Defence
64GIACGDATGIAC Defending Advanced Threats (GDAT)Cyber Defence
65GIACGCWNGIAC Certified Windows Security Administrator (GCWN)System Security Administration
66GIACGCTIGIAC Cyber Threat Intelligence (GCTI)Cyber Vulnerability, Threat and Risk Management
67GIACGCSAGIAC Cloud Security Automation (GCSA)Cyber Vulnerability, Threat and Risk Management
68GIACGCPNGIAC Cloud Penetration Tester (GCPN)Cyber Defence
69GIACGCLDGIAC Cloud Security Essentials (GCLD)Cyber Vulnerability, Threat and Risk Management
70GIACGCIPGIAC Critical Infrastructure Protection (GCIP)Cyber Defence
71GIACGCEDGIAC Certified Enterprise Defender (GCED)Cyber Vulnerability, Threat and Risk Management
72GIACGCDAGIAC Certified Detection Analyst (GCDA)Cyber Forensics and Investigation
73GIACGAWNGIAC Assessing and Auditing Wireless Networks (GAWN)Governance, Risk & Compliance
74GIACGBFAGIAC Battlefield Forensics and Acquisition (GBFA)Cyber Forensics and Investigation
75GIACGASFGIAC Advanced Smartphone Forensics (GASF)Cyber Forensics and Investigation
76GIACGIMEGIAC iOS and MacOS Examiner (GIME)Cyber Forensics and Investigation
77CompTIA N/ACompTIA IT FundamentalsCyber Defence
78CompTIA N/ACompTIA A+Cyber Defence
79CompTIA N/ACompTIA Network+Network Security Administration
80CompTIA N/ACompTIA Security+System Security Administration
81CompTIA N/ACompTIA Cloud+System Security Administration
82CompTIA N/ACompTIA Linux+System Security Administration
83CompTIA N/ACompTIA Server+System Security Administration
84CompTIA N/ACompTIA CySA+Cyber Vulnerability, Threat and Risk Management
85CompTIA N/ACompTIA CASP+Cyber Vulnerability, Threat and Risk Management
86CompTIA N/ACompTIA Pen Test+Cyber Defence
87CompTIA N/ACompTIA Data+Cyber Defence
88CompTIA N/ACompTIA Project+Cyber Defence
89CompTIA N/ACompTIA CTT+Cyber Defence
90CompTIA N/ACompTIA Cloud Essentials+Cyber Defence
91AccreditedBodiesN/ABusiness Continuity Professional CertificationCyber Defence
92AccreditedBodiesN/ALead Auditor in ISO 27001Governance, Risk & Compliance
93AccreditedBodiesN/ALead Implementor in ISO 27001Governance, Risk & Compliance