www.credly.com Open in urlscan Pro
3.136.35.34  Public Scan

Submitted URL: https://www.youracclaim.com/badges/8724a1b2-0ff8-4ef9-87e9-9a3ad0407d8b/public_url
Effective URL: https://www.credly.com/badges/ca464c69-34a9-4952-9e0d-ca9ddd1a3f6b/public_url
Submission: On October 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to content
Credly
Create Account
Sign In
Credly
Create Account
Sign In

We've detected that your browser has JavaScript disabled. Some features of
Credly require Javascript to be enabled. For the best experience, please enable
JavaScript in your browser settings or try using a different browser.

This badge was issued to Kalyan Kumar Addenki on January 16, 2017

Expires on January 31, 2026
Verify

Celebrate


CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP)

Issued by ISC2
The vendor-neutral CISSP credential confirms technical knowledge and experience
to design, engineer, implement, and manage the overall security posture of an
organization. Required by the world’s most security-conscious organizations,
CISSP is the gold-standard information security certification that assures
information security leaders possess the breadth and depth of knowledge to
establish holistic security programs that protect against threats in an
increasingly complex cyber world.The vendor-neutral CISSP credential confirms
technical knowledge and experience to design, engineer, implement, and manage
the overall security posture of an organization. Required by the world’s most
security-conscious organizations, CISSP is the gold-standard information
security certification that assures information security leaders possess the
breadth and depth of knowledge to establish holistic security programs that
protect against threats in an increasingly complex cyber
world.WWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWThe
vendor-neutral CISSP credential confirms technical knowledge and experience to
design, engineer, implement, and manage the overall security posture of an
organization. Required by the world’s most security-conscious organizations,
CISSP is the gold-standard information security certification that assures
information security leaders possess the breadth and depth of knowledge to
establish holistic security programs that protect against threats in an
increasingly complex cyber world.
Learn more


SKILLS

 * Access Management
 * Asset Security
 * Communications Security
 * Identity Management
 * Network Security
 * Risk Management
 * Security Assessment
 * Security Engineering
 * Security Management
 * Security Operations
 * Security Testing
 * Software Development Security


EARNING CRITERIA

 * Professional Experience
   Obtain the required experience
 * Assessment
   Achieve a passing score on the CISSP exam
 * Member
   Obtain an endorsement from an existing ISC2 member
 * Course
   Subscribe to the Code of Ethics
 * Education Experience
   Complete continuing professional education requirements


STANDARDS

ISO/IEC 17024:2012
ISO/IEC 17024:2012 contains principles and requirements for a body certifying
persons against specific requirements, and includes the development and
maintenance of a certification scheme for persons.


OCCUPATIONS


DIGITAL FORENSICS SPECIALISTS

Retrieve and analyze information from computers and other types of data storage
devices. Examine digital media that may have been hidden, encrypted, or damaged,
in a forensic manner to identify, preserve, recover, analyze, and present facts
and opinions about the digital information.

Learn More


CYBER SECURITY CONSULTANTS

Ensure online systems and networks are sufficiently protected from threats.
Assist with strategic planning, assessment, and operational execution of all
cyber security strategies, policies, and procedures. Establish and maintain a
comprehensive information security program to ensure that all information assets
are adequately protected against current and future internal and external
threats.

Learn More


CYBER SECURITY ANALYSTS

Plan, implement, upgrade, or monitor security measures for the protection of
computer networks and information. May ensure appropriate security controls are
in place that will safeguard digital files and vital electronic infrastructure.
May respond to computer security breaches and viruses.

Learn More


SECURITY MANAGEMENT SPECIALISTS

Conduct security assessments for organizations, and design security systems and
processes. May specialize in areas such as physical security, personnel
security, and information security. May work in fields such as health care,
banking, gaming, security engineering, or manufacturing.

Learn More


PENETRATION TESTERS

Test and reveal flaws in the security mechanisms of an information system to
determine the level of data protection and functionality resilience.

Learn More


RELATED

Certified Information Systems Security Professional (CISSP) (copy)
Associate of ISC2
Associate of ISC2




Request Demo
About Credly
Terms
Privacy
Developers
Support
Cookies
Do Not Sell My Personal Information

Request Demo
About Credly
Terms
Privacy
Developers
Support
Cookies
Do Not Sell My Personal Information


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. See Privacy Policy

Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
Privacy and Cookie Policy
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Reject All Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

Reject All Confirm My Choices