Each certification is mapped to the National Cybersecurity Workforce Framework (NCWF). The Framework organizes cybersecurity into seven high-level Categories, each comprised of several specialty areas, work roles, knowledge, skills, abilities, and tasks. These seven high-level Categories are aligned directly to the CCE® Program’s certification Concentration Areas. Candidates often prepare for an exam by using a variety of resources that familiarize them with the authoritative sources and the exam’s concentration area.
Third-party products and services, including course instructors have helped many candidates to close knowledge and skill gaps. Lunarline does not endorse any particular provider and encourages candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and the exam’s concentration area.
Successful completion of this exam will demonstrate a candidates ability to exhibit key practices for mitigating the most egregious exploitable software weaknesses. They will demonstrate their extensive knowledge on software security testing; secure coding, architecture and design. The candidate will also demonstrate their knowledge on software supply chain risk management and due diligence.
Candidates must possess at least 5 years relevant experience in security architecture in order to obtain the Expert-level certificate. Those that pass the test, but do not possess the requisite experience, will be awarded the Certified Expert Associate Certificate; this can be upgraded upon obtaining the necessary experience. Send qualifying details to email@example.com upon eligibility.
Independence:The Lunarline SCS Training Program and Certification Program are independent from one another. Although they may target the same NICE category, specialty area, work role, and/or authoritative sources, certification exams are not based on any SCS training. Taking SCS training is NOT required and the CCE Program Certification Body does not guarantee that an individual will pass nor have any advantage based on participation with SCS training.
Continuing Education:The Lunarline SCS Training Program and other third-party vendors offer activities, products and services across the country that qualify as Professional Development Credits (PDCs) that target the same NICE category, specialty area, work role, and/or authoritative sources as our certifications. We encourage candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and reflect their learning styles and needs.
Cybersecurity Tools and Analysis (PR210)
Ethical Hacking and Penetration Testing (PR133)
PhP Hacker (PR150)
Risk Management Framework (RMF) for Federal Systems Security Controls Assessor (SCA) – SP (SP202-SP)
Secure Software Assessor (SP202-RBT)
Securing Coding – Intersystems (SP250)
Securing Web Apps, Applications, and Servers (SP143)