Become Certified

Get Certified

Tenable's Certification Program is designed to provide proof that your staff is fully trained on Tenable's products. Tenable offers five levels of recognition for individual achievement.

Stay Certified

All certifications are valid for two years after the date the exam is passed.

TCNU

Tenable Certified Nessus User

Candidates who successfully complete the requirements of this certification track have distinguished themselves as having basic knowledge of the Nessus vulnerability scanner and the underlying technical concepts. The preparatory training course is offered on demand.

Learn More

Buy Now

TCNA

Tenable Certified Nessus Auditor

Candidates who successfully complete the requirements of this advanced certification track have distinguished themselves as having in-depth knowledge of the Nessus vulnerability scanner and the underlying technical concepts. The three preparatory training courses are offered on demand.

Learn More

Buy Now

TCPA

Tenable Certified PVS Auditor

Candidates who successfully complete the requirements of this certification track have distinguished themselves as having in-depth knowledge of the Passive Vulnerability Scanner and the underlying technical concepts. The preparatory training course is offered on demand.

Learn More

Buy Now

TCSE

Tenable Certified Security Engineer

Candidates who successfully complete the requirements of this certification have demonstrated the ability to install, configure, and maintain Tenable’s SecurityCenter and Passive Vulnerability Scanner, including an understanding of the management capabilities with regard to policy control, data access, oversight, and delegation of duties within these products.

Learn More

Contact Us

TCLM

Tenable Certified Log Manager

Candidates who successfully complete the requirements of this certification have demonstrated the ability to install, configure, and maintain Tenable’s Log Correlation Engine. In addition, they have demonstrated an understanding of event management and correlation and network behavioral anomaly.

Learn More

Contact Us