Why IT certifications are easy to verify, in principle
Every major IT certifier operates a public or semi-public verification portal. The badge URL or verification ID is the authoritative artifact. The PDF certificate is context, not evidence. The pattern follows the cloud-certification model covered in our AWS, GCP, Azure verification guide and the broader PMP, CFA, CPA, CISSP guide.
What changes by certifier is the portal URL, the input format (badge ID vs verification code vs candidate-shared link), and the renewal cycle.
CompTIA: Credly badges + Marketplace verification
CompTIA migrated its digital credentials to Credly years ago. Every active CompTIA certification (Security+, Network+, A+, CySA+, PenTest+, Server+, CASP+, Linux+, Project+) is issued as a Credly badge with a public URL.
The verification flow:
- Ask the candidate for their public Credly badge URL (credly.com/badges/...) or their CompTIA Marketplace verification ID.
- Open the badge URL. Confirm issuer is CompTIA, the certification name matches, and the badge is active.
- Check the expiry: most CompTIA certifications renew on a three-year cycle through Continuing Education Units (CEUs).
A candidate without a Credly profile is unusual in 2026. CompTIA pushes new credential holders to claim the badge at issuance; refusal to share the URL is worth following up on.
Cisco: CertMetrics 16-digit verification code
Cisco runs its certification verification through CertMetrics. The public portal is at cp.certmetrics.com/cisco/en/public/verify/credential.
The flow:
- Ask the candidate for the 16-digit verification code from their Cisco certificate. The code appears on the certificate document; CertMetrics generates it at issuance.
- Enter the code on the verification page. The portal returns certification name (CCNA, CCNP, CCIE, DevNet, CyberOps), status (active or expired), issue date, and expiry.
- Cisco certifications recertify every three years. An inactive entry typically means the holder did not complete continuing education or did not pass the recertification exam.
The 16-digit code is the friction. Candidates who claim a Cisco certification but cannot produce the code are worth a closer look; the code is on every CertMetrics-issued certificate by design.
Red Hat, Oracle, VMware (Broadcom), Juniper
The remaining four major IT certifiers in 2026:
- Red Hat. Red Hat Certification Central at rhtapps.redhat.com/verify. Public verification. Inputs: certificate ID and last name. Returns certification (RHCSA, RHCE, RHCA), status, and issue date.
- Oracle. Oracle CertView. Requires the candidate to log in and grant access or share a PDF with verification ID. Less self-serve than the others, but most candidates can produce the CertView share within hours.
- VMware (now Broadcom). VMware Learning portal verification. Certifications (VCP-DCV, VCP-NV, VCAP, VCIX, VCDX) are now under the Broadcom umbrella since the 2024 acquisition. The verification flow continues through the legacy VMware Learning system as of 2026.
- Juniper. Juniper Certification Track through Pearson VUE. The verification model is candidate-shared rather than public.
The verification ID is the artifact. The PDF is context. A candidate who cannot produce the URL or code for an active certification is the same signal in every vendor portal.
When the candidate only has a PDF: forensic AI fallback
Three reasons a candidate may produce a PDF but no URL or code: the certification is from a smaller vendor without a public lookup, the certification expired and the public badge was deactivated, or the PDF is fake. Forensic AI tells the three apart.
The engine inspects:
- PDF producer metadata. A real certifier-issued PDF carries the producer string of the certification system (Pearson VUE, CertMetrics, Credly, Acclaim). A producer of Adobe Photoshop or Microsoft Word is decisive.
- Error Level Analysis on the rendered image. Edited fields (candidate name, certification name, date) glow against an otherwise uniform background.
- Font kerning on the name and date lines. Pasted text rarely matches the template’s native rendering.
- Template-pattern comparison against the certifier’s known layout library.
See our Photoshop and AI document detection guide for the underlying methods.
The DoD 8570 / DoD 8140 compliance case
Federal contracting and Department of Defense cybersecurity hiring add a compliance layer. DoD Directive 8570 (now updated by DoD 8140) requires information assurance personnel to hold specific industry certifications at categorized levels: Security+, CISSP, CEH, GIAC GSEC, and others.
For roles in scope, the verification is not optional and the certification must be active throughout employment. The compliance flow:
- Verify the certification through the official certifier portal (CompTIA via Credly, ISC2 for CISSP, EC-Council for CEH, etc.).
- Set up ongoing monitoring. CEU lapses can move a certified employee out of compliance overnight.
- Document the verification artifact in the employee’s compliance file. Auditors will ask.
The 2026 hiring workflow that actually scales
For teams hiring more than a handful of certified IT roles per quarter, three operational changes pay off:
- Add a required application field per claimed certification: certifier, certification name, verification URL or ID, expiry date. Reject PDFs-only at the application step.
- Automate the verification lookup. Credly has a badge API; CertMetrics, Red Hat, and others can be scripted within terms of service. Most teams hit the public portal directly.
- Run forensic AI on any candidate-supplied PDF as a background step. Cents per check; catches the forgeries that lack a working URL.
Frequently asked questions
Are paid practice-exam “certifications” the same as real certifications?
No. Practice-exam vendors (some specifically named in hiring forums) issue completion certificates that look like the real thing. They are not the same as vendor-issued certifications. Verify through the official vendor portal; the practice-exam vendor completions do not appear there.
Do IT certifications appear on LinkedIn reliably?
LinkedIn imports from Credly and CertMetrics for the major vendors, which is reliable. Self-entered LinkedIn certifications are not. Treat LinkedIn as context, not evidence.
What does “continuing education” mean for IT certs?
Most IT certifications renew on a three-year cycle through Continuing Education Units (CEUs) earned by attending events, completing related training, or passing newer exams. CompTIA, Cisco, ISC2, and ISACA all use similar CEU systems. A certification that lapsed for failure to maintain CEUs reads as expired on the verification portal.
Can a candidate verify their own certification before submitting?
Yes and they should. Most certifier portals let the holder pull a verification URL or PDF on demand. Asking the candidate to verify before submission catches name-spelling mismatches and stale records before the recruiter sees them.
What about retired certifications (CCENT, MCSE, MCITP)?
Retired certifications are still verifiable through the vendor portal but reflect the holder’s historical status. They do not signal current skill with the current technology. Read the badge description for retirement context.