0% found this document useful (0 votes)
42 views8 pages

Certification Brochures

GIAC develops and administers over 30 cybersecurity certifications that are aligned with SANS training courses. The certifications ensure mastery of critical security domains through rigorous exams. GIAC certifications provide the highest assurance of cybersecurity knowledge and skills to meet modern threats facing industry, government, and military.

Uploaded by

Linh Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views8 pages

Certification Brochures

GIAC develops and administers over 30 cybersecurity certifications that are aligned with SANS training courses. The certifications ensure mastery of critical security domains through rigorous exams. GIAC certifications provide the highest assurance of cybersecurity knowledge and skills to meet modern threats facing industry, government, and military.

Uploaded by

Linh Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

DEEPER KNOWLEDGE. ADVANCED SECURITY.

Global Information Assurance Certification


(GIAC) develops and administers the premier
certifications for information security
professionals. More than 30 certifications align
with SANS training and ensure mastery in
critical, specialized InfoSec domains. GIAC
certifications provide the highest and most
rigorous assurance of cybersecurity knowledge
and skill available to industry, government,
and military clients across the world.
The most The highest
trusted source standard in
for information cybersecurity
security training, certification.
certification Job-Specific, Specialized Focus
and research. Today’s cyber attacks are highly sophisticated and
exploit specific vulnerabilities. Broad, general InfoSec
certifications are no longer enough. Professionals need
SANS Training specific skills and specialized knowledge to meet multiple,
varied threats. GIAC offers more than 30 certifications.
SANS Training: Develops real-world
Each certification focuses on specific job skills and
knowledge and hands-on skills
requires unmatched and distinct knowledge.
Certification Deep, Real-World Knowledge
GIAC Certifications: Assure the highest
Theoretical knowledge is the ultimate security risk.
levels of job- specific knowledge
Deep, technical, real-world knowledge and skills are
the only reliable means to reduce security risk. SANS
Research
is the leader in providing training that builds practical
SANS Research: Advancement of knowledge, hands-on skills, and technical depth.
InfoSec theory and practice A GIAC certification ensures mastery of real-world
knowledge and skills.

Most Trusted Certification Design


The design of a certification exam can impact the
quality and integrity of a certification. GIAC exam
content and question design are developed through a
rigorous process led by GIAC’s on-staff psychometrician
and reviewed by experts in each technical area. More
than 80,000 certifications have been issued since 1999.
GIAC certifications meet ANSI/ISO 17024 standards.
CYBER
DEFENSE

APPLICATION MANAGEMENT PENETRATION


SECURITY LEGAL AND TESTING
AUDIT

DIGITAL
FORENSICS

CYBER DEFENSE
The essential skills and techniques needed to protect and secure an
organization’s critical information assets, business systems,
and industrial controls.
SANS Training Courses: 18 | GIAC Certifications: 10

PENETRATION TESTING
The identification and assessment of potential attacks and vulnerabilities,
and implementation of defenses and immediate responses to contain,
mitigate, and remediate risks.
SANS Training Courses: 13 | GIAC Certifications: 7

DIGITAL FORENSICS
The acquisition and examination of evidence from digital systems
to find and recover known artifacts essential to information
and systems security.
SANS Training Courses: 8 | GIAC Certifications: 5

APPLICATION SECURITY
The design, development, and defense of secure application
software and systems.
SANS Training Courses: 6 | GIAC Certifications: 3

MANAGEMENT, LEGAL AND AUDIT


The leadership and management of security teams and risk analysis
techniques to conduct a technical audit of essential information systems.
SANS Training Courses: 14 | GIAC Certifications: 6
Why
Certification?
Better Job
Performance
More than 50% of IT
managers say their staff was
significantly more effective or
more effective on the job after
certification.
(IT SKills and Salary Report, Global Knowledge, 2012)

More Hiring
Potential
U.S. Department of Defense
Directive 8140 (8570) requires
certification of all cybersecurity
GSE: The Certification Like No Other
professionals.
Only the true security elite hold a GIAC Security Expert certification
Cybersecurity jobs are 50% (GSE). For good reason. It’s the most prestigious, most demanding
more likely to require certifi- certification in the information security industry. The GSE’s performance-
cation than IT jobs. based, hands-on nature sets it apart from any other certification in the
(2015 Burning Glass)
IT security industry. Those who earn the GSE master the wide variety of
skills, across multiple domains, required by top security professionals.
They demonstrate expertise in applying knowledge in a hands-on
environment.

GSEs are verified network packet ninjas with world-class incident


response capabilities. In addition to superior technical skills, GSEs
must have demonstrated a keen awareness of important business
drivers and considerations, a skillset that is too rare among less
GIAC seasoned technical personnel.
Gold Status GSE. For the very few, the very best, cybersecurity professionals.

Today’s cybersecurity leaders


need both technical expertise
and communication skills.
Candidates work with an advisor
to submit a peer-reviewed
“Gold Paper” in their area of
Information Security expertise.
Approved papers are published
in the SANS Reading Room for
industry reference.

DEEPER KNOWLEDGE. ADVANCED SECURITY.


GIAC Certification Portfolio
GIAC SANS
Certification Course Areas Covered

• Information Security Foundations


SEC301
CYBER DEFENSE*

• Cryptography
Intro to Information Security
• Network Protection Strategies and Host Protection
Information Security Fundamentals

• Prevention of attacks and detection of adversaries


SEC401 • Networking Concepts, Defense in Depth, Secure
Security Essentials Communications
Security Essentials • Foundational Windows and Linux Security

• Defensive Network Infrastructure and Packet Analysis


SEC501 • Pen Testing and Vulnerability Analysis and Mitigation
Advanced Security Essentials
• Incident Response, Malware and Data Loss Prevention
Enterprise Defender

SEC502 • Network Security, IP and Packet Decoding


Perimeter • Endpoint-Host Security
Protection • Logging Wireless, Encryption, VPNs and Cloud
Perimeter Protection Analyst

• Fundamentals of Traffic Analysis and Application Protocols


SEC503 • Open Source IDS: Snort and Bro
Intrusion Detection
• Network Traffic Forensics and Monitoring
Intrusion Analyst

SEC505 • Windows OS and Application Hardening


Securing Windows • PowerShell Scripting and Managing Cryptography
and Powershell
Automation • Server Hardening, IPSec, Dynamic Access Control and DNS
Windows Security Administrator

• Hardening Linux/Unix
SEC506 • Application Security in Depth
Securing Linux/Unix
• Digital Forensics in the Linux/Unix Environment
Unix Security Administrator

• Security Architecture and Security Operations Centers (SOCs)


SEC511 • Network Security Architecture and Monitoring
Continuous
Monitoring • Endpoint Security Architecture, Automation and Continuous
Continuous Monitoring Monitoring

• Overview of the Critical Controls and Asset Inventories


• Vulnerability Assessments and Remediation, Privileges, Logging
SEC566 • Email and Browser Protections, Malware, Control of Network
Critical Security Access and Protocols, Data Protection and Recovery and Secure
Controls Configurations
Critical Controls
• Wireless Device Control, Application Security, Incident
Response, and Penetration Testing

• Industrial Control Systems (ICS/SCADA) and Information


ICS410 Technology
ICS/SCADA • Defending ICS Devices, Workstations, Servers and Networks
Security Essentials
Global Industrial • ICS/SCADA Security Governance
Cybersecurity Professional

*SANS training is not required for Certification Challenge


GIAC SANS
Certification Course Areas Covered

SEC504 • Incident Handling and Computer Crime Investigation


Hacker Tools and Incident • Computer and Network Hacker Exploits
PENETRATION TESTING

Handling • Hacker Tools (Nmap, Nessus, Metasploit and Netcat)


Incident Handler

• Comphrehensive Pen Test Planning, Scoping and Recon


SEC560 • In-Depth Scanning and Exploitation, Post-Exploitation and Pivoting
Network Pen Testing
• In-Depth Password Attacks and Web App Pen Testing
Penetration Tester

• Web App Pen Testing and Ethical Hacking: Configuration,


SEC542 Identity and Authentication
Web App Pen Testing • Injection, JavaScript, XSS, and SQL Injection
Web Application Penetration Tester • CSRF, Logic Flaws and Tools (sqlmap, MetaSploit, and BeEF)

• Python Essentials: Variable and Math Operations, Strings and


Functions and Compound Statements
SEC573 • Data Structures and Programming Concepts, Debugging,
Python for Pen Testers System Arguments and ArgParcer
Python Coder • Python Application Development for Pen Testing: Backdoors
and SQL Injection

• Mobile Device Architecture and Common Threats (Android and


iOS)
SEC575 • Platform Access, Application Analysis and Reverse Engineering
Mobile Device Security • Penetration Testing Mobile Devices: Probe Mapping, Enterprise
Mobile Device and Network Attacks, Sidejacking, SSL/TLS Attacks, SQL and
Security Analyst
Side Injection

• Wireless Data Collection, WiFi MAC Analysis, and Wireless Tools


SEC617 (Kismet and Wireshark), Attacking WEP
Wireless Ethical Hacking and • Client, Crypto and Enterprise Attacks
Pen Testing • Advanced WiFi Attacks: DoS Attacks, Fuzzing, Bridging the
Assessing and
Auditing Wireless Networks Airgap, Bluetooth, DECT and ZigBee

• Network Attacks, Crypto, Network Booting and Restricted


SEC660 Environments
Advanced Pen Testing • Python, Scapy and Fuzzing
Exploit Researcher and • Exploiting Windows and Linux for Penetration Testers
Advanced Penetration Tester

• Windows Forensics and Data Triage


• Windows Registry Forensics, USB Devices, Shell Items, Key
FOR408
DIGITAL FORENSICS

Word Searching, Email and Event Logs


Windows Forensic Analysis
• Web Browser Forensics (FireFox, IE and Chrome) and Tools
Forensic Examiner
(Nirsoft, Woanware, SQLite, ESEDatabaseView and Hindsight)

• Advanced Incident Response and Digital Forensics


FOR508 • Memory Forensics, Timeline Analysis and Anti-Forensics
Advanced Digital Forensics Detection
Forensic Analyst • Threat Hunting and APT Intrusion Incident Response

• Network Forensics in Depth: Web Proxy Servers, Payload


Reconstruction, Packet Capture and Tools (tcpdump and
FOR572 Wireshark)
Advanced Network Forensics • NetFlow Analysis, Visualization, Network Protocols and Wireless
Network Forensic Analyst Investigations
• Logging, OPSEC, Encryption, Protocol Reversing and Automation
GIAC SANS
Certification Course Areas Covered

• Smartphone Overview and Malware Forensics


FOR585 • Android, iOS and Blackberry Forensics
Advanced Smartphone
Forensics • Third-Party Applications and Other Devices (Windows, Nokia
Advanced Smartphone Forensics and Knock-Off Devices)

• Malware Analysis and Malicious Code Fundamentals and


Analysis
FOR610 • In-Depth Malware Analysis and Tools (OllyDbg, Process
Reverse Engineering Malware Dumping Tools and Imports-Rebuilding Tools)
Reverse Engineering Malware • Self-Defending Malware, Malicious Documents and Memory
Forensics

• Web Application Architecture, Authentication and


Authorization Vulnerabilities and Defense and Mitigation
DEV522
APPLICATION SECURITY

• Proactive Defense and Operation Security, AJAX and Web


Defending Web Applications
Services Security
Web Application Defender
• Clickjacking, DNS Rebinding, Flash, Java, SSO and IPv6

• Data Validation, Authentication and Session Management


DEV541 • Java Platform and API Security
Securing Code in JAVA/JEE
• Secure Development Lifecycle
Secure Software Programmer-Java

• Data Validation, Authentication and Session Management


DEV544 • .NET Framework Security
Securing Code in .Net
• Secure Development Lifecycle
Secure Software Programmer- .NET

• Security and Risk Management, Asset Security and Security


Engineering, Communication and Network Security
MANAGEMENT, LEGAL AND AUDIT

MGT414 • Identity and Access Management, Security Assessment and


SANS Training for CISSP®
Security Operations
Information Security Professional
• Software Development Security

• Managing the Enterprise, Planning, Network and Physical Plant


• IP Concepts, Attacks Against the Enterprise and Defense-in-
MGT512 Depth
Leadership Essentials • Secure Communications (Cryptography, Wireless, Steganography,
Security Leadership Web and OPSEC), Intellectual Property, Incident Handling,
Disaster Recovery/Planning and Risk Management

• Project Management Structure and Framework


MGT525 • Time and Cost Management, Communications and Human
IT Project Resources
Management • Quality and Risk Management, Procurement, Stakeholder
Project Manager
Management and Project Integration

• IT Security Law and Policy, E-Records, E-Discovery and Business


Law
LEG523 • Contracting for Data Security (Sarbanes-Oxley, Gramm-Leach-
Law of Data Security Bliley, HIPPA, EU Data Directive and Data Breach Notice Laws)
Law of Data Security & Investigations • IT Compliance and How to Conduct Investigations and Crisis
Management

• Auditing, Risk Assessments and Reporting


AUD507 • Network and Perimeter Auditing/Monitoring, and Web
Auditing and Monitoring Application Auditing
Networks
Systems and Network Auditor • Auditing and Monitoring in Windows and Unix Environments
“I think the exam was both fair and
practical. These are the kind of real-
world problems I expect to see in the
field.”
– Carl Hallberg, GREM, Wells Fargo
HELPING INDIVIDUALS
AND ORGANIZATIONS
“GIAC made the testing process much
MASTER CYBERSECURITY
better than other organizations. The
material is spot on with what I do at
work, daily.”
– Jason Pfister, GMON, EWEB

“It feels like SANS and GIAC are working


with the candidates to help them to
Cybersecurity Awareness meet the required standards, which
are achievable with hard work.”
Securing The Human for organizations
that need to improve cybersecurity – Thomas Gurney, GCIA
throughout their organization.
“It’s an awesome effort: great questions,
excellent material and presentation
throughout the (training event) week.
I’ve really enjoyed it and will recommend
it to many. Thank you GIAC/SANS!”
CyberTalent Sourcing
– Nicholas B., GCIH, Intrasys
SANS CyberTalent for organizations
in need of trained and certified
cybersecurity experts.

Interactive Learning
Hands-on cyber range learning with
a focus on mastering the skills that
information security professionals
can use in their jobs every day.
Primary Logos Primary Logo with Tag Tiny Logo

Primary Logo

Advanced Degrees
SANS Technology Institute for
IT professionals seeking to advance
their career by focusing on
cybersecurity leadership and
management. Black & White Logo

DEEPER KNOWLEDGE. ADVANCED SECURITY.

INFO@GIAC.ORG WWW.GIAC.ORG

Outline Logo Summer 2016

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy