Gain Top-Notch Cyber Skills. Register for SANS Chicago 2017. Save $400 thru June 28.

Why Certify with GIAC

Learn why over 70,000 cyber security professionals have chosen GIAC to validate their hands-on cyber security skills.

GIAC Certifications exists to provide assurance that certified professionals possess the right skills and knowledge to work in key areas of cyber security.

Trusted by thousands of organisations including enterprises, FTSE 100 companies, military organisations and governments, GIAC certifications are well respected.

There is a wide range of GIAC certifications, covering Core, Advanced and Specialised certifications in areas such as defence, audit, ICS, DFIR, management, penetration testing, and software security. The certifications cater for a range of skill sets from entry-level to broad-based security essentials and advanced.

GIAC is the only certification body that offers certifications that cover advanced technical subject areas. GIAC is also independent.

For enterprises and individuals, GIAC Certification offers many business, strategic and reputational benefits.

Achieve your Goals

GIAC can help students achieve their goals and meet their cyber security career planning and learning development objectives.

Corporate Governance

GIAC Certification is designed to ensure Certified professionals possess skills and knowledge that are of the highest order. By requiring security team members to be GIAC Certified, managers are taking the best steps possible to mitigate cyber risks against their business.

Reduce Risk

Recruitment is an expensive and time consuming process. Seeking out professionals with GIAC Certification reduces risk. Employers can be certain that a candidate possessing a GIAC Certification will have hands-on security skills of the highest order. The Certification also endorses the applicant's technical knowledge.

A Powerful Management Tool

Encouraging security team members to study for, and to take, GIAC Certification is a reliable way of ensuring the team's strength.

GIAC Certifications are founded on a global, up-to-date body of knowledge. Encouraging a team to regularly prepare for, and to sit, GIAC examinations ensures their skills and knowledge are on the cutting edge.

Standardise your Training

By standardising training and development, employers ensure the whole security team speaks the same language, follows the same process and adopts the same philosophy.

Market your Assets

By having a security team that consists of GIAC Certified professionals, businesses send a potent message to customers. By placing an emphasis on security training the message is clear: "we take our customers' information, privacy and security very seriously."

For Employees

GIAC certification offers advantages for individuals working in the cyber security industry.

Prove your Skills

Talk is cheap - anyone can write a creative CV. Possessing a GIAC Certification is an indelible way of validating cyber security skills. It proves - beyond any doubt - that professionals have technical skills, proven knowledge, and have earned their stripes.

Stand Out

For professionals, holding a GIAC certification is a powerful means of differentiation. Recruiters and HR departments often actively search for, and prioritise, candidates who have achieved GIAC certification.

Keep your Skillset Fresh

There's no substitute for a structured approach to professional development. By preparing for, and passing, a GIAC Certification professionals are making the best investment in their career.

Click here to see how to get certified or choose from a certification below.


GIAC Certifications
Level Certification Course Register
Level 1 GISF SEC301: Intro to Information Security  
GCIH SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling  
GCFE FOR500: Windows Forensic Analysis  
GSEC SEC401: Security Essentials Bootcamp Style  
GWEB DEV522: Defending Web Applications Security Essentials  
GCIA SEC503: Intrusion Detection In-Depth  
GPEN SEC560: Network Penetration Testing and Ethical Hacking  
GCFA FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting  
GLEG LEG523: Law of Data Security and Investigations  
GICSP ICS410: ICS/SCADA Security Essentials  
Level 2 GSEC SEC401: Security Essentials Bootcamp Style  
GCFA FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting  
GNFA FOR572: Advanced Network Forensics and Analysis  
GASF FOR585: Advanced Smartphone Forensics  
GCIA SEC503: Intrusion Detection In-Depth  
GCFE FOR500: Windows Forensic Analysis  
GSLC MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™  
GCPM MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep  
GSSP-JAVA DEV541: Secure Coding in Java/JEE: Developing Defensible Applications  
GSSP-.NET DEV544: Secure Coding in .NET: Developing Defensible Applications  
GSNA AUD507: Auditing & Monitoring Networks, Perimeters & Systems  
GRID ICS515: ICS Active Defense and Incident Response  
Level 3 GCED SEC501: Advanced Security Essentials - Enterprise Defender  
GCIA SEC503: Intrusion Detection In-Depth  
GCWN SEC505: Securing Windows and PowerShell Automation  
GCUX SEC506: Securing Linux/Unix  
GREM FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques  
GCIH SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling  
GLEG LEG523: Law of Data Security and Investigations  
GMON SEC511: Continuous Monitoring and Security Operations  
GNFA FOR572: Advanced Network Forensics and Analysis  
Level 4 GWAPT SEC542: Web App Penetration Testing and Ethical Hacking  
GPEN SEC560: Network Penetration Testing and Ethical Hacking  
GPYC SEC573: Automating Information Security with Python  
GMOB SEC575: Mobile Device Security and Ethical Hacking  
Level 5 GAWN SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses  
GXPN SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking  
Specialty Courses GMON SEC511: Continuous Monitoring and Security Operations  
GCCC SEC566: Implementing and Auditing the Critical Security Controls - In-Depth  
GISP MGT414: SANS Training Program for CISSP® Certification  
GSNA AUD507: Auditing & Monitoring Networks, Perimeters & Systems  
GWAPT SEC542: Web App Penetration Testing and Ethical Hacking  
GCIH SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling  
GCWN SEC505: Securing Windows and PowerShell Automation  
GCUX SEC506: Securing Linux/Unix  
GAWN SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses