Last Day to Save $400 on 4-6 Day Courses at SANS Tysons Corner Fall 2017! Register Now.

GIAC Cyber Security Certifications

Global Information Assurance Certification, or GIAC for short, was founded to foster and uphold the highest professional standards among cyber security practitioners. Founded in 1999, GIAC was created to validate the skills of information security professionals, proving that those certified have the deep skills and technical knowledge necessary to work in key areas of cyber security.

GIAC information security certifications are respected because they:

  • Measure specific skills and knowledge - Although there are other entry-level certifications available, GIAC offers the only cyber security certifications that cover advanced technical subject areas.
  • Are recognised and trusted globally - Thousands of companies, agencies, governments and enterprises trust GIAC to ensure they are employing the best people.
  • Impartial - GIAC is independent and vendor-neutral.
  • Cover a broad spectrum of skillsets - There are over 20 specialised GIAC IT security qualifications.
  • ANSI accredited - Several GIAC cyber security qualifications are accepted under the ANSI/ISO/IEC 17024 Personnel Certification programme. This affirms that the GIAC programmes, and certification development processes, meet international quality requirements.

GIAC certification proves - beyond doubt - that holders have the skills and knowledge necessary to protect their organisations against the newest, most sophisticated and potentially damaging digital threats.

Programme Overview

GIAC certifications address a wide range of skill sets. These include entry-level cyber security, broad-based security essentials and advanced subjects such as: IT Audit, DFIR, Cyber Defence, GSE, Management, Pen Testing, Software Security, and ICS.

The GIAC programme is structured around offering skills based certifications that align with critical cyber security jobs and duties.

Benefits to Employers

GIAC IT security certifications offer profound benefits for employers and security team managers.

  1. GIAC IT security certifications remove risk as they prove indelibly that employees have the right skills and knowledge.
  2. Encouraging team members to take GIAC is a great way to ensure skills are kept sharp and aligned with the latest technologies and threats within a team.
  3. Offering continual professional development through first class training and certification is a valuable way to retain, reward and motivate staff.
  4. Having a security team that holds a variety of GIAC IT security qualifications is a great selling point for any organisation.

Benefits to Individuals

For cyber security professionals, achieving a GIAC Certification offers many clear benefits. These include:

  1. GIAC Certification proves holders have the deep skills and technical knowledge through achieving accreditation.
  2. Studying for and achieving a GIAC certification is a great way of ensuring skillsets are aligned with the latest threat landscape, attack vectors, trends and technologies.

The Certification Process

To achieve a GIAC certification students need to pass an exam. GIAC exams are taken online, in a proctored environment, via the GIAC exam engine. The GIAC examination process draws on industry experience, customer feedback and also meets ANSI requirements.

The examination process is very rigorous. As such, it's recommended that you prepare well before taking a certification examination.

Proctored exams take place in Pearson Vue centres around the world.

Add a GIAC exam to your course order at the registration check out stage and qualify for a discounted rate.


GIAC Certifications
Level Certification Course Register
Level 1 GISF SEC301: Intro to Information Security  
GCFE FOR500: Windows Forensic Analysis  
GSEC SEC401: Security Essentials Bootcamp Style  
GCIH SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling  
GWEB DEV522: Defending Web Applications Security Essentials  
GCIA SEC503: Intrusion Detection In-Depth  
GPEN SEC560: Network Penetration Testing and Ethical Hacking  
GCFA FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting  
GLEG LEG523: Law of Data Security and Investigations  
GICSP ICS410: ICS/SCADA Security Essentials  
Level 2 GSEC SEC401: Security Essentials Bootcamp Style  
GCFA FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting  
GASF FOR585: Advanced Smartphone Forensics  
GCIA SEC503: Intrusion Detection In-Depth  
GCFE FOR500: Windows Forensic Analysis  
GNFA FOR572: Advanced Network Forensics and Analysis  
GCTI FOR578: Cyber Threat Intelligence  
GSLC MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™  
GCPM MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep  
GSSP-JAVA DEV541: Secure Coding in Java/JEE: Developing Defensible Applications  
GSSP-.NET DEV544: Secure Coding in .NET: Developing Defensible Applications  
GSNA AUD507: Auditing & Monitoring Networks, Perimeters & Systems  
GRID ICS515: ICS Active Defense and Incident Response  
Level 3 GCED SEC501: Advanced Security Essentials - Enterprise Defender  
GCWN SEC505: Securing Windows and PowerShell Automation  
GCUX SEC506: Securing Linux/Unix  
GREM FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques  
GCIH SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling  
GSTRT MGT514: IT Security Strategic Planning, Policy, and Leadership  
GLEG LEG523: Law of Data Security and Investigations  
GCIA SEC503: Intrusion Detection In-Depth  
GMON SEC511: Continuous Monitoring and Security Operations  
GNFA FOR572: Advanced Network Forensics and Analysis  
GCTI FOR578: Cyber Threat Intelligence  
Level 4 GWAPT SEC542: Web App Penetration Testing and Ethical Hacking  
GPEN SEC560: Network Penetration Testing and Ethical Hacking  
GPYC SEC573: Automating Information Security with Python  
GMOB SEC575: Mobile Device Security and Ethical Hacking  
Level 5 GAWN SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses  
GXPN SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking  
Specialty Courses GMON SEC511: Continuous Monitoring and Security Operations  
GCCC SEC566: Implementing and Auditing the Critical Security Controls - In-Depth  
GISP MGT414: SANS Training Program for CISSP® Certification  
GSNA AUD507: Auditing & Monitoring Networks, Perimeters & Systems  
GWAPT SEC542: Web App Penetration Testing and Ethical Hacking  
GCIH SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling  
GCWN SEC505: Securing Windows and PowerShell Automation  
GCUX SEC506: Securing Linux/Unix  
GAWN SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses