GIAC Reverse Engineering Malware (GREM)
The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.
Reasons to become GREM certified:
- Become more valuable to your employer and/or customers by highlighting your cutting-edge malware analysis skills through the GREM certification
- Motivate yourself to develop a new skill set by reaching for a concrete, measurable, and achievable goal embodied by the GREM certification
- Join the ranks of highly-respected professionals who possess the knowledge and skills that are relatively rare in the industry
- Reinforce and affirm your ability to understand characteristics of real-world malware, so you can better respond to incidents and reinforce defenses
System and Network Administrators, Auditors, Security Consultants, and Security Managers responsible for protecting the organization from malicious code
Preparing for the GREM Exam: Candidates may choose to prepare for the GREM exam by taking the SANS Training Course: FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
*No Specific training is required for any GIAC certification. If candidates need help in mastering the objectives for this certification, there are many sources of information available. Practical experience is one option; there are also numerous books on the market covering Computer Information Security. Another option is SANS training, or any relevant courses from other training providers.*
- 1 proctored exam
- 75 questions
- Time limit of 2 hours
- Minimum Passing Score of 70.7%
GIAC reserves the right to change the specifications for each certification without notice. The GREM changed from a 150 question format to a 75 question format exam with a passing point of 70.7 for all candidates receiving access to their certification attempts on or after 4/11/2011. To verify the format of your current certification attempt, please read the Certification Information found in your portal account at https://exams.giac.org/pages/attempts.
Certifications must be renewed every 4 years. Click here for details.
NOTE: GIAC exams are NOT given the day after the conference ends.
Exams are delivered online through a standard web browser. For exams purchased with SANS training, access to the exam will be available 7-10 days following the end of the conference. Certification attempt exams are issued within 24 hours upon receipt of payment. You will receive an email from GIAC when your exam has been issued to your portal account. You have 120 days to complete the exam from the time we send notice that it is available. The exams are proctored and should be scheduled using our proctored exam procedure.
- Certified Professionals (GREM)
- Exam Feedback Procedure
- Grievance Procedure
- Proctored exam procedure
- SANS Information Security Reading Room
Bulletin (Part 2 of Candidate Handbook)
Exam Certification Objectives & Outcome Statements
The topic areas for each exam part follow:
- Analysis of Malicious Document Files
- The candidate will be able to demonstrate an understanding of the tools and techniques used to analyze malicious document files.
- Analyzing Protected Executables
- The candidate will demonstrate an understanding of the techniques malware authors employ to protect malicious software from being analyzed, and the corresponding malware analysis techniques.
- Analyzing Web-Based Malware
- The candidate will be able to demonstrate an understanding of the tools and techniques used to analyze web-based malware
- Common Windows Malware Characteristics in x86 Assembly
- The candidate will demonstrate an understanding of the common malware characteristics, as seen when statically examining malicious x86 assembly code.
- In-Depth Analysis of Malicious Browser Scripts
- The candidate will demonstrate an understanding of the skills needed to analyze complex web-based malicious software employing browser scripts.
- In-Depth Analysis of Malicious Executables
- The candidate will demonstrate an understanding of advanced methods for examining malicious software to uncover additional details about its functionality.
- Malware Analysis Using Memory Forensics
- The candidate will be able to demonstrate an understanding of using Windows memory forensics techniques to analyze malware threats.
- Malware Code and Behavioral Analysis Fundamentals
- The candidate will be able to demonstrate an understanding of the tools and techniques used to conduct code and behavioral analysis of malware, including buidling a lab environment and the use of debuggers, disassemblers, sniffers, and other useful tools.
- Windows x86 Assembly Code Concepts for Reverse-Engineering
- The candidate will demonstrate an understanding of the core concepts associated with reverse-engineering malware at the x86 assembly level in Windows.
Where to Get Help
Training is available from a variety of resources including on line, course attendance at a live conference, and self study.
Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.
Finally, college level courses or study through another program may meet the needs for mastery.
The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.