Certification: GREM

Certification:

GIAC Reverse Engineering Malware (GREM)

Description

The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.

Reasons to become GREM certified:

  • Become more valuable to your employer and/or customers by highlighting your cutting-edge malware analysis skills through the GREM certification
  • Motivate yourself to develop a new skill set by reaching for a concrete, measurable, and achievable goal embodied by the GREM certification
  • Join the ranks of highly-respected professionals who possess the knowledge and skills that are relatively rare in the industry
  • Reinforce and affirm your ability to understand characteristics of real-world malware, so you can better respond to incidents and reinforce defenses

Target

System and Network Administrators, Auditors, Security Consultants, and Security Managers responsible for protecting the organization from malicious code

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 75 questions
  • Time limit of 2 hours
  • Minimum Passing Score of 70.7%

Note:

GIAC reserves the right to change the specifications for each certification without notice. The GREM changed from a 150 question format to a 75 question format exam with a passing point of 70.7 for all candidates receiving access to their certification attempts on or after 4/11/2011. To verify the format of your current certification attempt, please read the Certification Information found in your portal account at https://exams.giac.org/pages/attempts.

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Analysis of Malicious Document Files
The candidate will be able to demonstrate an understanding of the tools and techniques used to analyze malicious document files.
Analyzing Protected Executables
The candidate will demonstrate an understanding of the techniques malware authors employ to protect malicious software from being analyzed, and the corresponding malware analysis techniques.
Analyzing Web-Based Malware
The candidate will be able to demonstrate an understanding of the tools and techniques used to analyze web-based malware
Common Windows Malware Characteristics in x86 Assembly
The candidate will demonstrate an understanding of the common malware characteristics, as seen when statically examining malicious x86 assembly code.
In-Depth Analysis of Malicious Browser Scripts
The candidate will demonstrate an understanding of the skills needed to analyze complex web-based malicious software employing browser scripts.
In-Depth Analysis of Malicious Executables
The candidate will demonstrate an understanding of advanced methods for examining malicious software to uncover additional details about its functionality.
Malware Analysis Using Memory Forensics
The candidate will be able to demonstrate an understanding of using Windows memory forensics techniques to analyze malware threats.
Malware Code and Behavioral Analysis Fundamentals
The candidate will be able to demonstrate an understanding of the tools and techniques used to conduct code and behavioral analysis of malware, including buidling a lab environment and the use of debuggers, disassemblers, sniffers, and other useful tools.
Windows x86 Assembly Code Concepts for Reverse-Engineering
The candidate will demonstrate an understanding of the core concepts associated with reverse-engineering malware at the x86 assembly level in Windows.

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.