Security Certification: GCED

Security Certification:

GIAC Certified Enterprise Defender (GCED)

Target

The GCED builds on the security skills measured by the GSEC (no overlap). It assesses more advanced, technical skills that are needed to defend the enterprise environment and protect an organization as a whole. Knowledge, skills and abilities assessed are taken from the areas of Defensive Network Infrastructure, Packet Analysis, Penetration Testing, Incident Handling, and Malware Removal.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 115 questions
  • Time limit of 3 hours
  • Minimum Passing Score of 70%

Note:

GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GCED exam has been determined to be 70% for all candidates receiving access to their certification attempts on or after June 22nd, 2018. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Defending Network Protocols
The candidate will demonstrate an understanding of the OSI model and commonly-used protocols found at various OSI layers. The candidate will also demonstrate a basic working knowledge of the weaknesses of these protocols and the services that use them, and of tactics providing more secure implementations.
Defensive Infrastructure and Tactics
The candidate will demonstrate their understanding of, and effective use of security infrastructure such as firewalls, host and network intrusion detection/prevention systems, active defense measures, and capabilities such as logging.
Digital Forensics Concepts and Application
The candidate will demonstrate an understanding of methods and practices of digital forensics.
Incident Response Concepts and Application
The candidate will demonstrate an understanding of the incident response process, and its relationship to threat intelligence practices.
Interactive Malware Analysis
The candidate will demonstrate their understanding of interactive malware behavior analysis, a familiarity with the tools and techniques used to perform the analysis, and interpret the results of the analysis.
Intrusion Detection and Packet Analysis
The candidate will demonstrate their understanding of intrusion prevention systems, their placement in the enterprise, their configuration and tuning, and actions taken in response to alerts.
Malware Analysis Concepts and Basic Analysis Techniques
The candidate will demonstrate an understanding of the various types of malware, identify symptoms of infection, and methods to analyze it safely. The candidate will demonstrate an understanding of the benefits and disadvantages of automated and static malware analysis techniques, their ability to perform these analyses and to interpret their results.
Manual Malware Analysis
The candidate will demonstrate their understanding of manual code reversing of malware, of disassembly and decompiling malware, and of code obfuscation techniques used by malware.
Network Forensics Concepts and Application
The candidate will demonstrate their understanding of network forensic tools and practice, used to perform analysis on stored and real time traffic to identify suspicious traffic or attempted attacks.
Network Security Monitoring Concepts and Application
The candidate will demonstrate their understanding of network packet analysis, their ability to use packet analysis tools, and to interpret the results of the analysis.
Vulnerability Assessment and Penetration Testing Concepts
The candidate will demonstrate an understanding of the processes and techniques used in penetration test and vulnerability assessment engagements. The candidate will demonstrate their familiarity with the types of tools required for such engagements.
Vulnerability Assessment and Penetration Testing Application
The candidate will demonstrate their understanding of and proficiency using penetration testing and vulnerability assessment tools, and familiarity with typical testing and assessment target types.

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at https://www.giac.org/about/procedures/grievance.