Cyber Security Certification: GCIH
Cyber Security Certification: GCIH
GIAC Certified Incident Handler (GCIH)
The GIAC Incident Handler certification validates a practitioner's ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills. GCIH certification holders have the knowledge needed to manage security incidents by understanding common attack techniques, vectors and tools, as well as defend against and respond to such attacks when they occur.
Areas Covered
- Incident Handling and Computer Crime Investigation
- Computer and Network Hacker Exploits
- Hacker Tools (Nmap, Nessus, Metasploit and Netcat)
Who is GCIH for?
- Incident handlers
- Incident handling team leads
- System administrators
- Security practitioners
- Security architects
- Any security personnel that are first responders
GCIH with CyberLive
GIAC knows that cyber security professionals need:
- Discipline-specific certifications
- Practical testing that validates their knowledge and hands-on skills
In response to this industry-wide need, GIAC developed CyberLive - hands-on, real-world practical testing.
CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using:
- Actual programs
- Actual code
- Virtual machines
Candidates are asked practical questions that require performance of real-world-like tasks that mimic specialized job roles.
Find out more about CyberLive here.
Requirements
- 1 proctored exam
- 100-150 questions
- Time limit of 4 hours
- Minimum Passing Score of 70%
Note:
GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GCIH exam has been determined to be 70% for all candidates receiving access to their certification attempts on or after October 10th, 2020. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.
Delivery
NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.
Exam Certification Objectives & Outcome Statements
The topic areas for each exam part follow:
- Covering Tracks on Hosts
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against methods attackers use to remove evidence of compromise on hosts.
- Covering Tracks on the Network
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against methods attackers use to remove evidence of compromise on the network.
- Domain Attacks
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against Domain attacks in Windows environments.
- Drive-By Attacks
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against drive-by attacks in modern environments.
- Endpoint Attacks and Pivoting
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against attacks against endpoints and attack pivoting.
- Incident Handling and Digital Investigations
- The candidate will demonstrate an understanding of what Incident Handling is, why it is important, an understanding of the PICERL incident handling process, and industry best practices in Incident Handling and Digital Investigations.
- Memory and Malware Investigations
- The candidate will demonstrate an understanding of the steps necessary to perform basic memory forensics, including collection and analysis of processes and network connections and basic malware analysis.
- Metasploit
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against the use of Metasploit.
- Netcat
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against the use of covert tools such as netcat.
- Network Investigations
- The candidate will demonstrate an understanding of the steps necessary to perform effective digital investigations of network data.
- Password Attacks
- The candidate will demonstrate a detailed understanding of the three methods of password cracking.
- Physical Access Attacks
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against physical access attacks.
- Reconnaissance and Open-Source Intelligence
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate public and open source reconnaissance techniques.
- Scanning and Mapping
- The candidate will demonstrate an understanding the fundamentals of how to identify, defend against, and mitigate against scanning; to discover and map networks and hosts, and reveal services and vulnerabilities.
- SMB Scanning
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate reconnaissance and scanning of SMB services.
- Web App Attacks
- The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against Web Application Attacks.
*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*
Other Resources
- Training is available in a variety of modalities including live conference training, online, and self study.
- Practical work experience can help ensure that you have mastered the skills necessary for certification
- College level courses or study through another program may meet the needs for mastery.
- The procedure to contest exam results can be found athttps://www.giac.org/about/procedures/grievance.