Cyber Security Certification: GEVA

Cyber Security Certification: GEVA


As advanced adversaries become more numerous, more capable, and much more destructive, organizations must become more effective at mitigating their information security risks at the enterprise scale. GIAC Enterprise Vulnerability Assessor is the premier certification focused on validating technical vulnerability assessment skills and time-tested practical approaches to ensure security across the enterprise. The GEVA-certified practitioner will be capable of handling threat management, comprehensively assessing vulnerabilities, and producing a vigorous defensive strategy from day one.

Areas Covered

Who is GEVA for?

Requirements

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.

GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.


Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Application and Configuration Discovery
The candidate will demonstrate understanding of scanning and discovery techniques to find application and configuration vulnerabilities.
Authentication and Configuration Auditing
The candidate will demonstrate understanding of validating vulnerabilities specific to authentication systems and host/service configurations.
Data Management and Collaboration Strategies
The candidate will demonstrate understanding of vulnerability and configuration data management as well as team collaboration.
Intelligence and Threat Modeling
The candidate will demonstrate understanding of performing and applying intelligence and threat modeling within a vulnerability assessment.
Network-based Discovery
The candidate will demonstrate understanding of network-based scanning and discovery methods and techniques.
Reconnaissance, Scanning, and Vulnerability Fundamentals
The candidate will demonstrate understanding of reconnaissance and scanning fundamentals.
Remediation Concepts and Vulnerability Assessment Reporting
The candidate will demonstrate understanding of remediation concepts and vulnerability assessment reporting.
Validation and Risk Essentials
The candidate will demonstrate understanding of essential risk methodologies and how these inform vulnerability validation.
Vulnerability Assessment Methodology
The candidate will demonstrate understanding of the fundamental theories and process of planning and performing a vulnerability assessment.
Vulnerability Validation and Enumeration Fundamentals
The candidate will demonstrate understanding of vulnerability validation techniques and value.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Other Resources