Cyber Security Certification: GICSP

Cyber Security Certification: GICSP


The GICSP bridges together IT, engineering and cyber security to achieve security for industrial control systems from design through retirement. This unique vendor-neutral, practitioner focused industrial control system certification is a collaborative effort between GIAC and representatives from a global industry consortium involving organizations that design, deploy, operate and/or maintain industrial automation and control system infrastructure. GICSP will assess a base level of knowledge and understanding across a diverse set of professionals who engineer or support control systems and share responsibility for the security of these environments.

Areas Covered

Who is GICSP for?

Requirements

Note: GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GICSP exam has been determined to be 71% for all candidates receiving access to their certification attempts on or after November 19th, 2018. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.


Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Hardening ICS Operating Systems
The candidate will be able to describe how to implement endpoint security software along with hardening and patching, to secure the Windows and Unix style operating systems commonly found in an ICS environment.
ICS Communications and Compromises
The candidate will be able to describe the basic structures, protocols, and defense of communications within an ICS and summarize how they can be compromised. The candidate will also be able to, at a basic level, describe the cryptography used to protect communications.
ICS Intelligence Gathering
The candidate will be able to determine the threat landscape of an ICS through the investigation of information leakage points and logs, and honeypots, when appropriate.
ICS Level 0 and 1 Technology Overview and Compromise
The candidate will be able to describe level 0 and level 1 devices and technologies and summarize how those devices and technologies are targeted and attacked.
ICS Level 2 and 3 Technology Overview and Compromise
The candidate will be able to describe level 2 and level 3 devices and technologies and summarize how those devices and technologies are targeted and attacked.
ICS Overview and Concepts
The candidate will be able to summarize the function of high-level assets that comprise Purdue model levels zero through three. The candidate will be able to compare and contrast DCS systems with SCADA systems.
ICS Procurement, Architecture, and Design Fundamentals
The candidate will be able to compare and contrast ICS architectures with traditional IT architectures. The candidate will demonstrate understanding of how procurement and physical security can compliment a secure and defendable ICS network architecture. The candidate will be able to summarize the use of levels and zones in defining a secure ICS architecture as well as the devices deployed at each level and zone.
ICS Program and Policy Development
The candidate will be able to summarize the steps and best practices used in building a security program and creating enforceable security policies for an ICS.
ICS Wireless Technologies and Compromises
The candidate will be able to summarize the different wireless communication technologies used in an ICS, how they are targeted, and how they can be defended.
Risk Based Disaster Recovery and Incident Response
The candidate will be able to describe how risk is measured and how it can be used to inform disaster recovery and incident response.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Other Resources