Cyber Security Certification: GISF

Cyber Security Certification: GISF


The GIAC Information Security Fundamentals (GISF) certification validates a practitioner's knowledge of security's foundation, computer functions and networking, introductory level cryptography, and cybersecurity technologies. GISF certification holders will be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

Areas Covered

Who is GISF for?

Requirements

Note:

GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.


Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

AAA and Access Controls
The candidate will demonstrate an understanding of access controls and effective authentication, authorization and accountability.
Application Security
The candidate will demonstrate an understanding of securing applications from malware and other common threats.
Computer Math
The candidate will demonstrate an understanding of foundational numbering systems.
Cryptographic Algorithms and Attacks
The candidate will demonstrate an understanding of cryptographic algrorithms.
Fundamentals of Cryptography
The candidate will demonstrate an understanding of cryptography and its application.
History of Cryptography
The candidate will demonstrate an understanding of cryptography throughout history..
Network Addressing and Protocols
The candidate will demonstrate an understanding of network addressing and protcols.
Network Attacks
The candidate will demonstrate a foundational understanding of network attacks.
Network Communication Fundamentals
The candidate will demonstrate an understanding of network concepts and terminology.
Network Security Technology
The candidate will demonstrate an understanding of countermeasures and technologies employed to minimize the associated risks from attacks.
Risk Management Principles and Security Policy
The candidate will demonstrate an understanding of fundamental information security and risk management concepts as well as the components of effective policy creation and awareness programs.
Systems Security
The candidate will demonstrate an understanding of securing systems from common threats.
Wireless Security Technology
The candidate will demonstrate an understanding of wireless technologies as well as the defenses employed to minimize the associated risks from wireless attacks.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Other Resources