Cyber Security Certification: GISF
Cyber Security Certification: GISF
GIAC Information Security Fundamentals (GISF)
The GIAC Information Security Fundamentals (GISF) certification validates a practitioner's knowledge of security's foundation, computer functions and networking, introductory level cryptography, and cybersecurity technologies. GISF certification holders will be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.
Areas Covered
- Cyber security terminology
- The basics of computer networks
- Security policies
- Incident response
- Passwords
- Introduction to cryptographic principles
Who is GISF for?
- Anyone new to cyber security who needs an introduction to security fundamentals
- Non-IT security managers
- Professionals with basic computer and technical knowledge
- Career changers to cyber security
- Managers, information security officers, and system administrators
- Anyone who writes, implements, or must adhere to enterprise security policy
Requirements
- 1 proctored exam
- 75 questions
- Time limit of 2 hours
- Minimum Passing Score of 72%
Note:
GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.
Delivery
NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.
Exam Certification Objectives & Outcome Statements
The topic areas for each exam part follow:
- AAA and Access Controls
- The candidate will demonstrate an understanding of access controls and effective authentication, authorization and accountability.
- Application Security
- The candidate will demonstrate an understanding of securing applications from malware and other common threats.
- Computer Math
- The candidate will demonstrate an understanding of foundational numbering systems.
- Cryptographic Algorithms and Attacks
- The candidate will demonstrate an understanding of cryptographic algrorithms.
- Fundamentals of Cryptography
- The candidate will demonstrate an understanding of cryptography and its application.
- History of Cryptography
- The candidate will demonstrate an understanding of cryptography throughout history..
- Network Addressing and Protocols
- The candidate will demonstrate an understanding of network addressing and protcols.
- Network Attacks
- The candidate will demonstrate a foundational understanding of network attacks.
- Network Communication Fundamentals
- The candidate will demonstrate an understanding of network concepts and terminology.
- Network Security Technology
- The candidate will demonstrate an understanding of countermeasures and technologies employed to minimize the associated risks from attacks.
- Risk Management Principles and Security Policy
- The candidate will demonstrate an understanding of fundamental information security and risk management concepts as well as the components of effective policy creation and awareness programs.
- Systems Security
- The candidate will demonstrate an understanding of securing systems from common threats.
- Wireless Security Technology
- The candidate will demonstrate an understanding of wireless technologies as well as the defenses employed to minimize the associated risks from wireless attacks.
*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*
Other Resources
- Training is available in a variety of modalities including live conference training, online, and self study.
- Practical work experience can help ensure that you have mastered the skills necessary for certification
- College level courses or study through another program may meet the needs for mastery.
- The procedure to contest exam results can be found athttps://www.giac.org/about/procedures/grievance.