Cyber Security Certification: GPYC

Cyber Security Certification: GPYC


The GIAC Python Coder (GPYC) certification validates a practitioner's understanding of core programming concepts, and the ability to write and analyze working code using the Python programming language. GPYC certification holders have demonstrated knowledge of common python libraries, creating custom tools, collecting information about a system or network, interacting with websites and databases, and automating testing.

Areas Covered

Who is GPYC for?

Requirements

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.


Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Control Structures and Iteration
The candidate will be able to create and analyze simple control structures, including conditionals (if/else/elif) and for/while loops using Python.
Creation of Executables
The candidate will have a basic understanding of creating a Python executable for Windows clients with a focus on penetration testing. This includes an understanding of backdoor functionality, the conversion of a Python program to an executable file, and using Python to create an executable that will evade most modern anti-virus signatures.
Data Analysis with Python
The candidate will demonstrate the ability to use Python for various data analysis techniques including parsing binary data with the struct module, common file formats, log analysis and statistics with freq.py, counters and sets, long tail and short-tail analysis.
Data Structures
The candidate will be able to create and manipulate variable types and data structures, including bytes, byte arrays, byte encoded unicode characters using UTF-8 and Latin-1, integers, Python 3 strings, sets and sequential data structures, including dictionaries, lists, and tuples.
Database Interaction
The candidate will understand how to create a Python program to query databases using SQL libraries.
Exception Handling
The candidate will have a basic understanding of Python exception handling capabilities, and how to build these into a program.
Functions, Classes and Objects
The candidate will be able to demonstrate an understanding of Python functions, classes, and object oriented programming.
Network Interfaces
The candidate will be able to implement TCP and UDP network based communications using Pythons socket module.
Packet Analysis with Python
The candidate will understand how to use extended functionality of Python and Scapy to create, read, analyze, and manipulate captured network traffic.
Python Basics
The candidate will be able to implement the more fundamental elements of Python, including creating, debugging and executing a program, and user/file input and output.
Regular Expressions
The candidate will have a basic understanding of regular expressions, and how to implement them in searches with Python.
Website Interaction
The candidate will understand how to use Python as a "browser" to interact with URLs and websites, handle cookies, and manipulate or capture traffic.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Other Resources