Global Industrial Cyber Security Professional (GICSP) icon

Global Industrial Cyber Security Professional (GICSP)

The GICSP bridges together IT, engineering and cyber security to achieve security for industrial control systems from design through retirement. This unique vendor-neutral, practitioner focused industrial control system certification is a collaborative effort between GIAC and representatives from a global industry consortium involving organizations that design, deploy, operate and/or maintain industrial automation and control system infrastructure. GICSP will assess a base level of knowledge and understanding across a diverse set of professionals who engineer or support control systems and share responsibility for the security of these environments.

Areas Covered

  • Industrial control system components, purposes, deployments, significant drivers, and constraints
  • Control system attack surfaces, methods, and tools
  • Control system approaches to system and network defense architectures and techniques
  • Incident-response skills in a control system environment
  • Governance models and resources for industrial cybersecurity professionals

Who is GICSP for?

  • ICS IT practitioners (includes operational technology support)
  • ICS Security analysts (includes operational technology security)
  • Security engineers
  • Industry managers and professionals

Exam Format

  • 1 proctored exam
  • 115 questions
  • 3 hours
  • Minimum passing score of 71%
Note: GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GICSP exam has been determined to be 71% for all candidates receiving access to their certification attempts on or after November 19th, 2018. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.

GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.

Exam Certification Objectives & Outcome Statements

  • Hardening ICS Operating Systems
    The candidate will be able to describe how to implement endpoint security software along with hardening and patching, to secure the Windows and Unix style operating systems commonly found in an ICS environment.
  • ICS Communications and Compromises
    The candidate will be able to describe the basic structures, protocols, and defense of communications within an ICS and summarize how they can be compromised. The candidate will also be able to, at a basic level, describe the cryptography used to protect communications.
  • ICS Intelligence Gathering
    The candidate will be able to determine the threat landscape of an ICS through the investigation of information leakage points and logs, and honeypots, when appropriate.
  • ICS Level 0 and 1 Technology Overview and Compromise
    The candidate will be able to describe level 0 and level 1 devices and technologies and summarize how those devices and technologies are targeted and attacked.
  • ICS Level 2 and 3 Technology Overview and Compromise
    The candidate will be able to describe level 2 and level 3 devices and technologies and summarize how those devices and technologies are targeted and attacked.
  • ICS Overview and Concepts
    The candidate will be able to summarize the function of high-level assets that comprise Purdue model levels zero through three. The candidate will be able to compare and contrast DCS systems with SCADA systems.
  • ICS Procurement, Architecture, and Design Fundamentals
    The candidate will be able to compare and contrast ICS architectures with traditional IT architectures. The candidate will demonstrate understanding of how procurement and physical security can complement a secure and defendable ICS network architecture. The candidate will be able to summarize the use of levels and zones in defining a secure ICS architecture as well as the devices deployed at each level and zone.
  • ICS Program and Policy Development
    The candidate will be able to summarize the steps and best practices used in building a security program and creating enforceable security policies for an ICS.
  • ICS Wireless Technologies and Compromises
    The candidate will be able to summarize the different wireless communication technologies used in an ICS, how they are targeted, and how they can be defended.
  • Risk Based Disaster Recovery and Incident Response
    The candidate will be able to describe how risk is measured and how it can be used to inform disaster recovery and incident response.

Other Resources

  • Training is available in a variety of modalities including live training and OnDemand.
  • Practical work experience can help ensure that you have mastered the skills necessary for certification
  • College level courses or self paced study through another program or materials may meet the needs for mastery.
  • Get information about the procedure to contest exam results.
2340x500-generic-2-background-only_copy.jpg

Find Affiliate Training

Explore affiliate training options to prepare for your GIAC certification exam.