Cybersecurity Certifications

Cybersecurity Certifications

Offensive Operations Certifications

GIAC's offensive operations certifications cover critical domains and highly specialized usages, ensuring professionals are well-versed in essential offensive abilities. GIAC certifications prove that you have knowledge and skills necessary to work across specialized red, purple, and exploit development teams.

GIAC with CyberLive

Real world, virtual machine testing for specialized certifications

CyberTalent Assessments

Measure your skills and competency levels to decide what's next

Red Team Operations

Prove your ability to detect, respond to, and recover from an attack.

Learn More

Penetration Testing

Prove your mastery of successful penetration testing and ethical hacking skills.

Learn More

Purple Team

Improve the "red-blue" feedback loop by certifying in cross-focus areas.

Learn More

"My GIAC penetration testing certification is important to me because just knowing or being able to read a vulnerability management tool report isn't good enough. Being able to and knowing how to exploit a vulnerability not only looks good for you, but the impact it has on the business is extremely valuable. Knowing you're helping your company stay more secure is its own reward." - Nick Villa, GPEN

Red Team Operations Certifications


GIAC Certified Incident Handler (GCIH) with CyberLive

The GCIH with CyberLive certification focuses on methods used to detect, respond, and resolve computer security incidents.

  • Incident Handling and Computer Crime Investigation
  • Computer and Network Hacker Exploits
  • Hacker Tools (Nmap, Nessus, Metasploit and Netcat)

Affiliated Training: SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

GIAC Python Coder (GPYC)

The GPYC certification focuses on a practitioner's understanding of core programming concepts, and the ability to write and analyze working code using the Python programming language.

  • Python essentials: variable and math operations, strings and functions, and compound statements
  • Data structures and programming concepts, debugging, system arguments, and argparser
  • Python application development for pen testing: backdoors and SQL injection

Affiliated Training: SEC573: Automating Information Security with Python

GIAC Enterprise Vulnerability Assessor (GEVA)

GEVA is the premier certification focused on validating technical vulnerability assessment skills and time-tested practical approaches to ensure security across the enterprise.

  • Vulnerability assessment framework planning and methodology in an enterprise environment
  • Discovery and validation of vulnerabilities using tactics like network scanning and PowerShell scripting
  • Remediation and reporting techniques utilizing proper data management

Affiliated Training: SEC460: Enterprise and Cloud | Threat and Vulnerability Assessment

Penetration Testing Certifications


GIAC Penetration Tester (GPEN) with CyberLive

The GPEN with CyberLive certification validates a practitioner's ability to properly conduct a penetration test, using best practice techniques and methodologies.

  • Comprehensive Pen Test Planning, Scoping, and Recon
  • In-Depth Scanning and Exploitation, Post-Exploitation, and Pivoting
  • In-Depth Password Attacks and Web App Pen Testing

Affiliated Training: SEC560: Network Penetration Testing and Ethical Hacking


GIAC Web Application Penetration Tester (GWAPT)

GWAPT certification holders have demonstrated knowledge of web application exploits and penetration testing methodology.

  • Web application overview, authentication attacks, and configuration testing
  • Web application session management, SQL injection attacks, and testing tools
  • Cross site request forgery and scripting, client injection attack, reconnaissance and mapping

Affiliated Training: SEC542: Web App Penetration Testing and Ethical Hacking

GIAC Mobile Device Security Analyst (GMOB)

The GMOB certification ensures that people charged with protecting systems and networks know how to properly secure mobile devices that are accessing vital information.

  • Analyzing application network activity and static applications, assessing mobile application security
  • Attacking mobile & wireless infrastructure & web applications, unlocking & rooting mobile devices
  • Managing android and iOS devices, manipulating mobile application behavior and network traffic
  • Mitigating against mobile malware & stolen mobile devices, penetration testing against mobile devices

Affiliated Training: SEC575: Mobile Device Security and Ethical Hacking


GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) with CyberLive

The GXPN with CyberLive certification validates a practitioner's expert-level penetration testing skills and ability to find and mitigate significant security flaws in systems and networks.

  • Network Attacks, Crypto, Network Booting, and Restricted Environments
  • Python, Scapy, and Fuzzing
  • Exploiting Windows and Linux for Penetration Testers

Affiliated Training: SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

GIAC Assessing and Auditing Wireless Networks (GAWN)

  • Attacking weak encryption, 802.11 fuzzing attacks, and bluetooth attacks
  • Bridging the air gap, DECT, DoS on wireless networks, high-frequency RFID attacks, and RFID applications
  • Hotspots, low-frequency RFID attacks, NFC, practical SDR attacks, and rogue networks
  • Sniffing wireless, wireless basics, wireless client attacks, WPA2, and Zigbee

Affiliated Training: SEC617: Wireless Penetration Testing and Ethical Hacking

GIAC Cloud Penetration Tester (GCPN)

The GCPN certification validates a practitioner's ability to conduct cloud-focused penetration testing and assess the security of systems, networks, architecture, and cloud technologies.

  • Cloud Penetration Testing Fundamentals, Environment Mapping, and Service Discovery
  • AWS and Azure Cloud Services and Attacks
  • Cloud Native Applications with Containers and CI/CD Pipelines

Affiliated Training: SEC588: Cloud Penetration Testing

Purple Team Certifications

GIAC Foundational Cybersecurity Technologies Certification (GFACT)

The GFACT certification validates a practitioner's knowledge of essential foundational cybersecurity concepts.

  • Core Computing Components: Hardware and Virtualization, Networking, Operating Systems, Web, Cloud, and Data Storage
  • IT Fundamentals and Concepts: Logic and Programming, Windows, and Linux
  • Security Foundations and Threat Landscape: Concepts, Exploitation and Mitigation, Forensics and Post Exploitation

Affiliated Training: SEC275: Foundations - Computers, Technology, & Security

GIAC Defending Advanced Threats (GDAT)

The GDAT certification is unique in how it covers both offensive and defensive security topics in-depth.

  • Advanced persistent threat models and methods
  • Detecting and preventing payload deliveries, exploitation, and post-exploitation activities
  • Using cyber deception to gain intelligence for threat hunting and incident response

Affiliated Training: SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses