GIAC Certifications: Penetration Testing

GIAC Certifications:

High-value penetration testing doesn't involve just throwing a bunch of hacks at a target environment and declaring victory when a shell prompt magically pops up. Instead, the best penetration testers focus on understanding their craft in-depth. Pen Test Professionals provide significant value to organizations by improving their security stance through technical excellence and implementation of well-understood and repeatable methodologies. Ultimately, delivering real savings through information security to the business.

GIAC Certifications are developed with these principles in mind and to ensure penetration testers and ethical hackers achieve the status of certified expert penetration testers and ethical hackers.

Penetration Testing
  Certification Register
GCIH: GIAC Certified Incident Handler

Certified Incident Handler

GCIH holders have demonstrated their ability to manage security incidents by understanding common attack techniques, vectors and tools as well as defending against and/or responding to such attacks when they occur. The GCIH certification focuses on methods used to detect, respond, and resolve computer security incidents.

Affliated Training:

SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling

 
GPEN: GIAC Penetration Tester

Penetration Tester

GPEN holders have demonstrated their ability to execute penetration testing and ethical hacking methodologies and properly conduct a penetration test, as well as best practice technical and non-technical techniques specific to conduct a penetration test.

Affliated Training:

SEC560: Network Penetration Testing and Ethical Hacking

 
GWAPT: GIAC Web Application Penetration Tester

Web Application Penetration Tester

GWAPT holders have demonstrated their ability to test and defend web applications and the vulnerabilities associated with them.

Affliated Training:

SEC542: Web App Penetration Testing and Ethical Hacking

 
GXPN: GIAC Exploit Researcher and Advanced Penetration Tester

Exploit Researcher and Advanced Penetration Tester

GXPN holders have demonstrated their ability to conduct advanced penetration testing and ethical hacking, model the abilities of an advanced attacker to find significant security flaws in systems, and identify the business risk associated with these flaws. Featuring CyberLive, testing in a virtual machine environment for a true performance-based exam.

Affliated Training:

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

 
GAWN: GIAC Assessing and Auditing Wireless Networks

Assessing and Auditing Wireless Networks

GAWN holders have demonstrated an understanding of the different security mechanisms for wireless networks, the tools and techniques used to evaluate and exploit weaknesses, and techniques used to analyze wireless networks.

Affliated Training:

SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses

 
GMOB: GIAC Mobile Device Security Analyst

Mobile Device Security Analyst

GMOB holders have demonstrated the ability to protect systems and networks and to properly secure the mobile devices accessing vital information.

Affliated Training:

SEC575: Mobile Device Security and Ethical Hacking

 
GPYC: GIAC Python Coder

Python Coder

For penetration testers and individuals who want to use the Python programming language to enhance their effectiveness. It is also helpful to experienced Python developers who want to build additional information security skills.

Affliated Training:

SEC573: Automating Information Security with Python

 

***No training is required for a GIAC Certification