All GIAC logos are for use by individuals who hold the associated GIAC certification. Certified professionals are authorized and encouraged to use the associated logo(s) for business cards, resumes, letter head, signature blocks, website, etc. The Provision for Logo use stated herein represents Limited exception to the SANS Institute Trademark Use Policy. The exception stated herein will be strictly construed. Use by entities other than certified individuals must include the identity of the certified individuals. Any other use of these logos requires written permission from GIAC prior to use. Permission can be obtained by writing intellectualproperty@giac.org. Any use of these logos that is inconsistent with the above guidelines constitutes trademark infringement and may subject the infringer to legal action. Use of any of these logos implies an understanding of, and consent to, the guidelines shown above.
- GIAC Advanced Smartphone Forensics (GASF)
- GIAC Assessing and Auditing Wireless Networks (GAWN)
- GIAC Battlefield Forensics and Acquisition (GBFA)
- GIAC Critical Controls Certification (GCCC)
- GIAC Certified Detection Analyst (GCDA)
- GIAC Certified Enterprise Defender (GCED)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Certified Forensic Examiner (GCFE)
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Certified Incident Handler (GCIH)
- GIAC Critical Infrastructure Protection (GCIP)
- GIAC Cloud Security Essentials (GCLD)
- GIAC Certified Project Manager (GCPM)
- GIAC Cloud Penetration Tester (GCPN)
- GIAC Cloud Security Automation (GCSA)
- GIAC Cyber Threat Intelligence (GCTI)
- GIAC Certified Windows Security Administrator (GCWN)
- GIAC Defending Advanced Threats (GDAT)
- GIAC Defensible Security Architecture (GDSA)
- GIAC Enterprise Vulnerability Assessor (GEVA)
- GIAC Foundational Cybersecurity Technologies (GFACT)
- GIAC Industrial Cyber Security Professional (GICSP)
- GIAC Information Security Fundamentals (GISF)
- GIAC Information Security Professional (GISP)
- GIAC Law of Data Security and Investigations (GLEG)
- GIAC Mobile Device Security Analyst (GMOB)
- GIAC Continuous Monitoring Certification (GMON)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Open Source Intelligence (GOSI)
- GIAC Public Cloud Security (GPCS)
- GIAC Penetration Tester (GPEN)
- GIAC Python Coder (GPYC)
- GIAC Reverse Engineering Malware (GREM)
- GIAC Response and Industrial Defense (GRID)
- GIAC Security Essentials (GSEC)
- GIAC Security Leadership (GSLC)
- GIAC Security Operations Certified (GSOC)
- GIAC Systems and Network Auditor (GSNA)
- GIAC Strategic Planning, Policy, and Leadership (GSTRT)
- GIAC Web Application Penetration Tester (GWAPT)
- GIAC Web Application Defender (GWEB)
- GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
- GIAC Certified ISO-2700 Specialist (G2700)
- GIAC Certified Incident Manager (GCIM)
- GIAC Certified Unix Security Administrator (GCUX)
- GIAC Certified Perimeter Protection Analyst (GPPA)
- GIAC Secure Software Programmer - .NET (GSSP-.NET)
- GIAC Secure Software Programmer - Java (GSSP-JAVA)