Global Information Assurance Certification

Global Information Assurance Certification

Global Information Assurance Certification (GIAC) is an information security certification entity that specialises in technical and practical certification as well as new research in the form of its GIAC Gold program. SANS Institute founded the certification entity in 1999 and the term GIAC is trademarked by the The Escal Institute of Advanced Technologies.

GIAC provides a set of vendor-neutral computer security certifications linked to the training courses provided by the SANS. GIAC is specific to the leading edge technological advancement of IT security in order to keep ahead of "black hat" techniques. Papers written by individuals pursuing GIAC certifications are presented as the SANS Reading Room on GIAC's website.

Initially all SANS GIAC certifications required a written paper or "practical" on a specific area of the certification in order to achieve the certification. In April 2005, the SANS organization changed the format of the certification by breaking it into two separate levels. The "silver" level certification requires two multiple-choice tests, whereas the "gold" level certification has both the multiple-choice tests requirement as well as a practical.

As of November 10, 2007, GIAC claims to have certified 19,275 individuals worldwide.cite web | url = http://www.giac.org/ | accessdate = 2007-04-11 | author = | title = Global Information Assurance Certification | publisher = Global Information Assurance Certification | date = ]

SANS GIAC Certifications

ecurity Administration

*GIAC Security Essentials Certification (GSEC)
*GIAC Certified Incident Handler (GCIH)
*GIAC Certified UNIX Security Administrator (GCUX)
*GIAC Information Security Fundamentals (GISF)
*GIAC .Net (GNET)
*GIAC Secure Internet Presence (GSIP)
*GIAC Certified Intrusion Analyst (GCIA)
*GIAC Certified Firewall Analyst (GCFW)
*GIAC Certified Windows Security Administrator (GCWN)
*GIAC Certified Forensics Analyst (GCFA)
*GIAC Securing Oracle Certification (GSOC)
*GIAC Assessing Wireless Networks (GAWN)
*GIAC Security Expert (GSE)
*GIAC Penetration Tester (GPEN)

Audit

*GIAC Certified ISO-17799 Specialist (G7799)
*GIAC Systems and Network Auditor (GSNA)
*GIAC Security Audit Essentials (GSAE)

Management

*GIAC Security Leadership Certification (GSLC)
*GIAC Certified Security Consultant (GCSC)

Operations

*GIAC Operations Essentials Certification (GOEC)

oftware Security and/or Secure Coding

* GIAC Secure Software Programmer - Java [http://www.giac.org/certifications/software/gssp-java.php (GSSP Java)]
* GIAC Secure Software Programmer - C [http://www.giac.org/certifications/software/gssp-c.php (GSSP C)]
* GIAC Reverse Engineering Malware [http://www.giac.org/certifications/security/grem.php (GREM)]
* GIAC .Net [http://www.giac.org/certifications/security/gnet.php (GNET)]

Other

*GIAC Certified Incident Handler (GCIH)

Controversy

Controversy surrounded the [http://www.theregister.co.uk/2005/03/29/security_certification/ decision to allow certifications] without completion of the practical assignment. This decision had the effect of simplifying the process to obtain the various four-letter designations. GIAC desired to increase the probability of students attempting certifications, presumably to increase the population of certified individuals, and therefore the industry relevance of GIAC certifications as a whole. Organizations which use GIAC certifications as professional qualification standard for candidates often do not specify a Gold or Silver certification requirement. The community concern was that devaluation of older certifications would ensue.

External links

* [http://www.giac.org/ GIAC website]
* [http://www.sans.org/press/release_20050407.pdf Press release announcing split of Gold and Silver certifications]

Notes


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… …   Wikipedia

  • Information security professionalism — is the set of knowledge that people working in Information security and similar fields (Information Assurance and Computer security) should have and eventually demonstrate through certifications from well respected organizations. It also… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Professional certification (computer technology) — Professional certifications in computer technology are non degree awards made to those who have achieved qualifications specified by a certifying authority. Depending on the particular certification, qualifications may include completing a course …   Wikipedia

  • Outline of information technology — See also: Index of information theory articles The following outline is provided as an overview of and topical guide to information technology: Information technology (IT) – defined by the Information Technology Association of America (ITAA) as… …   Wikipedia

  • Professional certification (Computer technology) — A Professional certification in the Computer technology field is a designation earned by a person to assure that he/she is qualified to perform a job or task.Certifications, generally, need to be renewed periodically, or may be valid for a… …   Wikipedia

  • Certification mark — Canadian certification label on a bag of rockwool. A certification mark on a commercial product indicates five things: The existence of a legal follow up or product certification agreement between the manufacturer of a product and an organization …   Wikipedia

  • Global Trust Center — The Global Trust Center is a non profit independent international organisation that develops policy, best practice and guidance to enable trust in digital interactions, such as on the Internet. It provides a forum for governments; businesses and… …   Wikipedia

  • Defense Information Systems Agency — Seal …   Wikipedia

  • Certified Information Systems Security Professional — CISSP Logo Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium (ISC)². (ISC)² is a self declared… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”