iPad Air 2, Samsung Galaxy Tab A, or $350 Off with SANS Online Training Right Now!

SANS CyberTalent Immersion Academy Certification


GIAC Certification

GIAC (Global Information Assurance Certification) certifications go beyond theory and terminology and tests the pragmatics of Audit, Security, Operations, Management and Software Security tasks.

Academy students graduate with GIAC certifications that provide recognition and credibility across the information security industry.

Academy students can earn up to three GIAC certifications depending upon the program type and sponsor.

Open Academy Certifications
GSEC
GIAC Security Essentials Certification
Focused on demonstrating an understanding of information security beyond simple terminology and concepts. Security professionals are qualified for IT systems hands-on roles with respect to security tasks
GCIH
GIAC Certified Incident Handler
Focuses on detecting, responding, and resolving computer security incidents and covers the following security techniques:
  • The steps of the incident handling process
  • Detecting malicious applications and network activity
  • Common attack techniques that compromise hosts
  • Detecting and analyzing system and network vulnerabilities
  • Continuous process improvement by discovering the root causes of incidents
Students choose one of four electives
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Certified Forensic Examiner (GCFE)
  • GIAC Certified Web Application Penetration Tester (GWAPT)
  • GIAC Certified Enterprise Defender (GCED)
Women's Academy Certifications
GSEC
GIAC Security Essentials Certification
Focused on demonstrating an understanding of information security beyond simple terminology and concepts. Security professionals are qualified for IT systems hands-on roles with respect to security tasks
GCIH
GIAC Certified Incident Handler
Focuses on detecting, responding, and resolving computer security incidents and covers the following security techniques:
  • The steps of the incident handling process
  • Detecting malicious applications and network activity
  • Common attack techniques that compromise hosts
  • Detecting and analyzing system and network vulnerabilities
  • Continuous process improvement by discovering the root causes of incidents
3rd Certification Option To be determined by student's choice of elective.