GIAC Certified Enterprise Defender (GCED)
Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.
- 1998 certified analysts as of March 26, 2017
- See the GIAC website for additional details on the GCED certification.
|Network Infrastructure Security and Defense||The candidate will demonstrate an understanding of the challenges associated with securing network infrastructure, including common network device attack tools and techniques.|
|Network Device Hardening and Auditing||The candidate will demonstrate an understanding of secure configuration management and auditing of network devices such as routers and switches based on industry standard best practices.|
|Packet Analysis for Enterprise Defenders||The candidate demonstrate an ability to utilize packet inspection technologies and an understanding of packet analysis and network traffic techniques using common tools.|
|Intrusion Detection and Prevention for Enterprise Defenders||The candidate will demonstrate understanding of network and web application intrusion detection and prevention systems (IDS/IPS) technologies and open source tools, as well as how to test IDS/IPS effectiveness and performance.|
|Pen Testing Methodology and Information Gathering||The candidate will demonstrate an understanding of penetration testing methodology and techniques used to gather information, scan targets, and enumerate system information.|
|Penetration Testing Exploitation and Reporting||The candidate will demonstrate an understanding of penetration test exploitation, common open source tools, and reporting pen test findings.|
|Incident Handling and Forensics Fundamentals for Enterprise Defenders||The candidate will demonstrate an understanding of the six steps of incident handling, forensics methodology, and the role of a first responder.|
|First Responder Tools and Techniques||The candidate will demonstrate an understanding of incident handling and forensic tools and techniques used by first responders.|
|Windows Tools for Identifying Malware||The candidate will demonstrate an understanding of windows OS and command line tools used to identify suspicious files, processes, applications, and browser artifacts.|
|Analyzing Malware with Windows and Online Tools||The candidate will demonstrate an understanding of techniques used by malware to hide and persist, as well as third party and online security software for analyzing and removing malware artifacts.|
|Risk Management for Enterprise Defenders||The candidate will demonstrate an understanding of how to classify data assets and manage risks, threats, and vulnerabilities.|
|Data Loss Prevention for Enterprise Defenders||The candidate will demonstrate an understanding of the risks of data breaches and information leakage and best practice controls used to detect and prevent data loss from both insider and external threats.|