Certification

Certification

GIAC Information Security Fundamentals (GISF)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

GISF Exam Certification Objectives
AAA and Access Controls The candidate will demonstrate an understanding of access controls and effective authentication, authorization and accountability.
Application Security The candidate will demonstrate an understanding of securing applications from malware and other common threats.
Computer Math The candidate will demonstrate an understanding of foundational numbering systems.
Cryptographic Algorithms and Attacks The candidate will demonstrate an understanding of cryptographic algrorithms.
Fundamentals of Cryptography The candidate will demonstrate an understanding of cryptography and its application.
History of Cryptography The candidate will demonstrate an understanding of cryptography throughout history..
Network Addressing and Protocols The candidate will demonstrate an understanding of network addressing and protcols.
Network Attacks The candidate will demonstrate a foundational understanding of network attacks.
Network Communication Fundamentals The candidate will demonstrate an understanding of network concepts and terminology.
Network Security Technology The candidate will demonstrate an understanding of countermeasures and technologies employed to minimize the associated risks from attacks.
Risk Management Principles and Security Policy The candidate will demonstrate an understanding of fundamental information security and risk management concepts as well as the components of effective policy creation and awareness programs.
Systems Security The candidate will demonstrate an understanding of securing systems from common threats.
Wireless Security Technology The candidate will demonstrate an understanding of wireless technologies as well as the defenses employed to minimize the associated risks from wireless attacks.