GIAC Certified Incident Handler (GCIH)

文章推薦指數: 80 %
投票人數:10人

GIAC Certified Incident Handler is a cybersecurity certification that certifies a professional's knowledge of detecting, responding, and resolving computer ... Home > Certifications > GIACCertifiedIncidentHandler(GCIH) GIACCertifiedIncidentHandler(GCIH) RegisterNow Renew TheGIACIncidentHandlercertificationvalidatesapractitioner's abilitytodetect,respond,andresolvecomputersecurityincidents usingawiderangeofessentialsecurityskills.GCIHcertification holdershavetheknowledgeneededtomanagesecurityincidentsby understandingcommonattacktechniques,vectorsandtools,aswellas defendagainstandrespondtosuchattackswhentheyoccur. OverviewExamFormatObjectivesOtherResourcesAffiliateTraining AreasCovered IncidentHandlingandComputerCrimeInvestigationComputerandNetworkHackerExploitsHackerTools(Nmap,Nessus,MetasploitandNetcat) WhoisGCIHfor? IncidenthandlersIncidenthandlingteamleadsSystemadministratorsSecuritypractitionersSecurityarchitectsAnysecuritypersonnelthatarefirstresponders GCIHwithCyberLiveGIACknowsthatcybersecurityprofessionalsneed:Discipline-specificcertificationsPracticaltestingthatvalidatestheirknowledgeandhands-onskillsInresponsetothisindustry-wideneed,GIACdevelopedCyberLive-hands-on,real-worldpracticaltesting.CyberLivetestingcreatesalabenvironmentwherecyberpractitionersprovetheirknowledge,understanding,andskillusing:ActualprogramsActualcodeVirtualmachinesCandidatesareaskedpracticalquestionsthatrequireperformanceofreal-world-liketasksthatmimicspecializedjobroles.FindoutmoreaboutCyberLivehere. ExamFormat 1proctoredexam 106questions 4hoursMinimumpassingscoreof70%Note:GIACreservestherightto changethespecificationsforeachcertificationwithoutnotice.Based onascientificpassingpointstudy,thepassingpointfortheGCIHexam hasbeendeterminedtobe70%forallcandidatesreceivingaccessto theircertificationattemptsonorafterOctober10th,2020.Toverify theformatandpassingpointofyourspecificcertificationattempt, readtheCertificationInformationfoundinyouraccountathttps://exams.giac.org/pages/attempts. Delivery NOTE:AllGIACCertificationexamsareweb-basedandrequiredtobeproctored.Therearetwoproctoringoptions:remoteproctoringthroughProctorU,andonsiteproctoringthroughPearsonVUE.Clickhereformoreinformation. GIACcertificationattemptswillbeactivatedinyourGIACaccountafteryourapplicationhasbeenapprovedandaccordingtothetermsofyourpurchase.Detailsondeliverywillbeprovidedalongwithyourregistrationconfirmationuponpayment.Youwillreceiveanemailnotificationwhenyourcertificationattempthasbeenactivatedinyouraccount.Youwillhave120daysfromthedateofactivationtocompleteyourcertificationattempt. ExamCertificationObjectives&OutcomeStatements Drive-ByAttacksThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainstdrive-byattacksinmodernenvironments.EndpointAttacksandPivotingThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainstattacksagainstendpointsandattackpivoting.EvasiveTechniquesThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainstmethodsattackersusetoremoveevidenceofcompromiseandhidetheirpresence.IncidentResponseandCyberInvestigationsThecandidatewilldemonstrateanunderstandingofwhatIncidentHandlingis,whyitisimportant,anunderstandingofthePICERLincidenthandlingprocess,andindustrybestpracticesinIncidentResponseandCyberInvestigations.MemoryandMalwareInvestigationsThecandidatewilldemonstrateanunderstandingofthestepsnecessarytoperformbasicmemoryforensics,includingcollectionandanalysisofprocessesandnetworkconnectionsandbasicmalwareanalysisintraditionalandcloudenvironments.MetasploitThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainsttheuseofMetasploit.NetcatThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainsttheuseofcoverttoolssuchasnetcat.NetworkInvestigationsThecandidatewilldemonstrateanunderstandingofthestepsnecessarytoperformeffectivedigitalinvestigationsofnetworkdata.NetworkedEnvironmentAttacksThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainstattacksinshared-useenvironments,includingWindowsActiveDirectoryandcloudenvironments.PasswordAttacksThecandidatewilldemonstrateadetailedunderstandingofthethreemethodsofpasswordcracking.Post-ExploitationAttacksThecandidatewilldemonstrateanunderstandingofhowattackersmaintainpersistenceandcollectdata,andhowtoidentifyanddefendagainstanattackeralreadyinatraditionalnetworkoracloudenvironment. ReconnaissanceandOpen-SourceIntelligenceThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigatepublicandopensourcereconnaissancetechniques.ScanningandMappingThecandidatewilldemonstrateanunderstandingthefundamentalsofhowtoidentify,defendagainst,andmitigateagainstscanning;todiscoverandmapnetworksandhosts,andrevealservicesandvulnerabilities.SMBScanningThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigatereconnaissanceandscanningofSMBservices.WebAppAttacksThecandidatewilldemonstrateanunderstandingofhowtoidentify,defendagainst,andmitigateagainstWebApplicationAttacks. OtherResources TrainingisavailableinavarietyofmodalitiesincludinglivetrainingandOnDemand.PracticalworkexperiencecanhelpensurethatyouhavemasteredtheskillsnecessaryforcertificationCollegelevelcoursesorselfpacedstudythroughanotherprogramormaterialsmaymeettheneedsformastery.Getinformationabouttheproceduretocontestexamresults. FindAffiliateTraining PrepareforyourGIACexamwithaffiliatetraining. LearnMore CyberLive ThisexamfeaturesGIAC’sCyberLivehands-onpracticaltesting. LearnMore FindAffiliateTraining ExploreaffiliatetrainingoptionstoprepareforyourGIACcertificationexam. FindTrainingNow



請為這篇文章評分?