Use this quick start guide to collect all the information about GIAC GCIH Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the GIAC Incident Handler (GCIH) exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual GIAC Certified Incident Handler (GCIH) certification exam.
The GIAC GCIH certification is mainly targeted to those candidates who want to build their career in Cyber Defense domain. The GIAC Certified Incident Handler (GCIH) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of GIAC GCIH.
GIAC GCIH Exam Summary:
Exam Name | GIAC Certified Incident Handler (GCIH) |
Exam Code | GCIH |
Exam Price | $999 (USD) |
Duration | 240 mins |
Number of Questions | 106 |
Passing Score | 70% |
Books / Training | SEC504: Hacker Tools, Techniques, and Incident Handling |
Schedule Exam | GIAC |
Sample Questions | GIAC GCIH Sample Questions |
Practice Exam | GIAC GCIH Certification Practice Exam |
GIAC GCIH Exam Syllabus Topics:
Topic | Details |
---|---|
Detecting Covert Communications | - The candidate will demonstrate an understanding of how to identify and defend against the use of covert tools such as netcat. |
Detecting Evasive Techniques | - The candidate will demonstrate an understanding of how to identify, defend against methods attackers use to remove evidence of compromise and hide their presence. |
Detecting Exploitation Tools | - The candidate will demonstrate an understanding of how to identify, defend against the use of exploit tools such as Metasploit. |
Drive-By Attacks | - The candidate will demonstrate an understanding of how to identify, defend against drive-by attacks in modern environments. |
Endpoint Attack and Pivoting | - The candidate will demonstrate an understanding of how to identify and defend against endpoint specific attacks and pivoting in an environment. |
Incident Response and Cyber Investigation | - The candidate will demonstrate an understanding of the PICERL and DAIR incident handling processes and incident response challenges. |
Memory and Malware Investigation | - The candidate will demonstrate an understanding of the steps necessary to perform basic memory forensics and basic malware analysis. |
Network and Log Investigations | - The candidate will demonstrate an understanding of the steps necessary to perform effective investigations of network and log data. |
Networked Environment Attack | - The candidate will demonstrate an understanding of how to identify, defend against, and mitigate against attacks in shared-use environments. |
Password Attacks | - The candidate will demonstrate a detailed understanding of password cracking attacks, common password weaknesses, and password defenses. |
Post-Exploitation Attacks | - The candidate will demonstrate an understanding of how attackers maintain persistence and collect data, and how to identify and defend against an attacker already in a traditional network or a cloud environment. |
Scanning and Mapping | - The candidate will demonstrate an understanding of how to discover and map networks and hosts, reveal services and vulnerabilities, and identify and defend against scanning. |
SMB Security | - The candidate will demonstrate an understanding of SMB features, vulnerabilities, how to discover and access shares, and how to secure the service. |
Web App Attacks | - The candidate will demonstrate an understanding of how to identify, defend against common web application attacks. |
To ensure success in GIAC GCIH certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for GIAC Incident Handler (GCIH) exam.