GIAC Adds More Technical Certifications to List of Accredited Credentials

The Global Information Assurance Certification (GIAC) program, a SANS Institute affiliate, has announced that the GIAC Certified Forensics Analyst (GCFA), GIAC Certified Intrusion Analyst (GCIA) and GIAC Certified Incident Handler (GCIH) have been accredited under the ANSI/ISO/IEC 17024 Personnel Certification program…GCFA, GCIA and GCIH are unique certifications in the information security industry because they ensure certification holders develop deep, technical, hands-on skills. Furthermore, these certifications demonstrate that certification holders actually possess real knowledge related to forensics, intrusion detection, and incident handling. The high demand for these three GIAC credentials prove that employers place a high value on this combination of skills and knowledge.

GCFA is the leading vendor-neutral digital forensic certification. GCFA recipients prove they have a firm understanding of computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, nation state threats, and complex digital forensic cases. Sophisticated attackers advance rapidly through networks using advances in spear phishing, web application attacks, and persistent malware. Forensic investigators must master a variety of operating systems, investigation techniques, incident response tactics, and even legal issues in order to solve challenging cases. The GCFA provides a foundation for critical forensic analysis techniques for solving complex Windows- and Linux-based investigations. In addition, an alarming trend has developed in several states regarding legislation of licensing of digital forensic specialists as private investigators without regard to digital forensics qualifications. The GCFA will set apart a true professional from the untrained amateur. Due to the in-depth competency requirements of a digital forensic specialist, a professional will desire to show that they have had their skills tested and accredited.

The GCIA is the only certification of its kind for security professionals. Today, prudent organizations deploy some type of intrusion detection and these complicated systems are only as good as the analysts that manage them. GCIA holders have a complete understanding of network protocols, traffic and network theory, including normal and malicious fragmentation, abnormal stimulus response, and TCP/IP fundamentals. They are familiar with attacks against NIDS, computer systems and the network infrastructure and are able to analyze common network traffic patterns and dig into packets in order to assess what is really happening on the network. A GCIA professional is competent to manage any Intrusion Detection System.

GCIH is the most highly regarded incident handling certification in the field. An organization needs only an Internet connection or a single disgruntled employee to be attacked. From the thousands of daily probes to the malicious insider slowly creeping through vital information, attackers are targeting systems with increasing viciousness and stealth. GCIH holders have the skills and abilities to manage these incidents, to understand common attack techniques and tools, and to defend against and/or respond to such attacks when they occur. They are prepared to respond to a wide variety of security incidents, ranging from unintentional internal security violations at the smallest of companies to major international incidents involving governments and Fortune 100 enterprises. GCIH holders have mastered incident handling methodology and are equipped with the most current tools and techniques required to respond to any incident.

ANSI accreditation is important because it affirms that the GIAC program and certification development processes meet international quality requirements. ANSI/ISO/IEC 17024 accreditation helps certification holders and organizations differentiate quality and meaningful certifications from other offerings. Defining a set of established credentials improves practices within the information security industry as well as increases the integrity, confidence, and mobility of certified professionals.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

To learn more about the GCFA, GCIA, GCIH, and the GIAC program or to see a complete list of GIAC certifications, visit http://www.giac.org/info/30598.

About GIAC. Founded in 1999, the Global Information Assurance Certification (GIAC)

(http://www.giac.org/info/30598) provides IT security professionals with certification in the areas of security administration, management, operations, legal, audit, and software security. GIAC has certified over 28,000 IT security professionals and assures and validates that certified individuals have practical awareness, knowledge, and skills in key areas of computer, network, and software security. Its certifications are trusted by thousands of companies and government agencies, including the United States National Security Agency (NSA).

SANS (http://www.sans.org/info/30603) was established in 1989 as a cooperative research and education organization. Its programs reach more than 165,000 security professionals, auditors, system administrators, and network administrators who share the lessons they are learning and jointly find solutions to the challenges they face. At the heart of SANS are the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire information security community.

www.giac.org

SOURCE SANS Institute

RELATED LINKS
http://www.sans.org
http://www.giac.org

Leave a Comment

Latest Videos

In this episode of the Forensic Focus podcast, Si and Desi explore how artificial intelligence is being leveraged to uncover crucial evidence in investigations involving child sexual abuse material (CSAM) and examine the importance of exercising caution when implementing these tools. 

They also discuss a recent murder case in which cyber experts played a vital role in securing a conviction, and explore the unique challenges associated with using digital evidence as an alibi.

Show Notes:

A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM) - https://dfrws.org/wp-content/uploads/2019/06/2019_USA_paper-a_practitioner_survey_exploring_the_value_of_forensic_tools_ai_filtering_safer_presentation_for_investigating_child_sexual_abuse_material_csam.pdf

Man charged with NI murder ‘faked live stream to provide alibi’ (The Guardian) - https://www.theguardian.com/uk-news/2023/feb/02/man-charged-with-ni-faked-live-stream-to-provide-alibi

A YouTuber accused of murder faked a 6-hour livestream to produce an alibi (Sportskeeda) - https://www.sportskeeda.com/esports/news-a-youtuber-accused-murder-faked-6-hour-livestream-produce-alibi

European Interdisciplinary Cybersecurity Conference (EICC) 2023 - https://www.forensicfocus.com/event/european-interdisciplinary-cybersecurity-conference-eicc-2023/#more-493234

YouTuber reportedly faked GTA livestream to have an alibi while he committed murder (Dexerto) - https://www.dexerto.com/entertainment/youtuber-reportedly-faked-gta-livestream-to-have-an-alibi-while-he-committed-murder-2052974/

Forensic Europe Expo - https://www.forensicfocus.com/event/forensic-europe-expo/#more-493225

In this episode of the Forensic Focus podcast, Si and Desi explore how artificial intelligence is being leveraged to uncover crucial evidence in investigations involving child sexual abuse material (CSAM) and examine the importance of exercising caution when implementing these tools.

They also discuss a recent murder case in which cyber experts played a vital role in securing a conviction, and explore the unique challenges associated with using digital evidence as an alibi.

Show Notes:

A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM) - https://dfrws.org/wp-content/uploads/2019/06/2019_USA_paper-a_practitioner_survey_exploring_the_value_of_forensic_tools_ai_filtering_safer_presentation_for_investigating_child_sexual_abuse_material_csam.pdf

Man charged with NI murder ‘faked live stream to provide alibi’ (The Guardian) - https://www.theguardian.com/uk-news/2023/feb/02/man-charged-with-ni-faked-live-stream-to-provide-alibi

A YouTuber accused of murder faked a 6-hour livestream to produce an alibi (Sportskeeda) - https://www.sportskeeda.com/esports/news-a-youtuber-accused-murder-faked-6-hour-livestream-produce-alibi

European Interdisciplinary Cybersecurity Conference (EICC) 2023 - https://www.forensicfocus.com/event/european-interdisciplinary-cybersecurity-conference-eicc-2023/#more-493234

YouTuber reportedly faked GTA livestream to have an alibi while he committed murder (Dexerto) - https://www.dexerto.com/entertainment/youtuber-reportedly-faked-gta-livestream-to-have-an-alibi-while-he-committed-murder-2052974/

Forensic Europe Expo - https://www.forensicfocus.com/event/forensic-europe-expo/#more-493225

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_7QiFTiuY7Vw

AI In CSAM Investigations And The Role Of Digital Evidence In Criminal Cases

Forensic Focus 22nd March 2023 11:44 am

Throughout the past few years, the way employees communicate with each other has changed forever.<br /><br />69% of employees note that the number of business applications they use at work has increased during the pandemic.<br /><br />Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.<br /><br />Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.<br /><br />Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.<br /><br />With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.<br /><br />Join Monica Harris, Product Business Manager, as she showcases how investigators can:<br /><br />- Manage multiple cloud collections through a web interface<br />- Cull data prior to collection to save time and money by gaining these valuable insights of the data available<br />- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box<br />- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee<br />- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

Throughout the past few years, the way employees communicate with each other has changed forever.

69% of employees note that the number of business applications they use at work has increased during the pandemic.

Desk phones, LAN lines and even VOIP have become technologies of the past workplace environment as employees turn to cloud applications on their computers and phones to collaborate with each other in today’s workplace environment.

Whether it’s conversations in Teams, file uploads in Slack chats, or confidential documents stored in Office 365, the amount of data stored and where it is stored, is growing quicker than IT and systems administrators can keep up with.

Corporate investigators and eDiscovery professionals need to seamlessly collect relevant data from cloud sources and accelerate the time to investigative and discovery review.

With the latest in Cellebrite’s remote collection suite of capabilities, investigators and legal professionals can benefit from secure collection with targeted capabilities for the most used workplace applications.

Join Monica Harris, Product Business Manager, as she showcases how investigators can:

- Manage multiple cloud collections through a web interface
- Cull data prior to collection to save time and money by gaining these valuable insights of the data available
- Collect data from the fastest growing cloud collaboration applications like Office365, Google Workspace, Slack and Box
- Login to a single source for workplace app collection without logging into every app and pulling data from multiple sources for every employee
- Utilize a single unified collection workflow for computer, mobile and workplace cloud applications without the need to purchase multiple tools for different types of collections – a solution unique to Cellebrite’s enterprise solution capabilities

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_g6nTjfEMnsA

Tips And Tricks Data Collection For Cloud Workplace Applications

Forensic Focus 20th March 2023 11:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...