Find a Certification
GIAC Certifications provide the highest and most rigorous assurance of cyber security knowledge and skill available to industry, government, and military clients across the world.

- New
GIAC Cyber Incident Leader (GCIL)
Show readiness to lead the team that handles and remediates cyber incidents with expert knowledge and effective communication, capably restoring and protecting your organization.

GIAC Security Operations Manager Certification (GSOM)
Demonstrate readiness to lead a capable Security Operations Center, using advanced frameworks and tools and the leadership skills to implement them effectively.

- AI-Focused
GIAC Strategic Planning, Policy, and Leadership (GSTRT)
Set yourself apart with proven leadership skills and an executive mindset, bridging cybersecurity expertise with strategic assurance.

- AI-Focused
GIAC Critical Controls Certification (GCCC)
Set yourself apart as an informed defender, able to operationalize standards and controls to effectively manage risk.

- Abeyance
GIAC Law of Data Security & Investigations (GLEG)
The GIAC Law of Data Security & Investigations (GLEG) certification validates a practitioner's knowledge of the law regarding electronically stored and transmitted records. GLEG certification holders have demonstrated knowledge of the law of fraud, crime, policy, contracts, privacy, compliance, cybersecurity, and investigations.

GIAC Information Security Professional Certification (GISP)
Offer a pragmatic alternative to CISSP, signaling broad security domain fluency validated by a respected provider.

- AI-Focused
GIAC Security Leadership (GSLC)
Demonstrate readiness to lead security teams, implementing technical guardrails and blending practical skill with strategic governance.

- Abeyance
GIAC Systems and Network Auditor Certification (GSNA)
The GIAC Systems and Network Auditor (GSNA) certification validates a practitioner's ability to apply basic risk analysis techniques and to conduct technical audits of essential information systems. GSNA certification holders have demonstrated knowledge of network, perimeter, and application auditing as well as risk assessment and reporting.
