1. Home
  2. GIAC
  3. GCED Exam Syllabus

GIAC GCED Exam Syllabus

Start Free GCED Exam Practice After Reviewing the Topics

Before starting your GCED exam preparation, it is recommended to review the complete GIAC Certified Enterprise Defender exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free GCED questions. We also provide premium GCED practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

GIAC GCED Exam Objectives

Section Objectives
Defending Network Protocols The candidate will demonstrate an understanding of commonly-used network protocols and how to defend against protocol attacks. The candidate will demonstrate knowledge of audit techniques and the Center for Internet Security's benchmarks and Critical Security Controls.
Defensive Infrastructure and Tactics The candidate will demonstrate basic knowledge of network and cloud-based infrastructure defensive measures, including common detective and preventive controls.
Digital Forensics Concepts and Application The candidate will demonstrate an understanding of methods and practices of digital forensics. The candidate will demonstrate proficiency in identification of forensic artifacts.
Incident Response Concepts and Application The candidate will demonstrate an understanding of continuous incident response processes, and their relationship to threat intelligence practices and the Cyber Kill Chain.
Interactive Malware Analysis The candidate will demonstrate an understanding of interactive malware behavior analysis, a familiarity with the tools and techniques used to perform the analysis, and interpret the results of the analysis.
Intrusion Detection and Packet Analysis The candidate will demonstrate an understanding of intrusion prevention systems, their placement in the enterprise, and their configuration and tuning. The candidate will demonstrate proficiency in taking action in response to alerts.
Malware Analysis Concepts and Basic Analysis Techniques The candidate will demonstrate an understanding of the various types of malware, identify symptoms of infection, and methods to analyze malware safely. The candidate will demonstrate an understanding of the benefits and disadvantages of automated and static malware analysis techniques, and to interpret their results.
Manual Malware Analysis The candidate will demonstrate an understanding of manual code reversal of malware, disassembly and decompiling malware, and of code obfuscation techniques used by malware.
Network Forensics, Logging, and Event Management The candidate will demonstrate an understanding of using logs and flows in network forensics, the importance of logging and event management in security operations, and the usage of a SIEM and Security Analytics.
Network Security Monitoring Concepts and Application The candidate will demonstrate knowledge of devices that are used to monitor networks, their understanding of packet types, packet capture tools, the practice of continuous network monitoring, and advanced issues such as monitoring encrypted traffic.
Vulnerability Assessment and Penetration Testing Concepts The candidate will demonstrate knowledge of penetration testing and vulnerability assessment processes, and reporting results to the intended audience.
Vulnerability Assessment and Penetration Testing Application The candidate will demonstrate an understanding of and proficiency using penetration testing and vulnerability assessment tools, and familiarity with typical testing and assessment target types.
Official Information https://www.giac.org/certification/certified-enterprise-defender-gced