Proficient infosec administrators can network well on the eighth layer of the OSI model (political) and the material contained

Information Security Fundamentals (GISF)

Why should you attend?

Proficient infosec administrators can network well on the eighth layer of the OSI model (political) and the material contained in this track will help them to bridge the gap that often exists between managers and system administrators. GISF candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

Who should attend

• Professionals who need to hit the ground running and need an overview of information assurance.
• Managers, Information Security Officers, and System Administrators who need an overview of risk management and defense in depth techniques.
• Anyone who writes, implements, or must adhere to policy, disaster recovery or business continuity.

Learning objectives

• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms: TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems.
• Determine your “Phishing IQ” to more easily identify SPAM email messages
• Understand physical security issues and how they support cybersecurity
• Have an introductory level of knowledge regarding incident response, business continuity, and disaster recover planning
• Access a number of websites to better understand password security, encryption, phishing, browser security


No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives’ knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security

Course agenda

  • Security’s Foundation
  • Computer Functions and Networking
  • An Introduction to Cryptography
  • Cyber Security Technologies Part 1
  • Cyber Security Technologies Part 2


Certifications must be renewed every 4 years

General Information

  • 1 proctored exam
  • 75 questions
  • Time limit of 2 hours
  • Minimum Passing Score of 70%