IT Certifications

GIAC Penetration Tester (GPEN) Certification

What is the GPEN Certification?

The GIAC® Penetration Tester (GPEN) is a vendor-neutral certification created and administered by the Global Information Assurance Certification (GIAC). The GPEN certification is internationally recognized as a validation of advanced-level penetration testing skills.

The certification is tailored for security personnel whose job duties involve targeting networks to find security vulnerabilities. The exam tests the ability of candidates to conduct penetration tests by using various methodologies, their understanding the legal issues around penetration testing, and the technical and non-technical aspects of pentesting.

Who Should Earn the GPEN?

The GPEN is a technical certification that demonstrates a person’s understanding of utilizing a process-oriented approach to pentesting and reporting. Professionals who may benefit from a GPEN certification include:

  • People responsible for conducting penetration tests or security assessments
  • Ethical hackers
  • IT security auditors
  • Incident responders and computer forensic investigators
  • IT and information security professionals who want to expand their knowledge about offensive security

How Does the GPEN Certification Exam Work?

To obtain a GPEN certification, candidates must pass the certification exam. The exam is proctored and has:

  • 115 questions
  • A time limit of 3 hours
  • A minimum passing score of 74%

To register for a GPEN certification attempt, you need to submit an online application and pay a $1,699 fee. Alternatively, you can take a training course that includes an exam voucher, such as the GPEN boot camp offered by InfoSec Institute.

The GPEN certification must be renewed after four years in order to keep up with the ever-changing field of cybersecurity.

What Experience Do You Need to Take the GPEN Exam?

There are no specific prerequisites for the GPEN certification. However, you should have a firm understanding of the Windows operating system, using the Windows and Linux command line, computer networking and TCP/IP protocols, and a basic understanding of cryptographic concepts.

A number of courses are available related to hacking and penetration testing in addition to GPEN certification training.

What Are the Contents of the GPEN Certification?

There are sixteen outcome statements in the candidate handbook, which are the topics for each exam part. Candidates need to grasp the skills taught within these topics to pass the exam.

The statements are:

  • Advanced password attacks: Candidates need to be able to use methods to attack password hashes and authentication technologies
  • Attacking password hashes: Candidates should be able to obtain and attack password hashes and other password representations
  • Exploitation fundamentals: Candidates should be able to demonstrate the fundamental concepts associated with the exploitation phase of a pentest
  • Initial target scanning: Candidates should be able to conduct port, operating system, and service version scans and analyze the results
  • Metasploit: Candidates should be able to use and configure the Metasploit Framework at an intermediate level
  • Moving files with exploits: Candidates should be able to use exploits to move files between remote systems
  • Password attacks: Candidates should understand types of password attacks, formats and defenses; the circumstances under which to use each password attack variation, and be able to conduct password guessing attacks
  • Pentesting foundations: Candidates should be able to demonstrate the fundamental concepts associated with pentesting
  • Pentesting process: Candidate sshould be able to utilize a process-oriented approach to pentesting and reporting
  • Pentesting using PowerShell: Candidates should demonstrate an understanding of the use of advanced Windows PowerShell skills during a penetration test
  • Penetration testing using the Windows command line: Candidates should demonstrate an understanding of the use of advanced Windows command line skills during a penetration test
  • Reconnaissance: Candidates should understand the fundamental concepts of reconnaissance and how to obtain basic, high-level information about the target organization and network
  • Scanning for targets: Candidates should be able to use the appropriate technique to scan a network for potential targets
  • Vulnerability scanning: Candidates should be able to conduct vulnerability scans and analyze the results
  • Web application attacks: Candidates should be able to utilize common web application attacks
  • Web application reconnaissance: Candidates should demonstrate an understanding of the use of tools and proxies to discover web application vulnerabilities

How Does GPEN Compare with Other Pentesting Certifications?

The execution of penetration tests requires a high level of hacking skills by both self-study and trial-and-error. These skills range from conducting actual tests to reporting and documenting findings to clients. There are several certifications besides GPEN that aspiring pentesters may pursue:

  1. EC-Council Certified Ethical Hacker (CEH): The CEH certification is a penetration testing certification by EC-Council that establishes and governs the minimum standards for professional ethical hackers. It also reinforces the fact that ethical hacking is a unique and self-regulating profession. CEH is vendor-neutral and covers various topics, including footprinting and reconnaissance, scanning networks, host enumeration, system hacking and more.
  2. IACRB Certified Penetration Tester (CPT): The CPT certification is offered by IACRB and is designed to certify that candidates have working knowledge and skills in relation to the field of penetration testing. The CPT consists of nine domains directly relating to job duties of penetration testers.
  3. IACRB Certified Expert Penetration Tester (CEPT): The CEPT if offered by IACRB and is designed to certify that candidates have expert level knowledge and skills in the nine domains directly relating to job duties of expert-level penetration testers.

InfoSec Institute’s 10-day Penetration Testing boot camp helps students achieve all three certifications (CEH, CPT and CEPT).

How to Maintain a GPEN Certification

GIAC certifications such as GPEN require renewal every four years. Registration is enabled at the two-year mark prior to your certification expiration date.

GPEN holders need to accumulate 36 Continuing Professional Experience (CPE) credits in order to maintain their certifications. You are required to submit your CPE information and documentation in advance of your certification expiration date. You should also allow for a 30-day processing period from the time of completed submission. The submitting and tracking of CPE credits and assignment of CPE credits to specific certification renewals such as the GPEN are all completed through your online GIAC account dashboard.

The certification maintenance fee is a non-refundable $429 payment, due every four years at the time of registration. If multiple renewals are done within the two-year renewal period, each qualifies for a discount with the initial renewal fee being $429 and successive renewals being $219 each.

What Is the Best Way to Train for the GPEN Certification?

There are a variety of ways to train for the GPEN certification, including:

  • Self-studying GPEN topic areas via books, practice exams and other resources until you are confident you can pass the exam
  • Using websites like SkillSet to test your exam readiness in various topic areas
  • Taking a training boot camp, such as the GPEN certification training provided by InfoSec Institute

Conclusion

The GIAC Penetration Tester certification requires a hands-on approach and is one of the most desired technical cybersecurity certifications. The certification is awarded to penetration testers who have proven their ability to conduct pentesting on a wide range of infrastructure.

Obtaining and maintaining a GPEN or other pentesting certification helps to prove your technical ability and verify that you up to date with the latest technologies.

 

Sources

GIAC, https://www.giac.org/certification/penetration-tester-gpen

Pearson Vue, https://home.pearsonvue.com/Clients/GIAC/GIAC-Candidate-Rules.aspx

 

 

Read more…

Anastasis Vasileiadis

PC Technical || Penetration Tester || Ethical Hacker || Cyber Security Expert || Cyber Security Analyst || Information Security Researcher || Malware analyst || Malware Investigator || Reverse Engineering

Leave a Reply