GIAC Information Security Fundamentals (GISF)

GIAC Information Security Fundamentals (GISF)

   Watch Promo

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

AAA and Access Controls

The candidate will demonstrate an understanding of access controls and effective authentication, authorization and accountability.

Application Security

The candidate will demonstrate an understanding of securing applications from malware and other common threats.

Computer Math

The candidate will demonstrate an understanding of foundational numbering systems.

Cryptographic Algorithms and Attacks

The candidate will demonstrate an understanding of cryptographic algrorithms.

Fundamentals of Cryptography

The candidate will demonstrate an understanding of cryptography and its application.

History of Cryptography

The candidate will demonstrate an understanding of cryptography throughout history..

Network Addressing and Protocols

The candidate will demonstrate an understanding of network addressing and protcols.

Network Attacks

The candidate will demonstrate a foundational understanding of network attacks.

Network Communication Fundamentals

The candidate will demonstrate an understanding of network concepts and terminology.

Network Security Technology

The candidate will demonstrate an understanding of countermeasures and technologies employed to minimize the associated risks from attacks.

Risk Management Principles and Security Policy

The candidate will demonstrate an understanding of fundamental information security and risk management concepts as well as the components of effective policy creation and awareness programs.

Systems Security

The candidate will demonstrate an understanding of securing systems from common threats.

Wireless Security Technology

The candidate will demonstrate an understanding of wireless technologies as well as the defenses employed to minimize the associated risks from wireless attacks.



Your Instructor


Mohamed Atef
Mohamed Atef

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience



Course Curriculum



Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!