Important Note - Interest is terrible thing to waste. Where are you?

\/ w4rri0r \/Hacking is not a crime - It's an art of Awareness. \/ w4rri0r mission \/ is to make the information systems more secure, more aware, more reliable and protect against possible security breaches.

\/ w4rri0r \/ internationally recognized as a Security Researcher or White-Hat Hacker and Hall of Fame by Google, Microsoft, Yahoo, AppleRedHat, AT&T, Adobe, PayPal, Yandex, eBay, Deutsche TelekomBarracuda Networks, Nokia Siemens Network, Tuenti, Opera, BlackBerry, Nokia, SpotifyZynga, Netflix, iFixit, Basecamp, SoundCloudConstant Contact, Xmarks, LaunchKey, Zendesk and we are currently building \/ w4rri0r group \/ and inviting to join worldwide Security Researchers and Professionals. If you think you can contribute anything for \/ w4rri0r group \/ you are heartily invited and we'll give credit for your contribution and is greatly appreciated. [Launching soon]

If you have any questions, ideas, suggestions or contributions please do not hesitate to contact @ This email address is being protected from spambots. You need JavaScript enabled to view it. and will respond you within 24 hours.

Open Panel
  • Register

GIAC Security Certifications

Global Information Assurance Certification (GIAC) is an information security certification entity that specialises in technical and practical certification as well as new research in the form of its GIAC Gold program. SANS Institute founded the certification entity in 1999 and the term GIAC is trademarked by The Escal Institute of Advanced Technologies.

GIAC provides a set of vendor-neutral computer security certifications linked to the training courses provided by the SANS. GIAC is specific to the leading edge technological advancement of IT security in order to keep ahead of "black hat" techniques. Papers written by individuals pursuing GIAC certifications are presented at the SANS Reading Room on GIAC's website.

Initially all SANS GIAC certifications required a written paper or "practical" on a specific area of the certification in order to achieve the certification. In April 2005, the SANS organization changed the format of the certification by breaking it into two separate levels. The "silver" level certification requires two multiple-choice tests, whereas the "gold" level certification has both the multiple-choice tests requirement as well as a practical.

As of June 18, 2012, GIAC claims to have granted 42,663 certifications worldwide.


SANS GIAC Certifications
-


Security Administration

  • GIAC Information Security Fundamentals [GISF]
  • GIAC Security Essentials Certification [GSEC]
  • GIAC Certified Firewall Analyst [GCFW]
  • GIAC Certified Intrusion Analyst [GCIA]
  • GIAC Certified Incident Handler [GCIH]
  • GIAC Certified UNIX Security Administrator [GCUX]
  • GIAC Certified Windows Security Administrator [GCWN]
  • GIAC Certified Enterprise Defender [GCED]
  • GIAC Penetration Tester [GPEN]
  • GIAC Certified Web Application Penetration Tester [GWAPT]
  • GIAC Assessing Wireless Networks [GAWN]
  • GIAC Secure Internet Presence [GSIP]


Audit

  • GIAC Securing Oracle Certification [GSOC]
  • GIAC Certified ISO-17799 Specialist [G7799]
  • GIAC Systems and Network Auditor [GSNA]
  • GIAC Security Audit Essentials [GSAE]


Management

  • GIAC Information Security Professional [GISP]
  • GIAC Security Leadership Certification [GSLC]
  • GIAC Certified Project Manager [GCPM]
  • GIAC Certified Security Consultant [GCSC]


Operations

  • GIAC Operations Essentials Certification [GOEC]


Software Security and/or Secure Coding

  • GIAC .Net [GNET]    
  • GIAC Secure Software Programmer C [GSSP C]    
  • GIAC Secure Software Programmer Java [GSSP Java]
  • GIAC Secure Software Programmer .NET [GSSP .NET]


Forensics

  • GIAC Certified Forensic Examiner [GCFE]
  • GIAC Certified Forensic Analyst [GCFA]
  • GIAC Certified Reverse Engineering Malware [GREM]


Expert

  • GIAC Security Expert [GSE]
  • GIAC Security Expert in Malware [GSE-Malware]
  • GIAC Security Expert in Compliance [GSE-Compliance]

 

Check out GIAC IT Security Certifications @ www.giac.org

 

w4rri0r.com - Main Menu

h4x0r

Vulnerabilities

Exploits

Advisories

Training

Swords

CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

 
 

Read More...

IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.

 

Read More...

HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.

 

Read More...

Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 

 

Read More...

w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.