GIAC GCIH
Exam Code: GCIH
The premier incident handling certification from SANS/GIAC. Validate your ability to detect, respond to, and resolve computer security incidents.
Exam Code: GCIH
The premier incident handling certification from SANS/GIAC. Validate your ability to detect, respond to, and resolve computer security incidents.
GIAC Certified Incident Handler (GCIH) is a highly respected certification that validates your ability to detect, respond to, and resolve security incidents. Developed by SANS Institute, it's considered one of the most rigorous incident handling credentials available.
GCIH certification demonstrates knowledge of:
GCIH is designed for:
Prerequisites: Security fundamentals knowledge equivalent to GSEC.
The GCIH exam includes:
| Background | Recommended Study Time |
|---|---|
| Active IR role | 6-8 weeks |
| Security professional | 10-12 weeks |
| IT professional | 14-16 weeks |
GCIH aligns with the SANS SEC504: Hacker Tools, Techniques, and Incident Handling course:
The SANS course is highly recommended but not required for the exam.
Incident Handling Process
Attack Detection
Hacker Techniques Understanding
Defensive Tools
GCIH holders command premium salaries:
The GCIH exam is proctored online through GIAC's platform or at a Pearson VUE center. You will face 106 multiple choice questions over 4 hours. Unlike most cybersecurity exams, GCIH is open book: you may bring any printed materials, including books, notes, and a custom index you have prepared. No electronic devices are permitted.
The index is your most powerful tool. Successful candidates spend 15 to 20 hours building a detailed, tabbed index of the SEC504 courseware and supplementary materials. Organize it by topic (not alphabetically) so you can locate answers within 30 seconds. A strong index turns "I don't remember" questions into easy lookups, letting you reserve brainpower for the complex analytical questions.
Time management: 106 questions in 240 minutes gives you roughly 2 minutes 15 seconds per question. Most GCIH candidates finish with 30 to 45 minutes remaining, so the time pressure is moderate. However, resist the urge to rush; many questions present scenarios with subtle details that change the correct answer. Read every option completely before selecting.
Common mistakes: Candidates who skip the SANS course and self-study often struggle with questions about specific tools demonstrated in SEC504 labs, such as Scapy packet crafting, Metasploit module selection, and SIEM correlation rules. Another frequent error is confusing incident handling phases; the exam tests precise knowledge of when containment ends and eradication begins, and what documentation is required at each stage. Questions about legal considerations (evidence handling, chain of custody) also trip up candidates who focus exclusively on technical skills.
GCIH preparation strategy differs fundamentally from other certifications because of the open book format. Your goal is not memorization but rather deep understanding plus rapid reference lookup.
With SANS SEC504 (recommended): The SANS SEC504: Hacker Tools, Techniques, and Incident Handling course is a 5-day intensive training (live or OnDemand). It costs $8,275 to $9,045 depending on the delivery format, but includes the exam attempt, two practice tests, and 4 months of lab access via CyberLive. SEC504 maps directly to every GCIH exam objective, making the course-to-exam pipeline highly efficient. SANS also runs periodic promotions and offers scholarships for students and career changers.
Self-study path: If the SANS price is prohibitive, you can register for the exam independently for $949. Use these resources: Chris Sanders' "Applied Network Security Monitoring" and "Incident Response & Computer Forensics" (Third Edition) by Luttgens, Pepe, and Mandia cover the defensive and IR methodology. CyberDefenders (cyberdefenders.org) offers free blue team challenges that align with GCIH detection objectives. Blue Team Labs Online (blueteamlabs.online) provides scenario-based challenges for SIEM analysis and incident triage.
Practice environments: SANS CyberRanges (included with course enrollment) simulate real incident response scenarios. For self-study candidates, build a home SIEM lab with Security Onion or Wazuh, ingesting logs from a small network. Practice analyzing pcap files with Wireshark and identifying attack patterns.
Allocate 2 to 3 full days to index creation. Use tabbed dividers for major categories: Reconnaissance, Scanning, Exploitation, Post-Exploitation, Incident Handling Process, Defense Tools, and Legal/Compliance. Under each tab, reference specific page numbers in your source materials with brief one-line summaries of what each page covers.
GCIH is one of the most respected certifications in the incident response and security operations space. It carries significant weight in job listings for Incident Response Analyst ($85,000 to $120,000), Senior SOC Analyst ($95,000 to $130,000), Threat Hunter ($100,000 to $140,000), and IR Team Lead ($120,000 to $160,000) positions.
In the US federal sector, GCIH satisfies DoD 8570 requirements for CSSP Analyst, CSSP Incident Responder, and CSSP Auditor roles. Federal contractors and agencies specifically request GCIH because SANS training is trusted within the defense community. In Europe, GCIH-certified professionals in Germany earn EUR 65,000 to EUR 95,000, while UK roles offer GBP 55,000 to GBP 85,000.
GCIH differentiates you from CySA+ holders in the eyes of enterprise employers. While CySA+ validates foundational blue team skills, GCIH demonstrates that you understand the attacker's perspective deeply enough to respond effectively. This dual knowledge (offense plus defense) is what makes GCIH holders particularly valuable for Tier 2/3 SOC positions and dedicated IR teams.
Career progression from GCIH typically leads to GIAC Certified Forensic Analyst (GCFA) for digital forensics specialization, GIAC Certified Enterprise Defender (GCED) for security architecture, or management roles like SOC Manager and Director of Incident Response.
| Item | Cost |
|---|---|
| SANS SEC504 course (OnDemand) | $8,275 |
| GCIH exam (included with course) | $0 |
| GCIH exam (standalone, no course) | $949 |
| Self-study books and materials | $100 to $200 |
| Blue Team Labs subscription (3 months) | $40 |
| Certification renewal (every 4 years) | $479 |
| Total (SANS course path) | $8,275 |
| Total (self-study path) | $1,100 to $1,200 |
The SANS course is expensive, but many employers cover it entirely. GCIH is one of the certifications most frequently sponsored by employers because SANS training has a proven track record of improving team capability. If your organization does incident response, frame the request as direct operational improvement, not personal development.
GCIH renewal requires earning 36 CPE credits every 4 years and paying the $479 maintenance fee. Given the $25,000+ average salary increase, the investment returns within 2 to 3 months of securing a GCIH-qualifying role.
Before committing to the exam, assess your readiness:
Recommended timeline: If taking SEC504, begin index creation during the course. Schedule the exam 4 to 6 weeks after course completion. If self-studying, plan for 12 to 16 weeks of preparation, allocating 10 to 15 hours per week.
Your index will make or break you. Every GCIH holder will tell you the same thing: spend more time on the index than you think is necessary. Color-code tabs, use sticky notes, and practice looking things up under time pressure. During the exam, you should be able to find any topic within 30 seconds.
Take both practice exams seriously. GIAC provides two practice exams with your attempt. Take the first one 3 weeks before your exam date without your index to identify weak areas. Take the second one 1 week before with your index to simulate real conditions. Aim for 80%+ on the second practice exam before sitting the real thing.
The exam tests incident handling methodology more than it tests hacking skills. Candidates with offensive security backgrounds sometimes focus too heavily on attack techniques and underperform on questions about containment strategies, recovery procedures, and lessons learned documentation. Balance your preparation across all five domains.
Join the GIAC Advisory Board community and the r/GIAC subreddit. Active GCIH holders share study tips, index templates, and career advice. SANS also hosts free webcasts and whitepapers on incident handling topics that serve as excellent supplementary material.
Schedule the exam when you feel 80% ready. Waiting for 100% confidence leads to indefinite postponement. Your index compensates for the remaining 20%.
Average Before
$80,000
Average After
$105,000
Average Increase
$25,000 (+31%)
Source: SANS/GIAC Salary Survey 2024
Yes, the GCIH exam is open book. You can bring any printed materials including your custom index. This makes preparation strategy (building a good index) crucial.
No, but the SANS SEC504 course is highly recommended. The exam aligns directly with SEC504 content, making self-study more challenging.
GCIH is more rigorous and respected in enterprise/government, while CySA+ is more accessible and DoD-approved. GCIH commands higher salaries.
GCIH is challenging with 106 questions in 4 hours. The open-book format means questions are complex and require understanding, not just memorization.
Industry-standard entry-level cybersecurity certification validating core security skills. Globally recognized by employers and DoD-approved.
Intermediate security analyst certification for threat detection, analysis, and response. Bridge the gap between Security+ and advanced certifications.