GNFA
GIAC Network Forensic Analyst
GIAC Network Forensic Analyst
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Exam format
75 questions + CyberLive, 3 hours, open-book, proctored via Pearson VUE. Passing score: ~70%.
30-day wait between attempts. SANS course bundles typically include 2 attempts.
› Recertification
Valid for 4 years. Renewal via 36 CPE credits or renewal exam (479 USD). Each GIAC cert separately.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 3 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.
SIGMA/YARA/Suricata rule writing, hypothesis-driven hunting, log deep-dives, detection gap analysis.
IR playbooks, memory/disk/network forensics, chain of custody, malware analysis.
Firewalls, IDS/IPS, network segmentation, DNS security, SD-WAN, VPN, traffic analysis, wireless security.
› Prerequisites
No formal prerequisites. Associated SANS course strongly recommended.
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
› Study materials
Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.
- SANS FOR572 Course Materials — SANS
- SANS FOR572 Advanced Network Forensics, Threat Hunting & IR
- GIAC Practice Tests (2 included with exam)
› Version & lifecycle
› Salary signal
Network forensics analyst / DFIR engineer, US, 3-5 years.
Robert Half Salary Guide · 2024 · US base only · p25–p75 range
› How it compares
GNFA is network-forensics focused; GCFA is host + cross-platform IR. Often paired in DFIR teams.
↔ Compare side-by-side› Careers that commonly pursue this cert
Investigate breaches, contain threats, and perform digital forensics. The first call when an attack is discovered.
Dissect malicious software to understand capabilities, extract indicators, and produce attribution. A specialist role that powers threat intelligence, detection engineering, and advanced IR.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.