GXPN
GIAC Exploit Researcher and Advanced Penetration Tester
GIAC Exploit Researcher and Advanced Penetration Tester
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Market signals
public, citable inputs to the recognition score› Built for these roles
› Exam format
82 questions + CyberLive, 3 hours, open-book, proctored via Pearson VUE. Passing score: 67%.
30-day wait between attempts. SANS course bundles typically include 2 attempts.
› Recertification
Valid for 4 years. Renewal via 36 CPE credits or renewal exam (479 USD). Each GIAC cert separately.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 2 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.
› Prerequisites
No formal prerequisites. Associated SANS course strongly recommended.
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
No certs require this one.
No follow-on certs reference this one yet.
› Study materials
Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.
- SANS SEC660 Course Materials — SANS
- GIAC Practice Tests (2 included with exam)
› Version & lifecycle
› Salary signal
Senior pentester / exploit developer, US, 5+ years.
Robert Half Salary Guide + Glassdoor 'Exploit Developer' aggregations · 2024 · US base only · p25–p75 range
› How it compares
GXPN covers exploit-writing breadth; OSEE is the deepest single-domain Windows exploit-writing exam.
↔ Compare side-by-sideGXPN is senior to OSCP — assumes OSCP-level proficiency and adds exploit-writing depth.
↔ Compare side-by-side› Careers that commonly pursue this cert
Ethically hack systems to find vulnerabilities before attackers do. Offensive security requires deep technical knowledge.
Dissect malicious software to understand capabilities, extract indicators, and produce attribution. A specialist role that powers threat intelligence, detection engineering, and advanced IR.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.