Forensic Certification: GREM

Forensic Certification:

GIAC Reverse Engineering Malware (GREM)


The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.

Reasons to become GREM certified:

  • Become more valuable to your employer and/or customers by highlighting your cutting-edge malware analysis skills through the GREM certification
  • Motivate yourself to develop a new skill set by reaching for a concrete, measurable, and achievable goal embodied by the GREM certification
  • Join the ranks of highly-respected professionals who possess the knowledge and skills that are relatively rare in the industry
  • Reinforce and affirm your ability to understand characteristics of real-world malware, so you can better respond to incidents and reinforce defenses


System and Network Administrators, Auditors, Security Consultants, and Security Managers responsible for protecting the organization from malicious code

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.


  • 1 proctored exam
  • 75 questions
  • Time limit of 2 hours
  • Minimum Passing Score of 70.7%


GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GREM exam has been determined to be 70.7% for all candidates receiving access to their certification attempts on or after April 12th, 2011. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at .


Certifications must be renewed every 4 years.


NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam . GIAC exams are delivered online through a standard web browser.

Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Analysis of Malicious Document Files
The candidate will be able to demonstrate an understanding of the tools and techniques used to analyze malicious document files.
Analyzing Protected Executables
The candidate will demonstrate an understanding of the techniques malware authors employ to protect malicious software from being analyzed, and the corresponding malware analysis techniques.
Analyzing Web-Based Malware
The candidate will be able to demonstrate an understanding of the tools and techniques used to analyze web-based malware
Common Windows Malware Characteristics in Assembly
The candidate will demonstrate an understanding of the common malware characteristics, as seen when statically examining malicious x86 and x64 assembly code.
In-Depth Analysis of Malicious Browser Scripts
The candidate will demonstrate an understanding of the skills needed to analyze complex web-based malicious software employing browser scripts.
In-Depth Analysis of Malicious Executables
The candidate will demonstrate an understanding of advanced methods for examining malicious software to uncover additional details about its functionality.
Malware Analysis Using Memory Forensics
The candidate will be able to demonstrate an understanding of using Windows memory forensics techniques to analyze malware threats.
Malware Code and Behavioral Analysis Fundamentals
The candidate will be able to demonstrate an understanding of the tools and techniques used to conduct code and behavioral analysis of malware, including building a lab environment and the use of debuggers, disassemblers, sniffers, and other useful tools.
Windows Assembly Code Concepts for Reverse-Engineering
The candidate will demonstrate an understanding of the core concepts associated with reverse-engineering malware at the assembly level in Windows, for 32-bit (x86) and 64-bit (x64) architectures.

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at .