Certification: GMOB

Certification:

GIAC Mobile Device Security Analyst (GMOB)

Description

Mobile phones and tablets continue to demonstrate their usefulness and importance in enterprises and government offices. With the amount of sensitive data that can be accessed on these devices and their lack of security, mobile devices are enticing targets for nefarious attackers.

The GMOB ensures that the people charged with protecting systems and networks know how to properly secure the mobile devices accessing vital information.

Target

The GIAC Mobile Device Security Analyst (GMOB) certification is ideal for security personnel whose job duties involve assessing mobile devices to find security vulnerabilities. A successful GMOB candidate will have an up-to-date technical knowledge and thorough understanding of mobile device penetration testing and the ability to perform a basic security analysis of mobile applications. They will also be able to understand and apply security policies in a mobile environment as well as:

  • Test for and mitigate against common vulnerabilities and security threats against mobile applications.
  • Be familiar with mobile device architecture, operating systems, and security features.
  • Understand the general common methods used to attack mobile devices, including jailbreaking, rooting, sidejacking, and web application attacks.
  • Use common techniques to protect mobile devices, including configuration management and encryption.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 75 questions
  • Time limit of 2 hours
  • Minimum Passing Score of 66%

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Android Essentials and Device Management
The candidate will demonstrate familiarity with Android configuration and security models and how they affect security posture.
Application Network Activity Analysis
The candidate will demonstrate the ability to capture and interpret network traffic for the purposes of assessing the security of mobile device applications.
Blackberry Essentials and Device Management
The candidate will demonstrate familiarity with Blackberry phone configuration and security models and how they affect security posture.
iOS Essentials and Device Management
The candidate will demonstrate familiarity with iOS configuration and security models and how they affect security posture.
Mobile and Wireless Infrastructure Attacks
The candidate will demonstrate the ability to recognize and leverage architectural opportunities on mobile devices and the associated infrastructure to improve security of mobile devices.
Mobile Device Penetration Testing
The candidate will demonstrate the ability to implement a regular penetration testing program to evaluate a mobile device deployment, to identify vulnerabilities, and to accurately evaluate the threat of vulnerabilities to an organization.
Mobile Web Application Attacks
The candidate will demonstrate understanding of common mobile web application attacks such as XSS, client-side injection, SQL injection, and parameter tampering.
Operational Security for Mobile Devices
The candidate will be able to demonstrate how to implement and test secure mobile device configurations, protect mobile device data, and mitigate against malware targeted to mobile devices.
Securing Mobile Devices in the Enterprise
The candidate will be able to design a mobile device policy that recognizes and mitigates against threats posed to mobile devices and their supporting infrastructures, and to validate the acceptable use of mobile devices.
Static Application Analysis
The candidate will demonstrate the understanding of techniques to evaluate mobile application binaries and permissions in order to detect potentially harmful behavior.
Traffic Manipulation Attacks
The candidate will demonstrate an understanding of typical wireless traffic attacks such as sidejacking, traffic manipulation and SSL/TLS attacks.
Unlocking Mobile Devices
The candidate will demonstrate understanding of the concept and processes behind rooting, jailbreaking, and unlocking mobile devices and the security ramifications.
Windows Phone Essentials and Device Management
The candidate will demonstrate familiarity with Windows Phone configuration and security models and how they affect security posture.

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.