Security Certification: GMOB

Security Certification:

GIAC Mobile Device Security Analyst (GMOB)

Description

Mobile phones and tablets continue to demonstrate their usefulness and importance in enterprises and government offices. With the amount of sensitive data that can be accessed on these devices and their lack of security, mobile devices are enticing targets for nefarious attackers.

The GMOB ensures that the people charged with protecting systems and networks know how to properly secure the mobile devices accessing vital information.

Target

The GIAC Mobile Device Security Analyst (GMOB) certification is ideal for security personnel whose job duties involve assessing mobile devices to find security vulnerabilities. A successful GMOB candidate will have an up-to-date technical knowledge and thorough understanding of mobile device penetration testing and the ability to perform a basic security analysis of mobile applications. They will also be able to understand and apply security policies in a mobile environment as well as:

  • Test for and mitigate against common vulnerabilities and security threats against mobile applications.
  • Be familiar with mobile device architecture, operating systems, and security features.
  • Understand the general common methods used to attack mobile devices, including jailbreaking, rooting, sidejacking, and web application attacks.
  • Use common techniques to protect mobile devices, including configuration management and encryption.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 75 questions
  • Time limit of 2 hours
  • Minimum Passing Score of 66%

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Analyzing Application Network Activity
The candidate will demonstrate the ability to capture and interpret network traffic for the purposes of assessing the security of mobile device applications.
Analyzing Static Applications
The candidate will demonstrate the understanding of techniques to evaluate mobile application binaries and permissions in order to detect potentially harmful behavior.
Assessing Mobile Application Security
The candidate will demonstrate the ability to assess the security of mobile applications with respect to privacy, data protection, and undesirable application behavior.
Attacking Mobile and Wireless Infrastructure
The candidate will demonstrate the ability to recognize and leverage architectural opportunities on mobile devices and the associated infrastructure to improve security of mobile devices.
Attacking Mobile Web Applications
The candidate will demonstrate understanding of common mobile web application attacks such as XSS, client-side injection, SQL injection, and parameter tampering.
Managing Android Devices
The candidate will demonstrate familiarity with Android configuration and security models and how they affect security posture.
Managing iOS Devices
The candidate will demonstrate familiarity with iOS configuration and security models and how they affect security posture.
Managing Mobile Accessories
The candidate will demonstrate familiarity with other mobile devices such as wearable technologies, their security risks, and mitigation strategies.
Manipulating Mobile Application Behavior
The candidate will demonstrate the understanding of security evasion techniques to test the security of mobile applications in order to detect potentially harmful behavior.
Manipulating Network Traffic
The candidate will demonstrate an understanding of typical wireless traffic attacks such as sidejacking, traffic manipulation and SSL/TLS attacks.
Mitigating Against Mobile Malware
The candidate will be able to demonstrate how to protect mobile device data, and mitigate against malware targeted to mobile devices.
Mitigating Against Stolen Mobile Devices
The candidate will be able to demonstrate how to mitigate against the threat of data loss from stolen mobile devices.
Penetration Testing against Mobile Devices
The candidate will demonstrate the ability to implement a regular penetration testing program to evaluate a mobile device deployment, to identify vulnerabilities, and to accurately evaluate the threat of vulnerabilities to an organization.
Unlocking and Rooting Mobile Devices
The candidate will demonstrate understanding of the concept and processes behind rooting, jailbreaking, and unlocking mobile devices and the security ramifications.

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.