Jump to:
The GIAC Systems and Network Auditor (GSNA) certification validates a practitioner's ability to apply basic risk analysis techniques and to conduct technical audits of essential information systems. GSNA certification holders have demonstrated knowledge of network, perimeter, and application auditing as well as risk assessment and reporting.
Areas Covered
- Auditing, risk assessments, and reporting
- Network and perimeter auditing and monitoring, web application auditing
- Auditing and monitoring in windows and Unix environments
Who is GSNA for?
- Auditors
- Managers overseeing an audit or security team
- Security professionals
- System administrators
- Network administrators
- Anyone who wants to implement effective continuous monitoring processes
Exam Certification Objectives & Outcome Statements
- Auditing Access Control and Data Handling in Web ApplicationsThe candidate will demonstrate knowledge of auditing web application access control and data handling.
- Auditing the Enterprise NetworkThe candidate will demonstrate knowledge of the terms, concepts and processes associated with enterprise networks including cloud computing, containers, and physical networks.
- Auditing UNIX and Linux SystemsThe candidate will demonstrate knowledge of how to audit UNIX and Linux systems using common techniques, tools, and scripting commands to determine process information, access controls, and system configurations.
- Auditing Web ApplicationsThe candidate will demonstrate knowledge of auditing web applications.
- Auditing Windows Systems and DomainsThe candidate will demonstrate knowledge of how to audit Windows systems using common techniques, tools, and scripting commands to determine process information, access controls, and system configurations.
- Risk Assessment for AuditorsThe candidate will demonstrate knowledge of basic risk auditing terms and concepts, and how to perform an auditing risk assessment.
- The Audit ProcessThe candidate will demonstrate knowledge of basic auditing terms and concepts and demonstrate familiarity with the audit process, baselines, time based security concepts, and how risk assessment are used to identify and specify controls.
- UNIX and Linux Logging and Continuous MonitoringThe candidate will demonstrate knowledge of how to gather and interpret logging information from UNIX and Linux systems, and how to use continuous monitoring to achieve ongoing audit compliance.
- Windows Logging and Continuous MonitoringThe candidate will demonstrate knowledge of how to gather and interpret logging information from Windows systems, and how to use continuous monitoring to achieve ongoing audit compliance.

