Cyber Security Certification: GASF

Cyber Security Certification: GASF


The popularity of mobile devices in our work and personal lives has become increasingly broad and complex. The volume and type of data that these devices carry such as contact lists, email, work documents, SMS messages, images, internet browsing history and application specific data make them important for the individual who carries the device and allows for a rich source of data for forensic examinations.

Areas Covered

Who is GASF for?

Requirements

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.


Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

iOS Forensic Fundamentals
The candidate will demonstrate an understanding of the techniques and tools used during the collection and preservation of iOS mobile devices.
Additional Mobile Operating System Forensic Fundamentals
The candidate will be demonstrate and understanding of mobile platforms such as Nokia/Symbian and Windows Mobile and how these devices create, store and share information with desktop and remote systems. The candidate will be familiar with knock off devices and how to identify knock off devices and how these device differ from traditional mobile platforms in the storage and organization of data.
Android File System, Evidence Locations and User Activity Analysis
The candidate will demonstrate an understanding of the structure of the Android file system and be familiar with the techniques used to analyze and interpret user activity.
Android Forensic Fundmentals
The candidate will demonstrate an understanding of the techniques and tools used during the collection and preservation of Android mobile devices.
Detection and Analysis of Mobile Malware and Spyware
The candidate will be able to demonstrate an understanding of the tools and techniques used to detect, decompile and analyze mobile malware.
Fundamentals of BlackBerry Forensics
The candidate will demonstrate an understanding of the structure of the BlackBerry file system and be familiar with the techniques used to analyze and interpret user activity.
Introduction to Smartphone Forensics
The candidate will demonstrate an understanding of the basic principles, techniques and methods used to collect and preserve data during a forensic examination of a mobile device.
iOS File System, Evidence Locations and User Activity Analysis
The candidate will demonstrate an understanding of the structure of the iOS file system and be familiar with the techniques used to analyze and interpret user activity.
Smartphone Application Forensics and Activity Analysis
The candidate will be able to demonstrate an understanding of the analysis and techniques used to examine third party application activity on various mobile platforms.
Smartphone Backup Forensic Analysis
The candidate will be familiar with the various backup methodology and platform specific resources used by mobile devices when creating system backups.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Other Resources