Security Certification: GAWN

Security Certification:

GIAC Assessing and Auditing Wireless Networks (GAWN)

Description

The GAWN certification is designed for technologists who need to assess the security of wireless networks. The certification focuses on the different security mechanisms for wireless networks, the tools and techniques used to evaluate and exploit weaknesses, and techniques used to analyze wireless networks. Students will not only gain experience using tools to assess wireless networks, they will understand how the tools operate and the weaknesses in protocols that they evaluate.

Target

Auditors, network administrators and penetration-testers who are responsible for assessing the security of wireless networks.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 75 questions
  • Time limit of 2 hours
  • Minimum Passing Score of 70%

Note:

GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GAWN exam has been determined to be 71% for all candidates receiving access to their certification attempts on or after August 14th, 2013. To verify the format of your current certification attempt, please read the Certification Information found in your portal account at https://exams.giac.org/pages/attempts. https://exams.giac.org/pages/attempts.

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

802.11 Fuzzing Attacks
The candidate will be able to perform basic fuzzing attacks.
Attacking Weak Encryption
The candidate will be familiar with weak encryption methods including WEP and how to attack and secure them.
Bluetooth Attacks
The candidate will be familiar with the structure, uses and weaknesses of Bluetooth.
Bluetooth Low Energy Attacks
The candidate will demonstrate understanding of how changes to Bluetooth Low Energy affect security, and methods to test, inspect, and audit Bluetooth Low Energy data in transit.
Bridging the Air Gap
The candidate will be able to use a compromised wireless system to further compromise a wired network.
DECT
The candidate will be familiar with DECT including how to attack and secure it.
DoS on Wireless Networks
The candidate will be able to perform and defend against common DoS attacks.
High-Frequency RFID Attacks
The candidate will demonstrate understanding of RFID tracking techniques, and how to exploit mid to long-range RFID applications.
Hotspots
The candidate will be familiar with the identification and auditing of hotspots.
Low-Frequency RFID Attacks
The candidate will demonstrate understanding of short-range, Low Frequency (LF) RFID attacks, including impersonation and cloning of Low-Frequency RFID tags.
NFC
The candidate will demonstrate understanding of Near Field Communications (NFC) and how it uses consistent data protocols to exchange data bidirectionally for uses in payment systems, and generic data transfers.
Practical SDR Attacks
The candidate will be familiar with the common implementations of wireless protocols and how SDR projects can identify failures in the overall implementation of those protocols.
Rogue Networks
The candidate will understand how to identify and protect against rogue networks.
Sniffing Wireless
The candidate will be capable of capturing wireless traffic.
Wireless Basics
The candidate will be familiar with common wireless threats as well as current wireless network standards.
Wireless Client Attacks
The candidate will demonstrate understanding of wireless client vulnerabilities, including hotspot injection, weaknesses in wireless client segmentation or public secure packet forwarding, and the preferred network list on client systems.
WPA2
The candidate will be familiar with WPA2 including how to attack and secure it.
Zigbee
The candidate will be familiar with Zigbee including how to attack and secure it.

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at https://www.giac.org/about/procedures/grievance.