Security Certification: GMON

Security Certification:

GIAC Continuous Monitoring Certification (GMON)

Description

Preventing all intrusions is impossible, but early detection is a must for the security of your enterprise. The proper use of Defensible Security Architecture, Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/ Continuous Security Monitoring will support the hindrance of intrusions and allow for early detection of anomalous activity.

Target

The GMON is targeted towards security architects, engineers, analysts, and managers who want to demonstrate their ability to assess and implement defensible security architecture and continuous security monitoring. Successful GMON candidates will demonstrate the ability to securely architect a network resistant to breaches and that lends itself to monitoring. They will also demonstrate their ability to monitor, analyze detect threats and anomalies on the network.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 115 questions
  • Time limit of 3 hours
  • Minimum Passing Score of 74%

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Account & Privilege Monitoring & Authentication
The candidate will demonstrate the ability to control the privilege levels of accounts & applications
Attack Techniques
The candidate will learn to distinguish between traditional and modern attack techniques
Configuration Monitoring
The candidate will demonstrate an understanding of the tool and techniques used for configuration change monitoring
Cyber Defense Principles
The candidate will demonstrate an understanding of traditional and modern cyber defense principles
Device Monitoring
The candidate will demonstrate an understanding of the tool and techniques used for endpoint monitoring
Discovery and Vulnerability Scanning
The candidate will demonstrate an understanding of the tools and techniques used for network and endpoint discovery and vulnerability scanning
Exploit Methodology and Analysis
The candidate will be able to utilize network traffic analysis methods and principles of exploit detection to be able to rapidly discover intrusions on the network
HIDS/HIPS/Endpoint Firewalls
The candidate will demonstrate an understanding of how host intrusion detection/prevention systems & endpoint firewalls work, what their capabilities are and the roles they play in continuous monitoring
Network Data Encryption
The candidate will be able to apply principles of exploit detection to be able to rapidly detect encrypted intrusions on the network
Network Security Monitoring Tools
The candidate will demonstrate an understanding of how and why to use an assortment of network monitoring tools to improve the ability to detect intrusions on the network
NIDS/NIPS/NGFW
The candidate will demonstrate an understanding of how network intrusion detection/prevention systems & next generation firewalls work, what their capabilities are and the roles they play in continuous monitoring
Patching & Secure Baseline Configurations
The candidate will understand how to use baseline configuration auditing and patching to make endpoints more resilient.
Perimeter Protection Devices
The candidate will demonstrate the ability to identify points of access into the perimeter and network devices that can be used to protect the perimeter
Proxies & SIEM
The candidate will demonstrate an understanding of how proxies & security information and event managers work, what their capabilities are and the roles they play in continuous monitoring
Security Architecture Overview
The candidate will demonstrate an understanding of traditional and modern security architecture frameworks and the role Security Operations centers provide
Software Inventories & Whitelisting
The candidate will demonstrate an understanding of the benefits of maintaining software inventories and whitelists
Threat Intelligence
The candidate will demonstrate understanding of the techniques used to gain knowledge of potential threats to network systems and targets of attack

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.