- Analyzing application network activity and static applications, assessing mobile application security
- Attacking mobile & wireless infrastructure & web applications, unlocking & rooting mobile devices
- Managing android and iOS devices, manipulating mobile application behavior and network traffic
- Mitigating against mobile malware & stolen mobile devices, penetration testing against mobile devices
Who is GMOB for?
- Security personnel who are responsible for assessing, deploying or securing mobile phones & tablets
- Penetration testers
- Ethical hackers
- Auditors who need to build deeper technical skills
- Network and system administrators
- 1 proctored exam
- 75 questions
- 2 hours
- Minimum passing score of 71%
Note: GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GMOB exam has been determined to be 71% for all candidates receiving access to their certification attempts on or after December 24th, 2016. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.
NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.
Exam Certification Objectives & Outcome Statements
- Analyzing Mobile Applications The candidate will demonstrate the understanding of techniques to evaluate mobile application binaries and permissions in order to detect potentially harmful behavior.
- Assessing Mobile Application Security The candidate will demonstrate the ability to assess the security of mobile applications with respect to privacy, data protection, and undesirable application behavior.
- Attacking Encrypted Traffic The candidate will demonstrate an understanding of tools and techniques that can exploit SSL/TLS channels and render encryption ineffective during mobile device penetration testing.
- Managing Android Devices and Applications The candidate will demonstrate familiarity with Android configuration, security models, and applications, and how they affect security posture.
- Managing iOS Devices and Applications The candidate will demonstrate familiarity with iOS configuration, security models, and applications, and how they affect security posture.
- Manipulating Mobile Application Behavior The candidate will demonstrate the understanding of security evasion techniques to test the security of mobile applications in order to detect potentially harmful behavior.
- Manipulating Network Traffic The candidate will demonstrate an understanding of typical techniques a penetration tester can use to manipulate how a mobile device interacts with networks and services to capture and manipulate network traffic.
- Mitigating Against Mobile Malware The candidate will be able to demonstrate how to protect mobile device data, and mitigate against malware targeted to mobile devices.
- Mitigating Against Stolen Mobile Devices The candidate will be able to demonstrate how to mitigate against the threat of data loss from stolen mobile devices.
- Reverse Engineering Mobile Applications The candidate will demonstrate an understanding of the core concepts associated with reverse-engineering applications on the most commonly used mobile device operating systems.
- Unlocking and Rooting Mobile Devices The candidate will demonstrate understanding of the concept and processes behind rooting, jailbreaking, and unlocking mobile devices and the security ramifications.
- Training is available in a variety of modalities including live training and OnDemand
- Practical work experience can help ensure that you have mastered the skills necessary for certification
- College level courses or self paced study through another program or materials may meet the needs for mastery.
- Get information about the procedure to contest exam results.