Certification

Certification

GIAC Certified Intrusion Analyst (GCIA)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

GCIA Exam Certification Objectives
DNS The candidate will demonstrate an understanding of how DNS works for both legitimate and malicious purposes.
Tcpdump Filters The candidate will demonstrate ability to craft tcpdump filters that match on given criteria.
IPv6 The candidate will demonstrate knowledge of IPv6 and how it differs from IPv4.
Fragmentation The candidate will demonstrate understanding of how fragmentation works, and how to identify fragmentation and fragmentation-based attacks in packet captures.
Wireshark Fundamentals The candidate will demonstrate skill associated with traffic analysis using Wireshark with an intermediate degree of proficiency.
Network Traffic Analysis The candidate will demonstrate the ability to analyze network and application traffic to identify both normal and malicious behaviors.
Concepts of TCP/IP and the Link Layer The candidate will demonstrate understanding of the TCP/IP communications model and link layer operations.
IP Headers The candidate will demonstrate the ability to dissect IP packet headers and analyze them for normal and anomalous values that may point to security issues.
TCP The candidate will demonstrate understanding of the TCP protocol and the ability to discern between typical and anomalous behavior.
UDP and ICMP The candidate will demonstrate understanding of the UDP and ICMP protocols and the ability to discern between typical and anomalous behavior.
Application Protocols The candidate will demonstrate knowledge and skill relating to application layer protocol dissection and analysis.
Packet Engineering The candidate will demonstrate knowledge relating to packet crafting and manipulation.
SiLK and Other Traffic Analysis Tools The candidate will demonstrate an understanding of SiLK and other tools to perform network traffic and flow analysis.
IDS Rules The candidate will create effective IDS rules to detect varied types of malicious activity.
Advanced IDS Concepts The candidate will demonstrate an understanding of IDS tuning methods and correlation issues.
IDS Fundamentals and Network Architecture The candidate will demonstrate knowledge of fundamental IDS concepts, such as network architecture options and benefits/weaknesses of common IDS systems.
Advanced Analysis and Network Forensics The candidate will demonstrate competence in analyzing data from multiple sources (e.g. full packet capture, netflow, log files) as part of a forensic investigation.
Hands-On IA Fundamentals The candidate will demonstrate hands-on ability to analyze IP headers, fragmented packets, and anomalous packets.
Hands-On Protocol Analysis The candidate will demonstrate hands-on ability to analyze common protocols and differentiate between normal and malicious traffic.
Hands-On Traffic Analysis The candidate will demonstrate hands-on ability to craft packets at a basic level, to analyze network traffic and analyze application protocols in-depth.
Hands-On with IDS Systems The candidate will demonstrate hands-on ability to create, modify, or troubleshoot IDS rules or signatures, and analyze IDS output.
Hands-On Network Forensics The candidate will demonstrate hands-on ability to identify malicioius and normal network traffic using a variety of tools; and perform basic network forensic analysis.