Certification

Certification

GIAC Certified UNIX Security Administrator (GCUX)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

GCUX Exam Certification Objectives
Apache The candidate will be able to demonstrate an understanding of how to securely setup and configure an Apache server
Best Practices for Kernel Tuning and Warning Banners The candidate will demonstrate the ability to implement best-practice configurations for kernel parameters and warning banners.
Boot Services The candidate will be able to demonstrate an understanding of disabling unnecessary services at boot time
Chroot() The candidate will understand chroot() strengths and weaknesses, how to configure services in a chroot() environment and how to configure scponly with chroot().
DNS- BIND The candidate will understand DNS and be able to implement best practices for secure BIND configuration.
DNSSec The candidate will demonstrate a fundamental understanding of DNSSec and how it provides increased security over DNS.
Evidence Collection and Preservation The candidate will demonstrate the ability to collect evidence from compromised hosts and maintain the chain of custody in a forensically sound manner.
Forensic Analysis The candidate will demonstrate the ability to conduct rudimentary forensic analysis on images of compromised systems.
Forensic Preparation and Incident Handling The candidate will demonstrate understanding of the IR process as well as preparations and planning especially where forensics is concerned.
Host Based Firewalls - iptables The candidate will demonstrate an understanding of firewall configuration in general and basic iptables commands used to create a host based firewall.
OS Install and Patching The candidate will demonstrate an under standing of secure OS installation options and patching techniques.
Physical, User Account, and Password Access Control The candidate will demonstrate an understanding of physical security issues and fundamental user account/password security with respect to Linux/Unix systems.
Post-Exploitation and AIDE The candidate will demonstrate the ability to configure AIDE and utilize it to detect post-exploitation activities and intrusions.
Se Linux The candidate will demonstrate the ability to use basic SELinux commands understand how SELinux can be used to create and enforce a security policy
SSH The candidate will be able to securely configure SSH to perform numerous Unix security/sysadmin tasks
Stack Smashing The candidate will understand how traditional memory based attacks work.
Sudo The candidate will demonstrate the ability to configure sudo for access control in Linux/Unix environments.
Syslog-NG The candidate will demonstrate the ability to configure a centralized logging server using syslog-ng.
Unix Logging The candidate will understand how to configure logging features native to Unix environments.
Unix System Forensics The candidate will demonstrate an understanding of the forensic process and fundamental forensic concepts as they apply to Unix systems.