Certification

Certification

GIAC Defending Advanced Threats (GDAT)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

GDAT Exam Certification Objectives
Command and Control With Exfiltration Fundamentals The candidate will be able to explain C2 channels and what strategies attackers use in setting up a C2 channel with well known C2 channels as a reference.
Controlling scripts in the enterprise The candidate will be able to summarize how VBS, Jscript, and Powershell scripts can be used maliciously within an environment. The candidate will be able to describe how the use of malicious scripts within an environment can be detected and prevented.
Controls for Detecting and Preventing Payload Delivery to End Users The Candidate will be able to describe how payloads can be delivered to end users through e-mail and the web as well as how to defend against and detect their delivery.
Current Threat and Attack Landscape Along the APT Attack Cycle Outline The candidate will recognize, at a high level, what motivates people to attack systems, what tactics, techniques, and procedures (TTPs) are in general, and the difference between prevention and detection. The candidate will recognize how famous APTs align with the Cyber Kill Chain®.
Defining Rules and Visualizing Results The candidate will be able to evaluate rules and configurations related to the ELK stack, Suricata, and Yara. The candidate will also be able to explain how these visualizations can be used to detect payload delivery.
Detecting and Preventing C2 and Exfiltration The candidate will be able to summarize the differences between NetFlow and full packet capture data and where to capture the data within a given architecture. The candidate will be able to describe the different classifications of data, and the standard ways in which the data can be exfiltrated from a network.
Detecting and Preventing Installation The candidate will be able to summarize typical persistence strategies. The candidate will be able to identify and recommend fixes for commonly found flaws that can be leveraged for persistence. The candidate will be able to evaluate how items like web shells, task schedulers, DLLs, Bootkits, and the registry can be used to gain persistence and how, along with leveraging the principle of least privilege, finding and fixing the flaws can help avoid installation of malware.
Detecting and Preventing Lateral Movement The candidate will be able to explain how Active Directory can be used to thwart lateral movement within a network. The candidate will be able to apply an understanding of AD architecture, authentication, user and group management, and access control to harden a domained network. The candidate will be able to leverage an understanding of Sysmon to recognize lateral movement.
Endpoint Protection The candidate will be able to compare the different ways in which vulnerabilities can be found. The candidate will be able to describe the process of protecting endpoints with the use of host based endpoint protection. The candidate will be able to evaluate the installation and configuration of endpoint protection solutions such as antivirus, firewalls, HIDS, and Application Whitelisting. The candidate will be able to summarize the Microsoft patching scheme and how patches can be reverse engineered.
Introduction to Post Event Activities The candidate will be able to summarize and classify the SANS six step IR process; Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
Learning Internal Networks and Conceptualizing Defensible Architectures The candidate will be able to compare and contrast different network architectures. The candidate will be able to evaluate an environment using common reconnaissance techniques and recognize reasonable actions to mitigate findings.
Leveraging Cyber Deception to Inform Threat Inteligence for Threat Hunting The candidate will be able to conceptualize decoys, honeypots, and canaries. The candidate will be able to summarize the process of obtaining, sharing, and operationalizing threat intelligence which can be used to perform threat hunting.
Phases of the Software Development Lifecycle The candidate will be able to compare and contrast the different phases of the Microsoft Software Development Lifecycle and threat modeling process.
Software Attacks and Mitigations The candidate will recognize how popular attacks such as buffer overflows and heap spraying work and identify how implementing software protecitons such as ASLR, DEP, SafeSEH, SEHOP, Control Flow, and Stack canaries mitigate the attacks. The candidate will be able to apply the understanding of common exploit techniques to the use of EMET in mitigating exploitation.