Certification

Certification

GIAC Certified Perimeter Protection Analyst (GPPA)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

GPPA Exam Certification Objectives
IPv6 and ICMPv6 The candidate will understand the basics of IP and ICMP version 6.
Perimeter Concepts and IP Fundamentals The candidate will demonstrate a thorough understanding of the IP header, and basic perimeter concepts including services, firewalls, and layered security.
Packet Fragmentation The candidate will demonstrate an understanding of how fragmentation works and fragmentation-based attacks.
TCP/IP Protocols The candidate will demonstrate a thorough understanding of TCP, UDP and ICMP.
Network Based Intrusion Detection and Prevention (NIPS/NIDS) The candidate will demonstrate an understanding of network intrusion detection and prevention devices and techniques
Creating and Auditing a Rulebase The candidate will demonstrate an understanding of building and verifying firewall rulebases that serve the needs of the business and map to security policy.
Securing Hosts and Services The candidate will demonstrate an understanding of the principles, tools, and techniques for securing externally accessible hosts and common server services.
Host-Based Detection and DLP The candidate will demonstrate understanding of the capabilities of HIDS and HIPS, and be familiar with DLP techniques.
Log Collection and Analysis The candidate will demonstrate understanding of techniques for centralizing log collection and analyzing firewall logs.
Static and Stateful Packet Filtering The candidate will demonstrate an understanding of how static and stateful packet filters work and how to filter and analyze traffic using Netfilter and other open source tools
Advanced Perimeter Protection The candidate will demonstrate understanding of perimeter protection technologies and techniques including proxies, application firewalls, virtual firewalls, deep packet inspection and UTM
Routers Security and Network Access Control The candidate will demonstrate understanding of the basics of router hardening and NAC through Cisco IOS security configuration and applying ACLs
VPN Basics and Implementation The candidate will demonstrate an understanding of VPN authentication, encryption and implementation, including an understanding of remote access protocols and technologies
Wireless Design and Security The candidate will demonstrate familiarity with basic wireless network design and security issues
Cloud Security The candidate will demonstrate familiarity with cloud service, infrastructure and security issues
Vulnerabilty Assessment and Auditing The candidate will demonstrate an understanding of network vulnerability assessments and auditing using common network and OS tools