GIAC Network Forensic Analyst (GNFA)
The GIAC Network Forensic Analyst (GNFA) certification validates a practitioner's ability to perform examinations employing network forensic artifact analysis. GNFA certification holders have demonstrated an understanding of the fundamentals of network forensics, normal and abnormal conditions for common network protocols, processes and tools used to examine device and system logs, and wireless communication and encrypted protocols.
About
- Network architecture, network protocols, and network protocol reverse engineering
- Encryption and encoding, NetFlow analysis and attack visualization, security event & incident logging
- Network analysis tools and usage, wireless network analysis, & open source network security proxies
Audience
- Anyone interested in computer network intrusions and investigations who has a solid background in computer forensics, information systems, and information security
- Incident response team members
- Forensicators
- Threat hunters
- Law enforcement officers, federal agents, and detectives
- SOC personnel
- information security practitioners and managers
- Network defenders and engineers
- Information technology professionals
Exam Certification Objectives & Outcome Statements
- Common Network Protocols
The candidate will demonstrate and understanding of the behavior, security risks and controls of common network protocols.
- Encryption and Encoding
The candidate will demonstrate an understanding of techniques and practices used to encode and encrypt common network traffic and common attacks on these controls.
- NetFlow Analysis and Attack Visualization
The candidate be familiar with the use of NetFlow data and information sources to identify network attacks.
- Network Analysis Tool and Usage
The candidate will be familiar with open source packet analysis tools and their purpose to effectively filter and rebuild data streams for analysis.
- Network Architecture
The candidate will be be familiar with the process to design and deploy a network employing diverse transmission and collection technologies.
- Network Protocol Reverse Engineering
The candidate will be familiar with the tools and techniques required to analyze diverse protocols and data traversing a network environment.
- Open Source Network Security Proxies
The candidate will demonstrate an understanding of the architecture, deployment, benefits and weaknesses of network security proxies, common log formats and flow of data in a network environment.
- Security Event and Incident Logging
The candidate be familiar with diverse log formats, protocols and the security impact of the event generating processes. They will demonstrate an understanding of the configuration and deployment strategies to secure and position logging aggregators and collection devices throughout a network environment.
- Wireless Network Analysis
The candidate will be familiar with the process to identify and control the risks associated with wireless technologies, protocols and infrastructure.
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date