Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   GIAC Certification   /   GDAT Certification

GIAC Defending Advanced Threats (GDAT)

Practitioner Certification

The GIAC Defending Advanced Threats (GDAT) certification covers both offensive and defensive topics in-depth. GDAT-certified professionals have a thorough understanding of how advanced cyber adversaries operate and how the IT environment can be improved to better prevent, detect, and respond to incidents.






Areas Covered


Who is GDAT for?


Exam Format

Note:GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018.

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE.

Course Details

1. GIAC Defending Advanced Threats

  • Active Directory/Domains
    • The candidate will demonstrate knowledge of the following domain topics as they relate to information security: Authentication basics, kerberos, common attacks against domains, and detecting attacks against domains.
  • Administrative Access
    • The candidate will exhibit a proficiency in topics related to the impacts of privilege escalation, and the importance of concepts related to "least privelege" methodologies.
  • Adversary Emulation
    • The candidate will demonstrate knowledge of the following adversary emulation topics: Basic concepts, common tools used, and Key technical controls to consider.
  • Application Exploitation
    • The candidate will be able to summarize how; combining the software development lifecycle with threat modeling, employing proper patch management strategies, and other exploit mitigation techniques can improve the security of an organization against application exploitation.
  • Data Exfiltration
    • The candidate will be able to compare and contrast common exfil strategies, summarize strategies for detecting C2 chann
  • Reconnaissance, Threat Handling, and Incident Response
    • The candidate will exhibit a proficiency in the following exploitation topics: fundamental reconnaisance, threat hunting strategies, and the incident response process.


Fees Structure : 15500 INR / 185 USD
Total No of Class : 31 Video Class
Class Duration : 38:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online