Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   GIAC Certification   /   GMON Certification

GIAC Continuous Monitoring Certification (GMON)

Practitioner Certification

The GIAC Continuous Monitoring (GMON) certification validates a practitioner's ability to deter intrusions and quickly detect anomalous activity. GMON certification holders have demonstrated knowledge of defensible security architecture, network security monitoring, continuous diagnostics and mitigation, and continuous security monitoring.






Areas Covered


Who is GMON for?


Exam Format

Note:GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018.

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE.

Course Details

1. GIAC Continuous Monitoring Certification

  • Account & Privilege Monitoring & Authentication
    • The candidate will demonstrate the ability to control the privilege levels of accounts & applications
  • Attack Techniques
    • The candidate will learn to distinguish between traditional and modern attack techniques
  • Configuration Monitoring
    • The candidate will demonstrate an understanding of the tool and techniques used for configuration change monitoring
  • Cyber Defense Principles
    • The candidate will demonstrate an understanding of traditional and modern cyber defense principles
  • Device Monitoring
    • The candidate will demonstrate an understanding of the tool and techniques used for endpoint monitoring
  • Discovery and Vulnerability Scanning
    • The candidate will demonstrate an understanding of the tools and techniques used for network and endpoint discovery and vulnerability scanning
  • Exploit Methodology and Analysis
    • The candidate will be able to utilize network traffic analysis methods and principles of exploit detection to be able to rapidly discover intrusions on the network
  • HIDS/HIPS/Endpoint Firewalls
    • The candidate will demonstrate an understanding of how host intrusion detection/prevention systems & endpoint firewalls work, what their capabilities are and the roles they play in continuous monitoring
  • Network Data Encryption
    • The candidate will be able to apply principles of exploit detection to be able to rapidly detect encrypted intrusions on the network
  • Network Security Monitoring Tools
    • The candidate will demonstrate an understanding of how and why to use an assortment of network monitoring tools to improve the ability to detect intrusions on the network
  • NIDS/NIPS/NGFW
    • The candidate will demonstrate an understanding of how network intrusion detection/prevention systems & next generation firewalls work, what their capabilities are and the roles they play in continuous monitoring
  • Patching & Secure Baseline Configurations
    • The candidate will understand how to use baseline configuration auditing and patching to make endpoints more resilient.
  • Perimeter Protection Devices
    • The candidate will demonstrate the ability to identify points of access into the perimeter and network devices that can be used to protect the perimeter
  • Proxies & SIEM
    • The candidate will demonstrate an understanding of how proxies & security information and event managers work, what their capabilities are and the roles they play in continuous monitoring
  • Security Architecture Overview
    • The candidate will demonstrate an understanding of traditional and modern security architecture frameworks and the role Security Operations centers provide
  • Software Inventories and Application Control
    • The candidate will demonstrate an understanding of the benefits of maintaining software inventories and how to control application allow and deny lists.
  • Threat Informed Defense
    • The candidate will demonstrate an understanding of adversary tactics and techniques and how to use attack frameworks to identify and defend against these threats in local and cloud-based environments.


Fees Structure : 15500 INR / 185 USD
Total No of Class : 32 Video Class
Class Duration : 38:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online