Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   GIAC Certification   /   GX-FA Certification

GIAC Experienced Forensics Analyst (GX-FA)

Practitioner Certification

The GIAC Experienced Forensics Analyst (GX-FA) Certification further demonstrates that a candidate is qualified for hands-on digital forensic and threat hunting roles. Certification holders will validate their ability to process, analyze and interpret enterprise host-based forensics artifacts as well as mastery of threat and malicious activity detection.






Areas Covered


Who is GX-FA for?


Exam Format

Note:GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GISF exam has been determined to be 72% for all candidates receiving access to their certification attempts on or after June 12th, 2018.

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE.

Course Details

1. GIAC Experienced Forensic Analyst

  • Analyzing Artifacts of Lateral Movement
    • The candidate will be able to recognize and analyze events created by malicious lateral movement.
  • Examining Evidence of Execution
    • The candidate will be able to recognize and analyze evidence of programs, scripts and other files being launched from the review of Windows host artifacts.
  • Examining Volatile Evidence
    • The candidate will be able to analyze memory resident artifacts to identify both normal and malicious events.
  • Examining Windows Event Log Data
    • The candidate will be able to use Windows event log data to provide analysis and identification of both normal and malicious events.
  • Examining Windows File System Artifacts
    • The candidate will be able to review Windows host artifacts to provide analysis of both normal and malicious activity.
  • Identifying Evasion Techniques
    • The candidate will be able to perform the tasks required to identify the use of commands or applications to remove or disguise evidence of malicious activity.
  • Investigating Credential Theft
    • The candidate will demonstrate the ability to recognize and analyse artifacts created during the collection and compromise of host credentials.
  • Investigating Persistence Mechanisms
    • The candidate will be able to recognize and analyze configuration changes, script creation and use and progr am execution designed to allow malicious activity to survive, launch or restart based on the analysis of host based logs, system configurations and volatile data.
  • Temporal Event Analysis
    • The candidate will be able to review Windows host event data to provide analysis of both normal and malicious activity.


Fees Structure : 15500 INR / 185 USD
Total No of Class : 25 Video Class
Class Duration : 34:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online