Certification: GAWN

Certification:

GIAC Assessing and Auditing Wireless Networks (GAWN)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

See the GIAC website for additional details on the GAWN certification.

Exam Certification Objectives
Objectives Objective Outcome Statement
802.11 The candidate will be familiar with the collection of standards, drafts and recommendations collectively known as the 802.11 specification.
802.11 Fuzzing Attacks The candidate will be able to perform basic fuzzing attacks.
Attacking Weak Encryption The candidate will be familiar with weak encryption methods including WEP and how to attack and secure them.
Bluetooth Attacks The candidate will be familiar with the structure, uses and weaknesses of Bluetooth.
Bridging the Air Gap The candidate will be able to use a compromised wireless system to further compromise a wired network.
DECT The candidate will be familiar with DECT including how to attack and secure it.
DoS on Wireless Networks The candidate will be able to perform and defend against common DoS attacks.
EAP and Cipher Suit Selection The candidate demonstrate the ability to select the proper type authentication and encryption method for a given use.
Hotspots The candidate will be familiar with the identification and auditing of hotspots.
LEAP The candidate will be familiar with LEAP including how to attack and secure it.
Other Wireless Attacks The candidate will be familiar attacks against other types of wireless devices.
PEAP The candidate will be familiar with PEAP including how to attack and secure it.
Rogue Networks The candidate will understand how to identify and protect against rogue networks.
Securing and Configuring Wireless Clients The candidate will demonstrate an understanding of techniques used to manage client systems and the related wireless parameters.
Sniffing Wireless The candidate will be capable of capturing wireless traffic.
TKIP The candidate will be familiar with TKIP including how to attack and secure it.
Wireless Basics The candidate will be familiar with common wireless threats as well as current wireless network standards.
WLAN Auditing Methodologies The candidate will be familiar with the basics of auditing wireless networks.
WLAN Intrusion Detection Technology The candidate will be familiar with the use of IDS systems as related to wireless networks.
WPA2 The candidate will be familiar with WPA2 including how to attack and secure it.
Zigbee The candidate will be familiar with Zigbee including how to attack and secure it.