Certification: GMOB

Certification:

GIAC Mobile Device Security Analyst (GMOB)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

See the GIAC website for additional details on the GMOB certification.

Exam Certification Objectives
Objectives Objective Outcome Statement
Analyzing Mobile Applications The candidate will demonstrate the understanding of techniques to evaluate mobile application binaries and permissions in order to detect potentially harmful behavior.
Assessing Mobile Application Security The candidate will demonstrate the ability to assess the security of mobile applications with respect to privacy, data protection, and undesirable application behavior.
Attacking Encrypted Traffic The candidate will demonstrate an understanding of tools and techniques that can exploit SSL/TLS channels and render encryption ineffective during mobile device penetration testing.
Managing Android Devices and Applications The candidate will demonstrate familiarity with Android configuration, security models, and applications, and how they affect security posture.
Managing iOS Devices and Applications The candidate will demonstrate familiarity with iOS configuration, security models, and applications, and how they affect security posture.
Manipulating Mobile Application Behavior The candidate will demonstrate the understanding of security evasion techniques to test the security of mobile applications in order to detect potentially harmful behavior.
Manipulating Network Traffic The candidate will demonstrate an understanding of typical techniques a penetration tester can use to manipulate how a mobile device interacts with networks and services to capture and manipulate network traffic.
Mitigating Against Mobile Malware The candidate will be able to demonstrate how to protect mobile device data, and mitigate against malware targeted to mobile devices.
Mitigating Against Stolen Mobile Devices The candidate will be able to demonstrate how to mitigate against the threat of data loss from stolen mobile devices.
Reverse Engineering Mobile Applications The candidate will demonstrate an understanding of the core concepts associated with reverse-engineering applications on the most commonly used mobile device operating systems.
Unlocking and Rooting Mobile Devices The candidate will demonstrate understanding of the concept and processes behind rooting, jailbreaking, and unlocking mobile devices and the security ramifications.