GIAC Certification
GIAC Certified Information Assurance ConsultantsInformation Assurance (IA) is defined by the U.S. DoD as "development, operation, management, and enforcement of security capabilities for systems and networks." Global Information Assurance Certification (GIAC) was established in 1999 to test and certify the knowledge and experience of computer security experts in various fields of information assurance. GIAC certifications are recognized globally by industry, military and government institutions including the United States National Security Agency (NSA). GIAC certifications require candidates to complete rigorous testing to demonstrate their depth of skills in specific knowledge areas, not just general computer security knowledge. Areas covered by GIAC certifications include audit, intrusion detection, incident handling, firewalls and perimeter protection, forensics, hacker techniques, Windows and Unix operating system security, plus secure software and application coding

Progent's security consultants have earned GIAC certification in key areas of information assurance. Progent offers online information assurance services from GIAC-certified consultants and can provide onsite IA expertise in major metropolitan areas throughout the U.S. By offering affordable rates and the highest level of expertise, Progent can give small and mid-size businesses the same quality of information assurance once available only to the largest enterprises and institutions.

Areas of proven expertise available from Progent's GIAC-certified security consultants include:

Progent's GIAC-certified information assurance experts can also work with Progent's Cisco-certified CCIE network infrastructure consultants to help organizations design, deploy and operate a comprehensive security information and event management (SIEM) solutions.

Auditing Networks, Perimeters, and Systems
Progent's security consultants who have obtained the GIAC Systems and Network Auditor (GSNA) credential understand the best practices, system analysis, and forensics required to perform thorough network security audits that can uncover a wide range of known threats and vulnerabilities. Progent can also help you build appropriate countermeasures and defenses based on realistic risk assessment in order to provide ongoing protection for your information system. Specific network security auditing services offered by Progent's GIAC-certified information assurance consultants include:

  • Conduct detailed router audits
  • Test the Firewall for OS configuration, firewall configuration, and system administration
  • Test firewall policies for vulnerabilities, packet flow from all networks, and change control
  • Assess third-party software encryption, authentication, virus scanning, and URL redirection
  • Review logs and alerts from the Intrusion Detection System (IDS) and Firewall
  • Deploy router analysis tools such as Router Audit Tool (RAT), scanning tools such as Nmap, packet building tools such as -Hping2 and Nemesis, sniffers such as Wire Shark, and IDS auditing tools such as Fragroute
  • Audit wireless security including 802.11b security issues and LEAP/PEAP authentication using wireless auditing tools such as WSA, Airopeek, and Net Stumbler
  • Map your network from inside and outside your Firewall and auditing perimeter defenses
  • Perform penetration tests
  • Audit configuration of key network services such as DNS and SMTP
  • Check database security for Microsoft SQL, MySQL and Oracle
  • Identify security weaknesses for web-enabled services and applications
  • Evaluate web application architectures and infrastructures
  • Look for web-based phishing, resource exhaustion, buffer overflows, hidden form elements, and unexpected user input
  • Audit web application user sign-on and sign-off process, session tracking, and management
  • Audit Windows-based systems focusing on patch levels, network based services, local services, installed software, security configuration, group policy management, plus log aggregation, management and analysis
  • Perform event reconstruction if necessary
  • Sarbanes-Oxley and Graham-Leach-Bliley compliance
Progent offers a selection of value-priced service packages for assessing the vulnerability of your network to attack. For small organizations, Progent offers two security inventory scanning packages, an External Security Inventory Checkup for evaluating the security profile of your web-facing resources and an Internal Security Inventory Scan to determine the risk from attacks from within your firewall. For larger organizations, Progent offers variety of set-price security evaluation service packages to help verify that security policies and systems meet compliance and regulatory requirements.

Incident Handling and Response
Security professionals who have earned the GIAC Certified Incident Handler (GCIH) credential have demonstrated in-depth knowledge of the current threats to systems and networks, along with effective countermeasures. Progent's GIAC-certified security engineers have the knowledge and experience to manage incidents, understand common attack techniques and tools, defend against and respond to attacks when they occur, and detect security gaps in your environment. Additionally, Progent's GIAC-certified information assurance consultants are sensitive to legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence.

Progent's incident handling experts can offer consulting assistance both on how to respond to a security incident and how to understand and foil the techniques used by hackers to penetrate your network.

Responding to a Security Incident
Progent's information assurance consultants can help you plan and implement a precise step-by-step procedure for responding to successful network attacks or to physical incidents such as fires, floods and crime. By putting in place a proven and well-defined methodology for incident handling, your company will be able to get systems and services back online as quickly and securely as possible. The step-by-step incident response model recommended and supported by Progent covers these phases:

  • In the Preparation Phase, you create a set of tools to use as an incident response Jump Kit, identify the core team of responders, and deploy appropriate instrumentation for your site and system
  • In the Identification Phase you report signs of an incident, take the first steps to control it, and establish a chain of custody so that no relevant information or evidence is lost or unreported
  • In the Containment Phase you implement predetermined video and audio documentation strategies, execute containment and quarantine procedures, pull the network cable and switch if required, and identify and isolate the Trust Model
  • In the Eradication Phase you evaluate whether a backup is compromised, totally rebuild the Operating System if required, and if necessary move to a new architecture
  • In the Recovery Phase you determination who makes the decision to return to production, monitor the system, and prepare for increase in attacks
  • For Special Incidents such as espionage, inappropriate use, or sexual harassment, take appropriate actions determined by the type of incident
  • In the Incident Record Keeping Phase you complete legally acceptable pre-built forms to document and report the incident
  • In the Incident Follow-Up Phase you conduct a lessons-learned meeting and define appropriate changes in process for the future
Understanding and Defeating Hacker Techniques
Networks invariably expose substantial amounts of information that can assist potential attackers. In addition to looking for information leakage, attackers also run scans of systems to find security gaps such as weak DMZ systems and firewalls or unsecured wireless LANs. Popular hacking techniques include inverse scanning, blind scans, and bounce scans that obscure their source. Attackers also try to understand and manipulate firewall rule sets and evade Intrusion Detection Systems. Progent's information assurance consultants who hold the GIAC Certified Incident Handler credential can help you understand contemporary hacking techniques in detail so you can take appropriate countermeasures to protect your network. Some of the hacking techniques that Progent can help you understand and defend against include:
  • Network-level Attacks such as session hijacking (from Telnet to SSL and SSH), person-in-the-middle attacks, and passive sniffing
  • Gathering and Parsing Packets via active sniffing through ARP cache poisoning and DNS injection, DNS cache poisoning to redirect traffic on the Internet, using Netcat for backdoors and Nasty Relays, and IP Address spoofing
  • Operating System and Application-Level Attacks utilizing buffer overflows, the MetaSploit Exploitation Framework, the Perl Exploit Library, and format string attacks to exploit vulnerabilities in Windows
  • Netcat-based Attacks for transferring files, creating backdoors, shell shoveling, setting up relays to obscure the source of an attack, and launching replay attacks
  • Password Cracking with L0phtCrack and John the Ripper
  • Web Application Attacks for account harvesting, SQL Injection to manipulate back-end databases, session cloning to grab other Users' web sessions, and cross-site scripting
  • Denial of Service Attacks involving distributed Denial of Service, pulsing zombies and reflected attacks, Local Denial of Service, SYN floods and smurf attacks using spoofed broadcast ping messages
  • Maintaining Unauthorized Access by creating backdoors using QAZ and Tini, using application-level Trojan Horse Backdoor suites such as VNC and SubSeven, using rootkits to substitute binary executables with malware, and using kernel-level rootkits such as Adore and KIS to compromise the operating system
  • Covering the Attacker's Tracks via file and directory camouflage and hiding, log file editing, accounting entry editing of UTMP, WTMP, and Shell Histories, establishing covert channels over HTTP, ICMP, TCP and other protocols, and hiding data in images, music, binaries, or other file types
Intrusion Detection and Traffic Analysis
Progent's information assurance consultants who have been awarded the GIAC Certified Intrusion Analyst (GCIA) credential are familiar with the arsenal of scans, reconnaissance techniques, and network exploits used by the attack community and can help your company with comprehensive intrusion detection and traffic analysis to make sure your network information remains protected. Progent's security professionals have an expert understanding of the workings of TCP/IP, methods of network traffic analysis, and troubleshooting all types of networking complaints from routing problems to firewall and critical server issues. Intrusion detection and traffic analysis techniques and issues familiar to Progent's GIAC-certified security consultants include:
  • In-depth understanding of the TCP/IP Communication Model
  • Fragmentation
  • Core Internet protocols such as Internet Control Message Protocol (ICMP)
  • Stimulus and Response
  • Microsoft Networking and Security
  • Domain Name System (DNS)
  • Routing
  • The IPsec (Internet Protocol Security) suite of Internet security protocols
  • Use of the TCPdump tool to examine Datagram Fields
  • Analysis of TCPdump Output
  • Using the Snort network intrusion detection system
  • Traffic patterns and analysis
  • Interoperability and standards in intrusion detection
  • Passive analysis techniques
  • Identifying crafted packets
  • In-depth protocols analysis
  • Advanced Analysis Profiling Techniques
  • Reducing false-positives
  • Identifying Denial-of-Service activity
  • IDS/IPS architecture and implementation techniques
  • Event correlation and common attack techniques
Web Application Security
The GIAC Web Application Security (GWAS) credential focuses on the latest tools and techniques used in designing and testing web applications that deliver data reliably to authorized users while protecting your information from unauthorized ones. Progent's GWAS-certified consultants have hands-on experience using current tools to detect and prevent cross-site scripting (XSS), and SQL Injection as well as an in-depth understanding of authentication and session management systems and their weaknesses and how they are best defended. Progent can help you ensure that your web applications are securely designed and thoroughly tested before they are released to your production environment or used by your clients. Technical areas where Progent's information assurance consultants can provide expertise for web application development and testing include:
  • Securing web application architectures and infrastructures
  • Cryptography
  • Authentication
  • Access control
  • Session mechanism
  • Web application logging
  • Input issues and validation
  • SQL injection due to incorrect escape character filtering, type handling, etc.
  • Cross-Site Scripting
  • Phishing attacks for unauthorized information gathering such as name and password harvesting
  • HTTP Response Splitting
  • Cross-Site Request Forgery
  • Resource exhaustion
  • Buffer overflows
  • Hidden form elements
  • Unexpected user input
  • User sign-on and sign-off process
  • Session tracking and management
  • GET vs. POST
  • Improper Server Logic
  • Web Browser Security
  • Server-side Techniques for Protecting Sensitive Data
Reverse Engineering Malware
Progent's information assurance consultants who have earned the GIAC Reverse Engineering Malware (GREM) credential have the skill to guard organizations against malicious software by reverse engineering malware code that attacks widely deployed platforms such as Microsoft operating systems and browsers. By performing in-depth analysis of the mechanisms used by malicious code to carry out attacks, GREM-certified consultants can help organizations to defend against future threats. Services available from Progent's GREM-certified information assurance experts include:
  • Analyze malicious document files
  • Analyze the techniques used by malware attacks to prevent malicious software from being scrutinized
  • Analyze web-based malware
  • Examine static Windows malware code in x86 assembly language
  • Analyze complex malicious scripts in web browsers
  • In-depth analysis malware executables
  • Utilize memory forensics techniques to analyze threats
  • Deploy debuggers, disassemblers, sniffers, and other tools to analyze malware behavior
  • Reverse engineer Windows malware code at the x86 assembly level
Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions combine SIM (Security Information Management) and SEM (Security Event Management) functions to enable comprehensive analysis of security alerts generated by network appliances and applications. Appliances can include firewalls, routers, intrusion detection systems (IDS), intrusion prevention systems (IPS) and other security hardware. The massive amounts of information created by these devices can be managed by SIEM software products, available from vendors like SolarWinds, ManageEngine, and many others. SIEM software collects logs from multiple devices, normalizes the log messages into a common data format, correlates logs and events from various systems and applications, aggregates the data to remove duplicate event records, and produces reports that allow organizations to comply with regulatory requirements for monitoring and reporting security incidents.

Progent's certified security experts and Cisco CCIE network infrastructure consultants can help you plan, deploy, tune, manage and troubleshoot your SIEM ecosystem so you can meet the security and compliance standards that apply to your business or institution.

Additional Industry Certifications Earned by Progent's Security Engineers
In addition to providing the assistance of security experts with GIAC Global Information Assurance Certification credentials, Progent also offers the expertise of CISM-certified security management consultants, CISSP-certified cybersecurity experts, CISSP-ISSAP-certified security architecture professionals, CISA-certified information system security auditing specialists, and CRISC-certified risk management consultants.

Contact Progent for Access to a GIAC-certified Information Assurance Consultant
For more information about Progent's computer security support services, phone Progent at 800-993-9400 or go to Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide organizations to carry out the crucial first phase in mitigating a ransomware attack by stopping the bleeding. Progent's online ransomware engineer can help you to locate and isolate infected servers and endpoints and protect clean resources from being penetrated. If your network has been penetrated by any version of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24 Hour San Jose At Home Workforce Endpoint Management Tools Assistance San Jose - Sana Clara San Jose CA 24/7 Work from Home Employees Guidance - San Jose - Management Tools Consulting and Support Services
  • 24x7 At Home Workforce Reno Consultants - Integration Consulting Reno Remote Workers Infrastructure Assistance Reno Sparks
  • Anaheim Orange Garden Grove Exchange On-Call Services Exchange Server 2019 Support Firms Orange County, United States

  • Microsoft Teams disaster recovery Consultants
    Professional Microsoft Teams Web Apps Server

    Progent can assist your organization to plan an upgrade to Teams from Skype for Business Online and install, administer, and troubleshoot a cloud-based or hybrid deployment of Teams. Progent can help you to integrate Teams with Microsoft Office and Microsoft 365 apps, Exchange Online, SharePoint, and your PBX.

  • Top GIAC Technology Consulting
  • Award Winning Private Cloud Integration Consult Private Clouds for Small Businesses Professionals

  • Consultancy Maze ransomware hot line
    ransomware removal and data recovery Specialist

    Progent's Ransomware Hot Line provides 24x7 access to a experienced ransomware recovery expert who can assist you to halt the progress of an ongoing ransomware breach. Call 800-462-8800

  • BlackBerry BPS Consultant Specialists Blackberry

  • Remote Workforce Security Technical Consultant
    Online Support Remote Employees Cybersecurity

    Progent can assist small and medium-size businesses to install endpoint device security defense solutions and deliver cleanup services for at-home workers.

  • BlackBerry Computer Network Service Company Cambridge BlackBerry Synchronization Professional Services
  • BlackBerry Email Network Support Group Columbus Ohio, United States BlackBerry BES Server Server Consultant Port Columbus International Airport CMH
  • Broomfield-Louisville At Home Workforce Consulting and Support Services near me in Broomfield - Cloud Integration Systems Expertise Remote Workers Guidance - Broomfield - Cloud Integration Technology Guidance Broomfield-Westminster, CO
  • Broomfield-Louisville, CO, United States Broomfield Critical Crypto-Ransomware Recovery Experts Broomfield Crypto-Ransomware Cleanup Broomfield-Louisville
  • Buffalo New York Buffalo Avaddon Ransomware Restoration Buffalo Spora Crypto-Ransomware Mitigation Buffalo
  • GIAC Information Assurance Technology Consulting Services
  • Cambridge Teleworkers Collaboration Systems Consulting and Support Services Cambridge, England Teleworkers Cambridge Expertise - Collaboration Technology Consultants Cambridge
  • Computer Specialists Windows Server 2016 Campinas, Piracicaba Small Business Network Consulting Company Windows 2008 Server
  • Computer Tech Exchange Server 2013 Barueri, SP Exchange 2010 Server Computer Firms State of São Paulo
  • Configuration Microsoft Video Conferencing Professionals MS Office Communications Server 2007
  • Consultant Services Azure Planning Azure and SQL Server integration Consultant Services
  • Corpus Christi At Home Workers Endpoint Management Systems Consulting and Support Services Nueces County Texas Work from Home Employees Consulting in Corpus Christi - Management Systems Guidance Nueces County Texas, USA
  • Exchange 2003 Server Upgrade IT Consultants Microsoft Exchange Technology Consulting Services
  • Expertise for Nashville Computer Support Companies Davidson County Tennessee Consulting Experts for Network Support Firms near me in Nashville - Transparent Short-Term Support Staff Help Nashville, TN
  • Garland Centerville Work at Home Employees Consulting - Glendale - Support Consulting and Support Services Glendale Remote Workers Set up Consulting Services Garland, TX
  • IT Outsourcing Networking Consultancy Sunnyvale Palo Alto Cisco CCIE Design Consultant Sunnyvale
  • Indianapolis At Home Workforce Collaboration Solutions Guidance Indianapolis, IN Remote Workers Indianapolis Consulting Experts - Collaboration Solutions Assistance Indianapolis, Marion County

  • Lync Server 2013 Instant Messaging Professional
    Lync Server 2013 disaster recovery Engineer

    Microsoft Lync Server 2013, rebranded Skype for Business, allows organizations of any size to build a centrally managed and protected communications ecosystem that permits the modern BYOD computing model with instant messaging (IM), real-time presence, audio/video and web meetings with app sharing and whiteboard, and both IP-based and PSTN telephony enabled for a broad range of stationary PCs and mobile endpoints. Progent's certified Lync 2013 consultants and network integrators can assist you to evaluate the business benefits of Lync Server 2013, design an in-house, cloud-resident (with Lync Online) or hybrid topology appropriate for your current and future goals, implement Lync 2013 so as to speed up your return on investment, and provide custom webinar and on-premises training to your management team and users. Progent has in-depth expertise in critical pieces of a Lync Server 2013 solution including Microsoft Windows Server, SQL Server and Exchange, and Progent can assist you to combine Lync 2013 with popular Microsoft Office and Microsoft 365 apps including Outlook and PowerPoint.

  • Jacksonville Work from Home Employees IP Voice Technology Consulting Jacksonville Florida Remote Workers Jacksonville Consulting Services - VoIP Technology Consultants Jacksonville Arlington
  • Liverpool Netwalker Crypto-Ransomware Restoration Liverpool, United Kingdom Liverpool Locky Ransomware Mitigation Chester, England
  • Minas Gerais Urgent Belo Horizonte MongoLock Ransomware Removal Top Belo Horizonte Locky Crypto-Ransomware Cleanup Belo Horizonte, State of Minas Gerais

  • Consult Windows Server 2008 BranchCache
    Computer Consultant Windows Server 2008 Security

    Microsoft Windows Server 2008 R2 offers outstanding levels of speed, protection, fault tolerance, expandability, and flexibility that accelerate output of local, branch office, and mobile users. Progent's network experts can provide cost-effective online consulting, technical support, and education services to help your company to plan, implement, and maintain Microsoft Windows Server 2008 R2 in order to add substantial business value to your information system.

  • Omaha At Home Workforce Collaboration Solutions Consulting Work from Home Employees Consulting and Support Services near me in Omaha - Collaboration Solutions Consulting and Support Services Omaha, NE
  • Providence County Rhode Island Microsoft Exchange Information Technology Installation Service Integration Company Exchange 2010 Server Providence, RI
  • SQL Computer System Consultant New York- Manhattan, The Bronx, Brooklyn, Queens, Staten Island Computer Outsourcing Consultant SQL New York

  • PIX Online Technical Support
    24x7 Help and Support PIX

    Cisco's PIX Series firewalls have been discontinued and Cisco might not support these legacy devices. Progent continues to offer technical support for Cisco's PIX Series firewalls to help you with maintenance and management and Progent can also help you assess if you should adopt more current firewall products available from Cisco. Progent's Cisco technology experts can help you plan and implement a smooth migration to Cisco ASA 5500-X Series firewalls based on industry best practices.

  • SQL Server 2016 Data Mining Online Help SQL Server 2016 SSRS Computer Consultant
  • SQL Server Computer Specialist Hamilton County Ohio SQL Server 2019 Tech Support Outsource Cincinnati
  • SQL Server Small Business Computer Consulting Company Reston-Sterling Microsoft SQL 2014 Network Management Reston Virginia
  • Scottsdale Teleworkers Cybersecurity Solutions Guidance Scottsdale Arizona Scottsdale Work at Home Employees Consultants near me in Scottsdale - Cybersecurity Systems Consultants

  • Online Troubleshooting SQL Server 2017 Python
    SQL Server 2017 on Linux Network Consultant

    Progent's certified SQL Server 2017 consultants can help your organization to design and carry out an efficient migration from your current SQL Server databases and applications to SQL Server 2017.

  • Stockton Work from Home Employees Call Desk Solutions Consulting Services Stockton California Manteca, CA Offsite Workforce Stockton Guidance - Call Desk Augmentation Consulting and Support Services
  • Support Outsourcing Debian Linux, Sun Solaris, UNIX Tatuapé, Guarulhos Mandrake Linux, Solaris, UNIX IT Services Tatuapé, Guarulhos
  • Top Porto Alegre-Novo Hamburgo Information Technology Outsourcing Company Microsoft and Cisco Authorized Expert Porto Alegre Network Administration

  • Risk Mitigation Professionals
    CRISC Certified Cybersecurity Network Consultant

    Progent's disaster recovery support and business continuity professionals can show you how to design a disaster recovery strategy to prepare for an IT network catastrophe. Progent can help you create a complete disaster recovery strategy that includes scheduled disaster recovery assessments and drills. Progent's Microsoft and Cisco-authorized professionals can also show you how to build an affordable, high-availability network architecture that takes into account reliability issues covering a broad array of network technologies and processes.

  • Top Quality Exchange Server 2013 Small Business Computer Consultants 24/7 Exchange 2010 Server Computer Network Companies Richmond, VA
  • Top Quality Wilmington, DE, Dover, DE, Newark, DE Information Technology Installation Service CISA Certified Security Expert Upgrading Delaware
  • Security Audit Services Network Intrusion Detection
  • Top Ranked Microsoft Napa Outsourcing Technology Urgent Systems Support Napa, California
  • Top Rated Assessment BlackBerry BES Server Gary, Indiana BlackBerry Exchange Network Support Consulting Chicago, IL
  • Security Incident Response Consultant Services
  • Top Sherman Oaks Consulting Expertise for IT Support Firms Sherman Oaks-Woodland Hills Sherman Oaks Consulting Services for IT Support Providers Sherman Oaks-Van Nuys, CA
  • UNIX Professionals Solaris Professional
  • Windows Applications on macOS Troubleshooting Support and Help Windows PC Simulation on Mac

  • Locky ransomware protection and recovery Consult
    Specialist ProSight Remote Ransomware Monitoring

    ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology from SentinelOne to guard endpoints and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to address the complete malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks.

  • Work at Home Employees Consulting and Support Services - Napa - Help Desk Call Center Solutions Consulting Napa, CA Napa Valley Napa Telecommuters Help Desk Solutions Assistance

  • © 2002-2025 Progent Corporation. All rights reserved.