Third-party products and services, including course instructors have helped many candidates to close knowledge and skill gaps. Lunarline does not endorse any particular provider and encourages candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and the exam’s concentration area.
Certification Description
Successful completion of this exam will demonstrate a candidates ability to detect different types of web service (protocols such as: HTTP, HTTPS, ICP, HTCP, WCCP, SOCKS, PHP, CGI, ODBC, HTML, and XML) attacks and recognize the toolkits, malicious code, and techniques used by a specific intruder. The candidate’s understanding of the associated risks, effects, severity, and the prevention, mitigation, and recovery methods for different attacks will also be demonstrated.
Requirements
Candidates must possess at least 3 years relevant experience in programming, configuring, and/or securing web servers and services in order to obtain the expert level credential. The associate level credential will be awarded to those who pass the exam, but do not have the required experience. The credential can be elevated to expert level upon attaining the required experience. Simply email [email protected] to start the experience verification process.
Mapping to the NICE Framework
NICE Work Role Name:
Exploitation Analyst
NICE Framework Category
CCE® Concentration Area:
Analyze (AN)
NICE Specialty Area:
Exploitation Analysis (EXP)
NICE Work Role ID:
AN-EXP-001
OPM Code | DCWF Code:
121
NICE Work Role Description:
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Lunarline Training Courses:
Continuing Education: The Lunarline SCS Training Program and other third-party vendors offer activities, products and services across the country that qualify as Professional Development Credits (PDCs) that target the same NICE category, specialty area, work role, and/or authoritative sources as our certifications. We encourage candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and reflect their learning styles and needs.
- Cybersecurity Tools and Analysis (PR210)
- Ethical Hacking and Penetration Testing (PR133)
- Exploitation Analyst (AN102-RBT)
- PhP Hacker (PR150)