top of page

Related Courses

GIAC Security Essentials (GSEC) Exam Video Training Course & PDF Guide Download

 

You can Instant Download a PDF file 

After successful payment , 

This PDF File Contains Course Download links

You can Download This Course immediately from click that Links.

 

GIAC Security Essentials (GSEC) Exam Video Training Course & PDF Guide Download

 

Duration : 11 Hours

 

Size: 19.8 GB (5 PART DOWNLOAD)

 

 

 

PART-01

 

 01 GIAC_Security_Essentials_GSEC_-_Introduction

02 Module_introduction

03 Learning_objectives

04 1.1_Network_Protocols_and_Reference_Models

05 1.2_IPv4_vs._IPv6_and_ICMP_vs._ICMPv6

06 1.3_Layer_4_Protocols

07 1.4_Setting_up_a_Lab_Environment

08 1.5_Using_tcpdump_and_Wireshark

09 Learning_objectives

10 2.1_CIA_Triad_and_Parkerian_Hexad

11 2.2_Categories_and_Types_of_Controls

12 2.3_Understanding_the_Enterprise_Architecture

13 2.4_Introduction_to_Threat_Enumeration

14 Learning_objectives

15 3.1_Access_Control_Concepts

16 3.2_Password_Management

17 3.3_Introduction_to_Password_Cracking

18 Learning_objectives

19 4.1_Network_Topologies_and_Zones

20 4.2_Overview_of_Network_Devices_and_Hardening

21 4.3_Survey_of_Security_Devices_and_Wireshark

22 4.4_Configuring_Firewalls_at_Amazon_Web_Services

 

PART-02

 

23 4.5_Exploring_a_Palo_Alto_Networks_Next-Generation_Firewall

24 4.6_Examining_a_Classic_IPS_Sensor_Device

25 Learning_objectives

26 5.1_Introducing_the_Center_for_Internet_Security_CIS

27 5.2_Overview_of_CIS_Controls

28 5.3_Samples_and_Case_Studies

29 Learning_objectives

30 6.1_The_Evolution_of_IEEE_802.11_Security

31 6.2_WPA3_Security

32 6.3_PAN_NFC_and_5G_Concepts

33 6.4_The_Internet_of_Things_IoT

34 Module_introduction

35 Learning_objectives

36 7.1_Common_Attack_Types

37 7.2_CryptoMalware

38 7.3_Defensive_Strategies

39 Learning_objectives

40 8.1_Defense_in_Depth_Overview_and_Strategies

41 8.2_Core_Security_Strategies

42 8.3_Defensible_Network_Architectures

43 Learning_objectives

44 9.1_Overview_of_Active_Defense

45 9.2_Active_Defense_Techniques

46 9.3_Active_Defense_Tools

47 Learning_objectives

48 10.1_Overview_of_Endpoint_Security

49 10.2_Host-based_Intrusion_Detection

50 10.3_Host-based_Intrusion_Prevention

51 10.4_Next-generation_Endpoint_Security_Solutions

52 Module_introduction

53 Learning_objectives

54 11.1_Overview_of_Logging

 

 

PART-03

 

55 11.2_Logging_System_Setup_and_Configuration

56 11.3_Logging_Analysis_Fundamentals

57 11.4_Core_SIEM_Activities

58 Learning_objectives

59 12.1_Overview_of_Vulnerability_Management

60 12.2_Network_Scanning

61 12.3_Using_Xenmap_and_Yersinia

62 12.4_Penetration_Testing

63 Learning_objectives

64 13.1_Overview_of_Virtualization_and_VM_Security

65 13.2_Cloud_Models_and_Value_Proposition

66 13.3_Common_Attacks_Against_Cloud_Services

67 13.4_Introduction_to_Microsoft_Azure_IAM

68 Module_introduction

69 Learning_objectives

70 14.1_Overview_of_Cryptology_and_Cryptosystems

71 14.2_Cryptographic_Hashing

72 14.3_Symmetric_Key_Cryptography

73 14.4_Asymmetric_Key_Cryptography

74 Learning_objectives

75 15.1_Digital_Signatures

76 15.2_IPsec

77 15.3_SSL_TLS

78 15.4_Public_Key_Infrastructure

79 Learning_objectives

80 16.1_The_Importance_of_Written_Security_Policies

 

 

PART-04

 

81 16.2_Standards_Guidelines_and_Procedures

82 16.3_Acceptable_Use_Policies

83 16.4_Survey_of_Sample_Policies

84 Learning_objectives

85 17.1_Overview_of_Risk_Management

86 17.2_Risk_Management_Best_Practices

87 17.3_Threat_Assessment_Analysis_and_Reporting

88 Learning_objectives

89 18.1_Fundamentals_of_Incident_Handling

90 18.2_Six_Step_Incident_Response_Process

91 18.3_Conducting_a_Forensic_Investigation

92 Learning_objectives

93 19.1_Business_Continuity_Planning_BCP

94 19.2_Business_Impact_Analysis_BIA

95 19.3_Backups_and_Restoration

96 19.4_Disaster_Recovery_Planning_DRP

97 Module_introduction

98 Learning_objectives

99 20.1_Operating_Systems_and_Services

File:00100 20.2_Windows_Workgroups_vs._Domains

File:00101 20.3_Windows-as-a-Service

File:00102 Learning_objectives

File:00103 21.1_NTFS_and_Shared_Folder_Permissions

File:00104 21.2_Registry_Keys_and_REGEDIT.EXE

File:00105 21.3_Windows_Privileges

File:00106 21.4_Overview_of_BitLocker_Drive_Encryption

File:00107 Learning_objectives

File:00108 22.1_Security_Templates_and_SCA_Snap-in

File:00109 22.2_Understanding_Group_Policy_Objects

File:00110 22.3_Administrative_Users_AppLocker_and_User_Account_Control

File:00111 Learning_objectives

File:00112 23.1_Azure_and_High_Availability

 

 

PART-05

 

00114 23.3_Microsoft_Azure_Active_Directory_MAAD

File:00115 Learning_objectives

File:00116 24.1_Windows_PowerShell

File:00117 24.2_Administrative_Tools_and_Utilities

File:00118 24.3_Windows_Auditing_and_Forensics

File:00119 Module_introduction

File:00120 Learning_objectives

File:00121 25.1_Comparing_Linux_Operating_Systems

File:00122 25.2_Mobile_Device_Security

File:00123 25.3_Linux_Shells_and_Kernels

File:00124 25.4_Linux_Permissions

File:00125 25.5_Linux_User_Accounts

File:00126 Learning_objectives

File:00127 26.1_Starting_Services_at_Boot_Time

File:00128 26.2_Configuration_Management_Tools

File:00129 26.3_Linux_Kernel_Security

File:00130 26.4_Linux_System_Enhancers

File:00131 Learning_objectives

File:00132 27.1_Configuring_and_Monitoring_Logs

File:00133 27.2_Leveraging_the_Auditd_tool

File:00134 27.3_Linux_Security_Utilities

File:00135 GIAC_Security_Essentials_GSEC_-_Summary

 

 

GSEC GIAC Security Essentials Certification Exam Guide.pdf

GIAC Security Essentials (GSEC) Exam Video Training Course & PDF Guide Download

SKU: EXT2021-0104
$20.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page