You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.
GIAC Security Essentials (GSEC) Exam Video Training Course & PDF Guide Download
Duration : 11 Hours
Size: 19.8 GB (5 PART DOWNLOAD)
PART-01
01 GIAC_Security_Essentials_GSEC_-_Introduction
02 Module_introduction
03 Learning_objectives
04 1.1_Network_Protocols_and_Reference_Models
05 1.2_IPv4_vs._IPv6_and_ICMP_vs._ICMPv6
06 1.3_Layer_4_Protocols
07 1.4_Setting_up_a_Lab_Environment
08 1.5_Using_tcpdump_and_Wireshark
09 Learning_objectives
10 2.1_CIA_Triad_and_Parkerian_Hexad
11 2.2_Categories_and_Types_of_Controls
12 2.3_Understanding_the_Enterprise_Architecture
13 2.4_Introduction_to_Threat_Enumeration
14 Learning_objectives
15 3.1_Access_Control_Concepts
16 3.2_Password_Management
17 3.3_Introduction_to_Password_Cracking
18 Learning_objectives
19 4.1_Network_Topologies_and_Zones
20 4.2_Overview_of_Network_Devices_and_Hardening
21 4.3_Survey_of_Security_Devices_and_Wireshark
22 4.4_Configuring_Firewalls_at_Amazon_Web_Services
PART-02
23 4.5_Exploring_a_Palo_Alto_Networks_Next-Generation_Firewall
24 4.6_Examining_a_Classic_IPS_Sensor_Device
25 Learning_objectives
26 5.1_Introducing_the_Center_for_Internet_Security_CIS
27 5.2_Overview_of_CIS_Controls
28 5.3_Samples_and_Case_Studies
29 Learning_objectives
30 6.1_The_Evolution_of_IEEE_802.11_Security
31 6.2_WPA3_Security
32 6.3_PAN_NFC_and_5G_Concepts
33 6.4_The_Internet_of_Things_IoT
34 Module_introduction
35 Learning_objectives
36 7.1_Common_Attack_Types
37 7.2_CryptoMalware
38 7.3_Defensive_Strategies
39 Learning_objectives
40 8.1_Defense_in_Depth_Overview_and_Strategies
41 8.2_Core_Security_Strategies
42 8.3_Defensible_Network_Architectures
43 Learning_objectives
44 9.1_Overview_of_Active_Defense
45 9.2_Active_Defense_Techniques
46 9.3_Active_Defense_Tools
47 Learning_objectives
48 10.1_Overview_of_Endpoint_Security
49 10.2_Host-based_Intrusion_Detection
50 10.3_Host-based_Intrusion_Prevention
51 10.4_Next-generation_Endpoint_Security_Solutions
52 Module_introduction
53 Learning_objectives
54 11.1_Overview_of_Logging
PART-03
55 11.2_Logging_System_Setup_and_Configuration
56 11.3_Logging_Analysis_Fundamentals
57 11.4_Core_SIEM_Activities
58 Learning_objectives
59 12.1_Overview_of_Vulnerability_Management
60 12.2_Network_Scanning
61 12.3_Using_Xenmap_and_Yersinia
62 12.4_Penetration_Testing
63 Learning_objectives
64 13.1_Overview_of_Virtualization_and_VM_Security
65 13.2_Cloud_Models_and_Value_Proposition
66 13.3_Common_Attacks_Against_Cloud_Services
67 13.4_Introduction_to_Microsoft_Azure_IAM
68 Module_introduction
69 Learning_objectives
70 14.1_Overview_of_Cryptology_and_Cryptosystems
71 14.2_Cryptographic_Hashing
72 14.3_Symmetric_Key_Cryptography
73 14.4_Asymmetric_Key_Cryptography
74 Learning_objectives
75 15.1_Digital_Signatures
76 15.2_IPsec
77 15.3_SSL_TLS
78 15.4_Public_Key_Infrastructure
79 Learning_objectives
80 16.1_The_Importance_of_Written_Security_Policies
PART-04
81 16.2_Standards_Guidelines_and_Procedures
82 16.3_Acceptable_Use_Policies
83 16.4_Survey_of_Sample_Policies
84 Learning_objectives
85 17.1_Overview_of_Risk_Management
86 17.2_Risk_Management_Best_Practices
87 17.3_Threat_Assessment_Analysis_and_Reporting
88 Learning_objectives
89 18.1_Fundamentals_of_Incident_Handling
90 18.2_Six_Step_Incident_Response_Process
91 18.3_Conducting_a_Forensic_Investigation
92 Learning_objectives
93 19.1_Business_Continuity_Planning_BCP
94 19.2_Business_Impact_Analysis_BIA
95 19.3_Backups_and_Restoration
96 19.4_Disaster_Recovery_Planning_DRP
97 Module_introduction
98 Learning_objectives
99 20.1_Operating_Systems_and_Services
File:00100 20.2_Windows_Workgroups_vs._Domains
File:00101 20.3_Windows-as-a-Service
File:00102 Learning_objectives
File:00103 21.1_NTFS_and_Shared_Folder_Permissions
File:00104 21.2_Registry_Keys_and_REGEDIT.EXE
File:00105 21.3_Windows_Privileges
File:00106 21.4_Overview_of_BitLocker_Drive_Encryption
File:00107 Learning_objectives
File:00108 22.1_Security_Templates_and_SCA_Snap-in
File:00109 22.2_Understanding_Group_Policy_Objects
File:00110 22.3_Administrative_Users_AppLocker_and_User_Account_Control
File:00111 Learning_objectives
File:00112 23.1_Azure_and_High_Availability
PART-05
00114 23.3_Microsoft_Azure_Active_Directory_MAAD
File:00115 Learning_objectives
File:00116 24.1_Windows_PowerShell
File:00117 24.2_Administrative_Tools_and_Utilities
File:00118 24.3_Windows_Auditing_and_Forensics
File:00119 Module_introduction
File:00120 Learning_objectives
File:00121 25.1_Comparing_Linux_Operating_Systems
File:00122 25.2_Mobile_Device_Security
File:00123 25.3_Linux_Shells_and_Kernels
File:00124 25.4_Linux_Permissions
File:00125 25.5_Linux_User_Accounts
File:00126 Learning_objectives
File:00127 26.1_Starting_Services_at_Boot_Time
File:00128 26.2_Configuration_Management_Tools
File:00129 26.3_Linux_Kernel_Security
File:00130 26.4_Linux_System_Enhancers
File:00131 Learning_objectives
File:00132 27.1_Configuring_and_Monitoring_Logs
File:00133 27.2_Leveraging_the_Auditd_tool
File:00134 27.3_Linux_Security_Utilities
File:00135 GIAC_Security_Essentials_GSEC_-_Summary
GSEC GIAC Security Essentials Certification Exam Guide.pdf
GIAC Security Essentials (GSEC) Exam Video Training Course & PDF Guide Download
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.