Library

Course: GSEC Certification - Security Essentials

GSEC Certification - Security Essentials

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

Basic knowledge
  • 1 proctored exam
  • 180 questions
  • Time limit of 5 hours
  • Minimum Passing Score of 73%
What you will learn
  • Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts
Curriculum
Number of Lectures: 80
Total Duration: 11:51:11
Introduction
  • Introduction  
  • Your Instructor  
  • GSEC Exam  
  • Course Outline  
Build GSEC Lab
  • Lab Requirement  
  • Download the requirement  
  • Setup the Lab Part 1  
  • Setup the Lab Part 2  
  • Setup the Lab Part 3  
  • Setup the Lab Part 4  
Networking Concepts
  • Networking Concepts - Introduction  
  • Network Basics  
  • Internet Protocol – IP  
  • OSI Model Part 1  
  • OSI Model Part 2  
  • TCPIP Model  
  • Default Gateway  
  • Demonstration  
  • Network Architecture Components  
  • Types of Network  
  • TCP Commands  
  • Resources 2  
Defense in Depth
  • Defense in Depth  
  • Important Definitions Part 1  
  • Important Definitions Part 2  
  • Compliance  
  • Due Care and Due Diligence  
  • Security Documents  
  • The Relationship Between Security Document Types  
  • Security Document Types  
  • Policy Sample  
  • Access Control  
  • Authorization  
  • Authentication  
  • Single Sign on SSO  
  • Access Control Attack  
  • Password Hacking Techniques  
  • Default Password  
  • Important tool 2  
  • Cain in Action  
  • Xhydra  
  • Ncrack  
  • Web Application Vulnerability  
  • DVWA  
  • Hackthissite  
  • What is SQL Injection  
  • SQL Injection attack 1  
  • XSS Introduction  
  • Reflected XSS  
  • Stored XSS  
  • Major Web Application vulnerabilities  
Internet Security Technologies
  • Internet Security Technologies - Introduction  
  • Introduction to Maleware  
  • Types of Malware  
  • Create a virus  
  • Creating a Virus using a Tool  
  • Can I Bypass the AV  
  • Introduction to Denail of Service  
  • Denial of Service Attack Demonstration 1  
  • Denial of Service Attack Demonstration 2  
  • Denial of Service Attack Demonstration 3  
  • What is Buffer Overflow  
  • How to search for Buffer Overflow  
  • Buffer Overflow Part 1  
  • Buffer Overflow Part 2  
  • Buffer Overflow Part 3  
  • IDS, Firewalls, Honeypots  
  • Honeypots  
  • Firewalls  
  • Intrusion Detection System - IDS  
  • What is Social Engineering  
  • Fake Email - Spoofing  
  • Social Engineering Toolkit  
  • Advanced Social Engineering Technique  
  • Network Scanning Overview  
  • Important Scanning Definition  
  • Network Scanning Mythology  
  • Identifying Live system  
  • Port Scanning  
  • Advanced Scanning Techniques  
Reviews (0)