-
Duration – 20 hours

Areas Covered
- Active defense, defense in depth, access control & password management
- Cryptography: basic concepts, algorithms and deployment, and application
- Defensible network architecture, networking & protocols, and network security
- Incident handling & response, vulnerability scanning and penetration testing
- Linux security: structure, permissions, & access; hardening & securing; monitoring & attack detection; & security utilities
- Security policy, contingency plans, critical controls and IT risk management
- Web communication security, virtualization and cloud security, and endpoint security
- Windows: access controls, automation, auditing, forensics, security infrastructure, & securing network services
 All Cyber Security Courses BUNDLE
$40
GSEC Certification - Security Essentials
Build GSEC lab
Â
 .Lab Requirement
Â
 .Download the requirement
Â
 .Setup the Lab Part  1
Â
 .Setup the lab Part  2
Â
 .Setup the lab Part  3
Â
 .Setup the lab Part  4
Â
Networking Concepts
Â
 .Introduction
Â
 .Network Basics
Â
 .Internet Protocol – IP
Â
 .OSI Model Part  1
Â
 .OSI Model Part  2
Â
 . TCPIP Model
Â
 .Default Gateway
Â
 .Demonstration
Â
 .Network Architecture Components
Â
 .Types of Network
Â
 .TCP Commands
Â
 .Resources Â
Â
Defense in Depth
Â
 .Defense in Depth
Â
 .Important Definitions Part 1-2
Â
 .Compliance
Â
 .Due Care and Due Diligence
Â
 .Security Documents
Â
 .The Relationship Between Security Document Types
Â
 .Security Document Types
Â
 . Policy Sample
Â
 .The Relationship Between Security Document Types
Â
 .Access Control
Â
 .Authorization
Â
 .Authentication
Â
 . Single Sign on SSO
Â
 .Access Control Attack
Â
 .Password Hacking techniques
Â
 .Default Password
Â
 .Important tool Â
Â
 .Cain in Action
Â
 .Xhydra
Â
 .Ncrack
Â
 . Web application vulnerability
Â
 . DVWA
Â
 .Hackthissite
Â
 What is SQL Injection
Â
 SQL Injection attack Â
Â
 . SQL Injection attack Â
Â
 . XSS Introduction
Â
 . Reflected XSS
Â
 .Stored XSS
Â
 .Major Web Application vulnerabilities
Â
Internet Security Technologies
Â
 .Introduction
Â
 ..Introduction to Maleware
Â
 .Types of Malware
Â
 .Create a virus
Â
 .Creating a Virus using a Tool
Â
 .Can I Bypass the AV
Â
 .Introduction to Denail of Service
Â
 .Denial of Service Attack Demonstration Â
Â
 .Denial of Service Attack Demonstration Â
Â
 .Denial of Service Attack Demonstration Â
Â
 .What is Buffer Overflow
Â
 .How to search for Buffer Overflow
Â
 .Buffer Overflow Part Â
Â
 .Buffer Overflow Part Â
Â
 . Buffer Overflow Part Â
Â
 .IDS, Firewalls, Honeypots
Â
 .Honeypots
Â
 .Firewalls
Â
 ..Intrusion Detection System – IDS
Â
 . What is Social Engineering –
Â
 .Fake Email – Spoofing
Â
 .Social Engineering Toolkit
Â
 .Phising Credential Harvest –
Â
 .Advanced Social engineering technique
Â
 .Network Scanning Overview
Â
 .Important Scanning Defination
Â
 .Network Scanning Methology
Â
 .Identifying Live system
Â
 .Port Scanning
Â
 .Advanced Scanning Techniques
Â
OS Security
Â
 . Introduction
Â
 . Securing Passwords Â
Â
 . Securing Operating Systems Â
Â
 . Firewalls Â
Â
 . Securing Network Switches Â
Â
 . Securing Network Routers Â
Â
 . Securing Wireless Networks Â
Â
 . IDS, IPS, and Honeypots Â
Â
 . Antiviruses Â
Â
 .OS Security
Â
 . Encryption Â
Â
 . Physical Security Â
Â
300+ Courses
After your course completion, we provide course completion certificate as well.
Lifetime Access
All courses are for lifetime access.
Priority Support
All queries are answered 24/7.
What People Are Saying

Abhilash -
A very good match. i am enjoying every bit.

Sonal-
Experience was quite good and it was very useful and well elaborated course.

Karan-
I FEEL AS IF I AM ATTENDING A WORLD CLASS TRAINING AND THE LECTURER HAS BEEN AWESOME!

Gilbert-
I find that the explanation is good and also understandable.

Seyed-
Really helpful, recommended to everyone to grow up your future skills for next level especially in this competitive market.

Mayur-
I really like this course, it was a good match for me :))

Mahesh-
Standard process and hands on covered nicely.

Emily-
Perfect, with complete hands on. Well structured and nicely covered.

Kevin-
Great Content, nice and up to the mark course.

Mayuresh-
Great courses. Beginner friendly and the explanations are clear and very easy to understand.

Saket-
Instructor showed multiple ways of using a concept and how to solve the problem. Excellent course and lecture by the instructor.

Tushar-
A very detailed explanation and quite handy tips and tricks! loved it

Sourabh-
Excellent lecture, pace of the instructor is very good, easy to understand

Rishi-
Instructor showed multiple ways of using a concept and how to solve the problem. Excellent course and lecture by the instructor.

Mahima-
This Courses is really useful for my career and surely i will recommend other to fulfill their career goals.

 Mauricio Roldan -
A pesar de no dominar perfectamente el idioma, se entiende bien.

Emile-
Yes lessons are very good. Not so fast, well explained

Kishore-
Worth course for the beginner to invest their time to learn this demanding skills.
