GSEC Certification – Security Essentials

  • Duration – 20 hours

Areas Covered

  • Active defense, defense in depth, access control & password management
  • Cryptography: basic concepts, algorithms and deployment, and application
  • Defensible network architecture, networking & protocols, and network security
  • Incident handling & response, vulnerability scanning and penetration testing
  • Linux security: structure, permissions, & access; hardening & securing; monitoring & attack detection; & security utilities
  • Security policy, contingency plans, critical controls and IT risk management
  • Web communication security, virtualization and cloud security, and endpoint security
  • Windows: access controls, automation, auditing, forensics, security infrastructure, & securing network services

 All Cyber Security Courses BUNDLE

$40

GSEC Certification - Security Essentials

Build GSEC lab

 

 .Lab Requirement

 

 .Download the requirement

 

 .Setup the Lab Part  1

 

 .Setup the lab Part  2

 

 .Setup the lab Part  3

 

 .Setup the lab Part  4

 

Networking Concepts

 

 .Introduction

 

 .Network Basics

 

 .Internet Protocol – IP

 

 .OSI Model Part  1

 

 .OSI Model Part  2

 

 . TCPIP Model

 

 .Default Gateway

 

 .Demonstration

 

 .Network Architecture Components

 

 .Types of Network

 

 .TCP Commands

 

 .Resources  

 

Defense in Depth

 

 .Defense in Depth

 

 .Important Definitions Part 1-2

 

 .Compliance

 

 .Due Care and Due Diligence

 

 .Security Documents

 

 .The Relationship Between Security Document Types

 

 .Security Document Types

 

 . Policy Sample

 

 .The Relationship Between Security Document Types

 

 .Access Control

 

 .Authorization

 

 .Authentication

 

 . Single Sign on SSO

 

 .Access Control Attack

 

 .Password Hacking techniques

 

 .Default Password

 

 .Important tool  

 

 .Cain in Action

 

 .Xhydra

 

 .Ncrack

 

 . Web application vulnerability

 

 . DVWA

 

 .Hackthissite

 

 What is SQL Injection

 

 SQL Injection attack  

 

 . SQL Injection attack  

 

 . XSS Introduction

 

 . Reflected XSS

 

 .Stored XSS

 

 .Major Web Application vulnerabilities

 

Internet Security Technologies

 

 .Introduction

 

 ..Introduction to Maleware

 

 .Types of Malware

 

 .Create a virus

 

 .Creating a Virus using a Tool

 

 .Can I Bypass the AV

 

 .Introduction to Denail of Service

 

 .Denial of Service Attack Demonstration  

 

 .Denial of Service Attack Demonstration  

 

 .Denial of Service Attack Demonstration  

 

 .What is Buffer Overflow

 

 .How to search for Buffer Overflow

 

 .Buffer Overflow Part  

 

 .Buffer Overflow Part  

 

 . Buffer Overflow Part  

 

 .IDS, Firewalls, Honeypots

 

 .Honeypots

 

 .Firewalls

 

 ..Intrusion Detection System – IDS

 

 . What is Social Engineering –

 

 .Fake Email – Spoofing

 

 .Social Engineering Toolkit

 

 .Phising Credential Harvest –

 

 .Advanced Social engineering technique

 

 .Network Scanning Overview

 

 .Important Scanning Defination

 

 .Network Scanning Methology

 

 .Identifying Live system

 

 .Port Scanning

 

 .Advanced Scanning Techniques

 

OS Security

 

 . Introduction

 

 . Securing Passwords  

 

 . Securing Operating Systems  

 

 . Firewalls  

 

 . Securing Network Switches  

 

 . Securing Network Routers  

 

 . Securing Wireless Networks  

 

 . IDS, IPS, and Honeypots  

 

 . Antiviruses  

 

 .OS Security

 

 . Encryption  

 

 . Physical Security  

 

300+ Courses

After your course completion, we provide course completion certificate as well.

Lifetime Access

All courses are for lifetime access.

l

Priority Support

All queries are answered 24/7.

What People Are Saying

Abhilash -

A very good match. i am enjoying every bit.

Sonal-

Experience was quite good and it was very useful and well elaborated course.

Karan-

I FEEL AS IF I AM ATTENDING A WORLD CLASS TRAINING AND THE LECTURER HAS BEEN AWESOME!

Gilbert-

I find that the explanation is good and also understandable.

Seyed-

Really helpful, recommended to everyone to grow up your future skills for next level especially in this competitive market.

Mayur-

I really like this course, it was a good match for me :))

Mahesh-

Standard process and hands on covered nicely.

 

Emily-

Perfect, with complete hands on. Well structured and nicely covered.

Kevin-

Great Content, nice and up to the mark course.

Mayuresh-

 

Great courses. Beginner friendly and the explanations are clear and very easy to understand.

Saket-

Instructor showed multiple ways of using a concept and how to solve the problem. Excellent course and lecture by the instructor.

Tushar-

A very detailed explanation and quite handy tips and tricks! loved it

Sourabh-

 

Excellent lecture, pace of the instructor is very good, easy to understand

Rishi-

Instructor showed multiple ways of using a concept and how to solve the problem. Excellent course and lecture by the instructor.

Mahima-

This Courses is really useful for my career and surely i will recommend other to fulfill their career goals.

 Mauricio Roldan -

A pesar de no dominar perfectamente el idioma, se entiende bien.

Emile-

Yes lessons are very good. Not so fast, well explained

Kishore-

Worth course for the beginner to invest their time to learn this demanding skills.

Learn at your pace

Courses Made By Industry Experts

Enhance your career

Enroll NowContact us