Course Description

This course is the most effective step to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. Students will learn tips and tricks designed to help them win the battle against the wide range of cyber adversaries.

GIAC Security Essentials (GSEC) is one of the top certifications on the market for professionals who want to prove their IT skills on security-related tasks.

Sept. 12, 2020

Program Requirements

DeliveryOnline
Length2-4 weeks
VA ApprovedGI Bill & VET-TEC
CertificationGSEC

Objectives

  • Develop effective security metrics that provide a focused playbook that the IT department can implement, auditors can validate, and executives can understand
  • Analyze the risk to your environment to drive the creation of a security roadmap that focuses on the right areas of security.
  • Understand practical tips and tricks that focus on addressing high-priority security problems within your organization and doing the right things that lead to security solutions that work.
  • Learn why some organizations win and why some lose when it comes to security and, most importantly, how to be on the winning side.
  • Understand the core areas of security and how to create a security program that is built on a foundation of Detection, Response, and Prevention

Prerequisite

GSE prerequisite baseline is GSEC, GCIH, GCIA with two Gold certifications. The GSEC prerequisite is unique because of dual Windows and Unix coverage.

Course Content

1.   Introduction
2.   Defensible Network Architecture
3.   Protocols and Packet Analysis
4.   Network Device Security
5.   Virtualization and Cloud
6.   Securing Wireless Networks

1.    Defense-in-Depth Overview   
2.    Identity and Access Management
3.    Authentication and Password Security
4.    CIS Controls
5. Data Loss Prevention      
6.    Security Plans and Risk Management

1.     Vulnerability Assessment  
2.     Penetration Testing
3.     Attacks and Malicious Software
4.    Web Application Security
5.    Security Operations and Log Management
6.    Digital Forensics and Incident Response

1.    Cryptography
2.    Cryptography Algorithms and Deployment
3.    Applying Cryptography
4.    Network Security Device
5.    Endpoint Security

1.    Windows Security Infrastructure
2.    Windows as a Service
3.    Windows Access Controls
4.    Enforcing Security Policy
5.    Network Services and Cloud Computing
6.    Automation, Auditing, and Forensics

1.    Linux Fundamentals: Structure, Permissions, and Access Control
2.    Linux Security Enhancements and Infrastructure
3.    Containerized Security
4.    macOS Security
5.    Mobile Device Security