Course Description
This course is the most effective step to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. Students will learn tips and tricks designed to help them win the battle against the wide range of cyber adversaries.
GIAC Security Essentials (GSEC) is one of the top certifications on the market for professionals who want to prove their IT skills on security-related tasks.
Sept. 12, 2020
Program Requirements
Delivery | Online |
Length | 2-4 weeks |
VA Approved | GI Bill & VET-TEC |
Certification | GSEC |
Objectives
- Develop effective security metrics that provide a focused playbook that the IT department can implement, auditors can validate, and executives can understand
- Analyze the risk to your environment to drive the creation of a security roadmap that focuses on the right areas of security.
- Understand practical tips and tricks that focus on addressing high-priority security problems within your organization and doing the right things that lead to security solutions that work.
- Learn why some organizations win and why some lose when it comes to security and, most importantly, how to be on the winning side.
- Understand the core areas of security and how to create a security program that is built on a foundation of Detection, Response, and Prevention
Prerequisite
GSE prerequisite baseline is GSEC, GCIH, GCIA with two Gold certifications. The GSEC prerequisite is unique because of dual Windows and Unix coverage.
Course Content
Network Security Essentials
1. Introduction
2. Defensible Network Architecture
3. Protocols and Packet Analysis
4. Network Device Security
5. Virtualization and Cloud
6. Securing Wireless Networks
Defense-in-Depth
1. Defense-in-Depth Overview
2. Identity and Access Management
3. Authentication and Password Security
4. CIS Controls
5. Data Loss Prevention
6. Security Plans and Risk Management
Vulnerability Management and Response
1. Vulnerability Assessment
2. Penetration Testing
3. Attacks and Malicious Software
4. Web Application Security
5. Security Operations and Log Management
6. Digital Forensics and Incident Response
Data Security Technologies
1. Cryptography
2. Cryptography Algorithms and Deployment
3. Applying Cryptography
4. Network Security Device
5. Endpoint Security
Windows Security
1. Windows Security Infrastructure
2. Windows as a Service
3. Windows Access Controls
4. Enforcing Security Policy
5. Network Services and Cloud Computing
6. Automation, Auditing, and Forensics
Linux, Mac, and Smartphone Security
1. Linux Fundamentals: Structure, Permissions, and Access Control
2. Linux Security Enhancements and Infrastructure
3. Containerized Security
4. macOS Security
5. Mobile Device Security