Home > Art, Film & Photography > GIAC Security Essentials GSEC Training Course
GIAC Security Essentials GSEC Training Course

GIAC Security Essentials GSEC Training Course

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Advance your career in IT security with this video-based, online, certification training course. Upon completion of this self-paced course, you’ll be fully prepared to take the GIAC Security Essentials exam to earn your GSEC certification. The 11 hours of expert-led lessons included in this course cover every objective on the exam. You’ll also get flashcards and quizzes to maximize learning, and 2 sample tests to practice taking the exam. Through the guided labs provided, you’ll build real-world, hands-on experience combating security threats. Who should take this course Skill level | Beginner to intermediate Anyone preparing for the GIAC Security Essentials exam to become GSEC certified Anyone eager to learn security solutions implementation on a path to more advanced security administration and engineering skills Anyone looking for techniques to detect and prevent cybersecurity attacks It is recommended, but not required, that candidates for this course have the knowledge of information security fundamentals offered by the CompTIA Security+ training course For an optimal course experience, we recommend using these browsers and devices. Course includes 11 hours of expert-led training videos to watch and learn at your own pace Hands-on labs to simulate real-world experience combating security threats Self-study tools, such as flashcards to master key terms and quizzes to self-assess your progress 2 complete practice tests to ensure you’re ready to take the GSEC exam with confidence 1 year of access* What you'll learn This Pearson IT Training Course will help you master the skills tested on the GSEC exam, including but not limited to: Managing network security, including device, web communication, and wireless network security Preparing for malicious attacks by implementing active defense strategies Assessing threats through vulnerability scanning and managing penetration testing to ensure systems are prepared for attacks Applying cryptography and risk management strategies Handling incident response and contingency plans Working with the tools and utilities Microsoft Windows provides for security Working with the services and utilities Linux provides for security Implementing, monitoring, and maintaining enterprise security in the real world *Retake guarantee Didn't pass your certification exam on your first try? We'll give you six months of additional access at no cost. About Pearson IT Training Courses Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level. From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Table of Contents:
GIAC Security Essentials (GSEC) Introduction Introduction Module 1: Network Security Essentials Module introduction Lesson 1: TCP/IP Essentials Learning objectives 1.1 Network Protocols and Reference Models 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6 1.3 Layer 4 Protocols 1.4 Setting up a Lab Environment 1.5 Using tcpdump and Wireshark Lab: Capturing a Packet Using Wireshark Lesson 1: Flashcards Lesson 1: Quiz Lesson 2: Critical Controls Learning objectives 2.1 CIA Triad and Parkerian Hexad 2.2 Categories and Types of Controls 2.3 Understanding the Enterprise Architecture 2.4 Introduction to Threat Enumeration Lesson 2: Flashcards Lesson 2: Quiz Lesson 3: Access Control & Password Management Learning objectives 3.1 Access Control Concepts 3.2 Password Management 3.3 Introduction to Password Cracking Lab: Using the John the Ripper Tool Lab: Performing the Intense Scan in Zenmap Lesson 3: Flashcards Lesson 3: Quiz Lesson 4: Network Security Devices and Device Security Learning objectives 4.1 Network Topologies and Zones 4.2 Overview of Network Devices and Hardening 4.3 Survey of Security Devices and Wireshark 4.4 Configuring Firewalls at Amazon Web Services Lab: Creating a Network ACL and Adding Inbound and Outbound Rules to It Lab: Creating a Web ACL 4.5 Exploring a Palo Alto Networks Next-Generation Firewall 4.6 Examining a Classic IPS Sensor Device Lesson 4: Flashcards Lesson 4: Quiz Lesson 5: Web Communication Security Learning objectives 5.1 Introducing the Center for Internet Security (CIS) 5.2 Overview of CIS Controls 5.3 Samples and Case Studies Lesson 5: Flashcards Lesson 5: Quiz Lesson 6: Wireless Network Security Learning objectives 6.1 The Evolution of IEEE 802.11 Security 6.2 WPA3 Security 6.3 PAN, NFC, and 5G Concepts 6.4 The Internet of Things (IoT) Lab: Creating a Security Profile Lesson 6: Flashcards Lesson 6 : Quiz Module 2: Defense in Depth and Attacks Module introduction Lesson 7: Malicious Code & Exploit Mitigation Learning objectives 7.1 Common Attack Types 7.2 CryptoMalware 7.3 Defensive Strategies Lesson 7: Flashcards Lesson 7: Quiz Lesson 8: Defense in Depth and Defensible Network Architecture Learning objectives 8.1 Defense in Depth Overview and Strategies 8.2 Core Security Strategies 8.3 Defensible Network Architectures Lesson 8: Flashcards Lesson 8: Quiz Lesson 9: Active Defense Learning objectives 9.1 Overview of Active Defense 9.2 Active Defense Techniques Lab: Creating Reverse and Bind Shells using Netcat Lab: Setting up a Honeypot on Kali Linux 9.3 Active Defense Tools Lesson 9: Flashcards Lesson 9: Quiz Lesson 10: Endpoint Security Learning objectives 10.1 Overview of Endpoint Security 10.2 Host-based Intrusion Detection 10.3 Host-based Intrusion Prevention Lab: Enabling Intrusion Prevention and Detection 10.4 Next-generation Endpoint Security Solutions Lesson 10: Flashcards Lesson 10: Quiz Module 3: Threat Management Module introduction Lesson 11: Log Management & SIEM Learning objectives 11.1 Overview of Logging 11.2 Logging System Setup and Configuration 11.3 Logging Analysis Fundamentals 11.4 Core SIEM Activities Lesson 11: Flashcards Lesson 11: Quiz Lesson 12: Vulnerability Scanning and Penetration Testing Learning objectives 12.1 Overview of Vulnerability Management 12.2 Network Scanning 12.3 Using Xenmap and Yersinia Lab: Using OWASP ZAP 12.4 Penetration Testing Lesson 12: Flashcards Lesson 12: Quiz Lesson 13: Virtualization and Cloud Security Learning objectives 13.1 Overview of Virtualization and VM Security 13.2 Cloud Models and Value Proposition 13.3 Common Attacks Against Cloud Services 13.4 Introduction to Microsoft Azure IAM Lesson 13: Flashcards Lesson 13: Quiz Module 4: Cryptography, Risk Management, and Response Module introduction Lesson 14: Cryptography Concepts and Algorithms Learning objectives 14.1 Overview of Cryptology and Cryptosystems 14.2 Cryptographic Hashing Lab: Observing an MD5 Generated Hash Value Lab: Observing a SHA256 Generated Hash Value 14.3 Symmetric Key Cryptography Lab: Using a Symmetric Algorithm 14.4 Asymmetric Key Cryptography Lab: Using an Asymmetric Algorithm Lesson 14: Flashcards Lesson 14: Quiz Lesson 15: Applied Cryptography Learning objectives 15.1 Digital Signatures Lab: Creating and Disabling an AWS KMS Key 15.2 IPsec Lab: Creating a VPN Connection Using the AWS-Managed VPN Option 15.3 SSL/TLS 15.4 Public Key Infrastructure Lesson 15: Flashcards Lesson 15: Quiz Lesson 16: Security Policy Learning objectives 16.1 The Importance of Written Security Policies 16.2 Standards, Guidelines, and Procedures 16.3 Acceptable Use Policies 16.4 Survey of Sample Policies Lesson 16: Flashcards Lesson 16: Quiz Lesson 17: IT Risk Management Learning objectives 17.1 Overview of Risk Management 17.2 Risk Management Best Practices 17.3 Threat Assessment, Analysis, and Reporting Lab: Using Nmap for Network Enumeration Lesson 17: Flashcards Lesson 17: Quiz Lesson 18: Incident Handling and Response Learning objectives 18.1 Fundamentals of Incident Handling 18.2 Six Step Incident Response Process 18.3 Conducting a Forensic Investigation Lesson 18: Flashcards Lesson 18: Quiz Lesson 19: Contingency Plans Learning objectives 19.1 Business Continuity Planning (BCP) 19.2 Business Impact Analysis (BIA) 19.3 Backups and Restoration 19.4 Disaster Recovery Planning (DRP) Lesson 19: Flashcards Lesson 19: Quiz Module 5: Windows Security Essentials Module introduction Lesson 20: Windows Security Infrastructure Learning objectives 20.1 Operating Systems and Services 20.2 Windows Workgroups vs. Domains Lab: Using the whois Program Lab: Disabling a User Account 20.3 Windows-as-a-Service Lesson 20: Flashcards Lesson 20: Quiz Lesson 21: Windows Access Controls Learning objectives 21.1 NTFS and Shared Folder Permissions Lab: Managing NTFS Permissions 21.2 Registry Keys and REGEDIT.EXE Lab: Enabling Credential Guard Using Regedit 21.3 Windows Privileges Lab: Setting Security Policies 21.4 Overview of BitLocker Drive Encryption Lab: Using BitLocker in Windows 10 Lesson 21: Flashcards Lesson 21: Quiz Lesson 22: Enforcing Windows Security Policy Learning objectives 22.1 Security Templates and SCA Snap-in 22.2 Understanding Group Policy Objects 22.3 Administrative Users, AppLocker, and User Account Control Lab: Creating an AppLocker Rule Lesson 22: Flashcards Lesson 22: Quiz Lesson 23: Windows Network Services and Cloud Computing Learning objectives 23.1 Azure and High Availability Lab: Configuring a High Availability Set 23.2 Configuring Azure VM Attributes Lab: Creating a Virtual Machine in Azure 23.3 Microsoft Azure Active Directory (MAAD) Lesson 23: Flashcards Lesson 23: Quiz Lesson 24: Windows Automation, Auditing, and Forensics Learning objectives 24.1 Windows PowerShell Lab: Investigating the Windows PowerShell Pipeline 24.2 Administrative Tools and Utilities Lab: Configuring an Application using Task Manager Lab: Using Event Viewer 24.3 Windows Auditing and Forensics Lesson 24: Flashcards Lesson 24: Quiz Module 6: Linux Security Essentials Module introduction Lesson 25: Linux Security: Structure, Permissions and Access Learning objectives 25.1 Comparing Linux Operating Systems Lab: Using Amazon EC2 25.2 Mobile Device Security 25.3 Linux Shells and Kernels 25.4 Linux Permissions Lab: Managing Basic Permissions Lab: Understanding SUID or SGID and Unix Program 25.5 Linux User Accounts Lesson 25: Flashcards Lesson 25: Quiz Lesson 26: Linux Services: Hardening and Securing Learning objectives 26.1 Starting Services at Boot Time 26.2 Configuration Management Tools 26.3 Linux Kernel Security Lab: Administering Kernel Security Parameters 26.4 Linux System Enhancers Lesson 26: Flashcards Lesson 26: Quiz Lesson 27: Linux: Monitoring and Attack Detection Learning objectives 27.1 Configuring and Monitoring Logs 27.2 Leveraging the Auditd tool 27.3 Linux Security Utilities Lab: Configuring a Linux Firewall Using the Iptables Lab: Using Linux Commands Lab: Monitoring Logs in Linux Lesson 27: Flashcards Lesson 27: Quiz Summary Summary


Best Sellers


Product Details
  • ISBN-13: 9780137509836
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson It Certification
  • Language: English
  • ISBN-10: 0137509839
  • Publisher Date: 16 Apr 2021
  • Binding: Digital online


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
GIAC Security Essentials GSEC Training Course
Pearson Education (US) -
GIAC Security Essentials GSEC Training Course
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

GIAC Security Essentials GSEC Training Course

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA