Home > Store

GIAC Security Essentials (GSEC) Complete Video Course (Video Training)

Register your product to gain access to bonus material or receive a coupon.

GIAC Security Essentials (GSEC) Complete Video Course (Video Training)

Online Video

Description

  • Copyright 2021
  • Edition: 1st
  • Online Video
  • ISBN-10: 0-13-691047-5
  • ISBN-13: 978-0-13-691047-3

11+ Hours of Video Instruction

GIAC Security Essentials (GSEC) Complete Video Course will provide the learner with everything they need to know for exam success, including all required key security concepts and terminologies, and effective techniques to detect and prevent all known attacks.

The GIAC Security Essentials (GSEC) Complete Video Course has been designed to provide the learner with complete exam objective coverage in order to prepare you for exam success! Security is considered one of the top IT fields for this new decade and beyond, and the GSEC exam is an important credential to achieve in order to continue your career advancement in IT security. This course has been organized to align with the objectives of the exam by the presenter, Michael J. Shannon, who is an expert in IT and security, with more than 30 years of experience. Michael has organized the course into 6 Modules:
Module 1: Network Security EssentialsModule 2: Defense in Depth and AttacksModule 3: Threat ManagementModule 4: Cryptography, Risk Management, and ResponseModule 5: Windows Security EssentialsModule 6: Linux Security Essentials
The course walks you through hands-on demonstrations of security concepts, as well as in-depth explanations and case studies of various security components, including threat & risk management, cryptography, and understanding how to navigate threats in both Windows and Linux operating systems. Michael also provides insight into the tools and utilities available for combatting security threats in each OS in order to prepare you for everything the exam can throw at you to ensure exam success.

Skill Level

  • Beginner/Intermediate

Learn How To
  • Manage Network Security including Device, Web Communication, and Wireless Network Security
  • Prepare for malicious attacks by implementing active defense strategies
  • Assess threats through vulnerability scanning and managing penetration testing to ensure systems are prepared for attacks.
  • Apply cryptography and risk management strategies
  • Handle incident response and contingency plans
  • Work with tools and utilities Microsoft provides for security
  • Work with services and utilities Linux provides for security
  • Prepare for the GSEC exam with hours of repeatable hands-on demonstrations
  • Prepare for implementing, monitoring, and maintaining enterprise security in the real-world

Who Should Take This Course
The target audience for this course is anyone who wants to achieve the GIAC Security Essentials (GSEC) certification or learners who simply want to get a foundation in implementing real-world, cutting-edge security solutions on a path to more advanced security administration and engineering skills.
Course Requirements
Knowledge of information security fundamentals found in the GISF entry-level GIAC security certification or CompTIA Security+ is recommended but not required.
Lesson Descriptions
Module 1, Network Security Essentials, starts with TCP/IP Essentials. The lesson then moves on to critical security controls, access controls, and password management. This lesson also explores network security devices and device security; web communication security based on the Center for Internet Security (CIS), and wireless network security.
Module 2, "Defense in Depth and Attacks, looks at malicious code and exploit mitigation, along with defense in depth and defensible network architecture. Lastly, this lesson covers active defense and implementing endpoint security.
Module 3,Threat Management," discusses log management and SIEM. It then gets into vulnerability scanning, penetration testing, virtualization, and lastly, Cloud Security.
Module 4, Cryptography, Risk Management, and Response, evaluates cryptography concepts and algorithms, which will then be applied with security policies and procedures. Next, this lesson will cover IT risk management, as well as incident handling and response. Lastly, this lesson will cover several aspects of contingency planning.
Module 5, Windows Security Essentials, is a hands-on demonstration of Windows security infrastructure; Windows access controls and security policy enforcement; Network services; Azure cloud computing; and Windows Automation, Auditing, and Forensics.
Module 6,Linux Security Essentials, will also be hands-on demonstrations, but this lesson will cover all things Linux: Linux Security Structure, Permissions and Access, Linux server Hardening and Securing, Monitoring and Attack Detection, and Linux security utilities.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more.Learn more about Pearson Video training at http://www.informit.com/video.

Sample Content

Table of Contents

Module 1Network Security EssentialsLesson 1TCP/IP EssentialsLesson 2Critical ControlsLesson 3Access Control & Password ManagementLesson 4Network Security Devices and Device SecurityLesson 5Web Communication SecurityLesson 6Wireless Network Security
Module 2Defense in Depth and AttacksLesson 7Malicious Code & Exploit MitigationLesson 8Defense in Depth and Defensible Network ArchitectureLesson 9Active DefenseLesson 10Endpoint Security
Module 3Threat ManagementLesson 11Log Management & SIEMLesson 12Vulnerability Scanning and Penetration TestingLesson 13Virtualization and Cloud Security
Module 4Cryptography, Risk Management, and ResponseLesson 14Cryptography Concepts and AlgorithmsLesson 15Applied CryptographyLesson 16Security PolicyLesson 17IT Risk ManagementLesson 18Incident Handling and ResponseLesson 19Contingency Plans
Module 5Windows Security EssentialsLesson 20Windows Security InfrastructureLesson 21Windows Access ControlsLesson 22Enforcing Windows Security PolicyLesson 23Windows Network Services and Cloud ComputingLesson 24Windows Automation, Auditing, and Forensics
Module 6Linux Security EssentialsLesson 25Linux Security: Structure, Permissions and AccessLesson 26Linux Services: Hardening and SecuringLesson 27Linux: Monitoring and Attack Detection

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership