وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
3

GIAC Security Essentials (GSEC)

سرفصل های دوره

Introduction
  • 001. GIAC Security Essentials (GSEC) Introduction

  • Lesson 1 TCPIP Essentials
  • 001. Learning objectives
  • 002. 1.1 Network Protocols and Reference Models
  • 003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6
  • 004. 1.3 Layer 4 Protocols
  • 005. 1.4 Setting up a Lab Environment
  • 006. 1.5 Using tcpdump and Wireshark

  • Lesson 2 Critical Controls
  • 001. Learning objectives
  • 002. 2.1 CIA Triad and Parkerian Hexad
  • 003. 2.2 Categories and Types of Controls
  • 004. 2.3 Understanding the Enterprise Architecture
  • 005. 2.4 Introduction to Threat Enumeration

  • Lesson 3 Access Control & Password Management
  • 001. Learning objectives
  • 002. 3.1 Access Control Concepts
  • 003. 3.2 Password Management
  • 004. 3.3 Introduction to Password Cracking

  • Lesson 4 Network Security Devices and Device Security
  • 001. Learning objectives
  • 002. 4.1 Network Topologies and Zones
  • 003. 4.2 Overview of Network Devices and Hardening
  • 004. 4.3 Survey of Security Devices and Wireshark
  • 005. 4.4 Configuring Firewalls at Amazon Web Services
  • 006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall
  • 007. 4.6 Examining a Classic IPS Sensor Device

  • Lesson 5 Web Communication Security
  • 001. Learning objectives
  • 002. 5.1 Introducing the Center for Internet Security (CIS)
  • 003. 5.2 Overview of CIS Controls
  • 004. 5.3 Samples and Case Studies

  • Lesson 6 Wireless Network Security
  • 001. Learning objectives
  • 002. 6.1 The Evolution of IEEE 802.11 Security
  • 003. 6.2 WPA3 Security
  • 004. 6.3 PAN, NFC, and 5G Concepts
  • 005. 6.4 The Internet of Things (IoT)

  • Lesson 7 Malicious Code & Exploit Mitigation
  • 001. Learning objectives
  • 002. 7.1 Common Attack Types
  • 003. 7.2 CryptoMalware
  • 004. 7.3 Defensive Strategies

  • Lesson 8 Defense in Depth and Defensible Network Architecture
  • 001. Learning objectives
  • 002. 8.1 Defense in Depth Overview and Strategies
  • 003. 8.2 Core Security Strategies
  • 004. 8.3 Defensible Network Architectures

  • Lesson 9 Active Defense
  • 001. Learning objectives
  • 002. 9.1 Overview of Active Defense
  • 003. 9.2 Active Defense Techniques
  • 004. 9.3 Active Defense Tools

  • Lesson 10 Endpoint Security
  • 001. Learning objectives
  • 002. 10.1 Overview of Endpoint Security
  • 003. 10.2 Host-based Intrusion Detection
  • 004. 10.3 Host-based Intrusion Prevention
  • 005. 10.4 Next-generation Endpoint Security Solutions

  • Lesson 11 Log Management & SIEM
  • 001. Learning objectives
  • 002. 11.1 Overview of Logging
  • 003. 11.2 Logging System Setup and Configuration
  • 004. 11.3 Logging Analysis Fundamentals
  • 005. 11.4 Core SIEM Activities

  • Lesson 12 Vulnerability Scanning and Penetration Testing
  • 001. Learning objectives
  • 002. 12.1 Overview of Vulnerability Management
  • 003. 12.2 Network Scanning
  • 004. 12.3 Using Xenmap and Yersinia
  • 005. 12.4 Penetration Testing

  • Lesson 13 Virtualization and Cloud Security
  • 001. Learning objectives
  • 002. 13.1 Overview of Virtualization and VM Security
  • 003. 13.2 Cloud Models and Value Proposition
  • 004. 13.3 Common Attacks Against Cloud Services
  • 005. 13.4 Introduction to Microsoft Azure IAM

  • Lesson 14 Cryptography Concepts and Algorithms
  • 001. Learning objectives
  • 002. 14.1 Overview of Cryptology and Cryptosystems
  • 003. 14.2 Cryptographic Hashing
  • 004. 14.3 Symmetric Key Cryptography
  • 005. 14.4 Asymmetric Key Cryptography

  • Lesson 15 Applied Cryptography
  • 001. Learning objectives
  • 002. 15.1 Digital Signatures
  • 003. 15.2 IPsec
  • 004. 15.3 SSLTLS
  • 005. 15.4 Public Key Infrastructure

  • Lesson 16 Security Policy
  • 001. Learning objectives
  • 002. 16.1 The Importance of Written Security Policies
  • 003. 16.2 Standards, Guidelines, and Procedures
  • 004. 16.3 Acceptable Use Policies
  • 005. 16.4 Survey of Sample Policies

  • Lesson 17 IT Risk Management
  • 001. Learning objectives
  • 002. 17.1 Overview of Risk Management
  • 003. 17.2 Risk Management Best Practices
  • 004. 17.3 Threat Assessment, Analysis, and Reporting

  • Lesson 18 Incident Handling and Response
  • 001. Learning objectives
  • 002. 18.1 Fundamentals of Incident Handling
  • 003. 18.2 Six Step Incident Response Process
  • 004. 18.3 Conducting a Forensic Investigation

  • Lesson 19 Contingency Plans
  • 001. Learning objectives
  • 002. 19.1 Business Continuity Planning (BCP)
  • 003. 19.2 Business Impact Analysis (BIA)
  • 004. 19.3 Backups and Restoration
  • 005. 19.4 Disaster Recovery Planning (DRP)

  • Lesson 20 Windows Security Infrastructure
  • 001. Learning objectives
  • 002. 20.1 Operating Systems and Services
  • 003. 20.2 Windows Workgroups vs. Domains
  • 004. 20.3 Windows-as-a-Service

  • Lesson 21 Windows Access Controls
  • 001. Learning objectives
  • 002. 21.1 NTFS and Shared Folder Permissions
  • 003. 21.2 Registry Keys and REGEDIT.EXE
  • 004. 21.3 Windows Privileges
  • 005. 21.4 Overview of BitLocker Drive Encryption

  • Lesson 22 Enforcing Windows Security Policy
  • 001. Learning objectives
  • 002. 22.1 Security Templates and SCA Snap-in
  • 003. 22.2 Understanding Group Policy Objects
  • 004. 22.3 Administrative Users, AppLocker, and User Account Control

  • Lesson 23 Windows Network Services and Cloud Computing
  • 001. Learning objectives
  • 002. 23.1 Azure and High Availability
  • 003. 23.2 Configuring Azure VM Attributes
  • 004. 23.3 Microsoft Azure Active Directory (MAAD)

  • Lesson 24 Windows Automation, Auditing, and Forensics
  • 001. Learning objectives
  • 002. 24.1 Windows PowerShell
  • 003. 24.2 Administrative Tools and Utilities
  • 004. 24.3 Windows Auditing and Forensics

  • Lesson 25 Linux Security Structure, Permissions and Access
  • 001. Learning objectives
  • 002. 25.1 Comparing Linux Operating Systems
  • 003. 25.2 Mobile Device Security
  • 004. 25.3 Linux Shells and Kernels
  • 005. 25.4 Linux Permissions
  • 006. 25.5 Linux User Accounts

  • Lesson 26 Linux Services Hardening and Securing
  • 001. Learning objectives
  • 002. 26.1 Starting Services at Boot Time
  • 003. 26.2 Configuration Management Tools
  • 004. 26.3 Linux Kernel Security
  • 005. 26.4 Linux System Enhancers

  • Lesson 27 Linux Monitoring and Attack Detection
  • 001. Learning objectives
  • 002. 27.1 Configuring and Monitoring Logs
  • 003. 27.2 Leveraging the Auditd tool
  • 004. 27.3 Linux Security Utilities

  • Module 1 Network Security Essentials
  • 001. Module introduction

  • Module 2 Defense in Depth and Attacks
  • 001. Module introduction

  • Module 3 Threat Management
  • 001. Module introduction

  • Module 4 Cryptography, Risk Management, and Response
  • 001. Module introduction

  • Module 5 Windows Security Essentials
  • 001. Module introduction

  • Module 6 Linux Security Essentials
  • 001. Module introduction

  • Summary
  • 001. GIAC Security Essentials (GSEC) Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 8638
    حجم: 2844 مگابایت
    مدت زمان: 698 دقیقه
    تاریخ انتشار: ۱۳ فروردین ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید