وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

GIAC Security Essentials (GSEC) Online Training

سرفصل های دوره

This intermediate GIAC Security Essentials training prepares security professionals to take the GSEC exam, which is the one required exam to earn the Security Essentials certification.

The Global Information Assurance Certification is an industry credential IT professionals earn to prove that they’re technically proficient in a specialized field. The GIAC Security Essentials is a broad certification that proves a security professional understands the theory of protecting large networks – but more importantly, it’s a certification that shows they’re proficient in the real-world skills necessary to keep it safe.


1. Access Control Fundamentals
  • 1. Access Control Fundamentals
  • 2. Boundary Defense
  • 3. Controlled Access Based on Need to Know
  • 4. Limitation and Control of Network Ports
  • 5. Wireless Access Control
  • 6. Secure Configuration for Network Devices
  • 7. Email and Web Browser Protections
  • 8. Account Monitoring and Control

  • 2. Password Management
  • 1. Password Management Overview
  • 2. Attacks Against Passwords
  • 3. Hashing Examples with Common Passwords
  • 4. Implementing AAA
  • 5. Windows Password Management
  • 6. Protecting SAM
  • 7. John The Ripper (Hash Suite)
  • 8. Linux Password Management

  • 3. AWS Fundamentals and Security
  • 1. AWS Fundamentals and Security Introduction
  • 2. AWS Identity and Access Management
  • 3. AWS CloudTrail and CloudWatch
  • 4. AWS Inspector and CloudFront
  • 5. AWS Shield
  • 6. AWS Route53 and KMS
  • 7. CloudFlare Overview

  • 4. Containers and MacOS Security
  • 1. Containers and MacOS Security Overview
  • 2. Containers (and their security concerns)
  • 3. MacOS
  • 4. MacOS Security (overview)
  • 5. Container and MacOS Review

  • 5. Active Defense
  • 1. Active Defense Overview
  • 2. Honeypots and Decoys
  • 3. Tripwire
  • 4. Security Through Obscurity
  • 5. nMap and Logging

  • 6. Cryptography
  • 1. Cryptography Overview
  • 2. Synchronous Crypto
  • 3. Synchronous Crypto Examples
  • 4. Asynchronous Crypto
  • 5. Asynchronous Crypto Example
  • 6. Cryptography Review

  • 7. Cryptography Algorithms & Deployment
  • 1. Cryptography Algorithms & Deployment Overview
  • 2. Synchronous Algorithms
  • 3. Synchronous Algorithms Applications
  • 4. Asynchronous Algorithms
  • 5. Asynchronous Algorithms Applications

  • 8. Data Loss Prevention
  • 1. Data Loss Prevention Overview
  • 2. Data Classification
  • 3. Data Protection -2
  • 4. Prevention at the Perimeter
  • 5. Back ups
  • 6. Regulatory Requirements
  • 7. Data Recovery
  • 8. Virtual Protection

  • 9. Defense in Depth
  • 1. Defense in Depth
  • 2. Physical Controls
  • 3. Technical Controls
  • 4. Administrative controls
  • 5. Sandboxing on the Network
  • 6. Sandboxing on the Host
  • Scapy commands.txt

  • 10. Defensible Network Architecture
  • 1. Introduction
  • 2. VLAN Structure
  • 3. DMZ Structure
  • 4. Monitoring the Network
  • 5. Honeypot and Honeynet
  • 6. Passive Network Monitoring

  • 11. Endpoint Security
  • 1. Introduction
  • 2. Physical Security
  • 3. System Security
  • 4. Security Operation Centers
  • 5. The Different Tiers of SOC Analyst
  • 6. SOC Challenges

  • 12. Enforcing Windows Security Policy
  • 1. Introduction
  • 2. Enforcing Domain Membership
  • 3. Group Policy Application
  • 4. Protocol Hardening
  • 5. Standardized Images
  • PowerShell Commands.txt

  • 13. Introducing Kali
  • 1. Introducing Kali
  • 2. What is Kali
  • 3. Recon the network
  • 4. Move in for the attack
  • 5. Wrapping Up

  • 14. Incident Handling & Response
  • 1. Introduction
  • 2. Core Definitions
  • 3. Incident detection
  • 4. Speed of the attack
  • 5. Incident Response Policies
  • 6. Incident Response Tools
  • 7. Endpoints

  • 15. Mobile Device Security
  • 1. Introduction
  • 2. Mobile Device Management
  • 3. Needed Security Features for Mobile Devices
  • 4. Protect the device
  • 5. iPhone Security
  • 6. Android Security

  • 16. Linux Fundamentals
  • 1. Introduction
  • 2. Linux File Systems
  • 3. File permissions
  • 4. Network Settings
  • 5. Talking with other Operating Systems
  • 6. Linux Resources

  • 17. Linux Security and Hardening
  • 1. Linux Security and Hardening
  • 2. Network protection with iptables
  • 3. Configuring iptables
  • 4. iptables demonstration
  • 5. shadow and passwd files
  • 6. proc the kernel
  • 7. Using the knowledge to watch a system

  • 18. Log Management and SIEM
  • 1. Introduction
  • 2. Windows logs
  • 3. Capturing Windows Logs remotely
  • 4. Linux logs
  • 5. SIEMs

  • 19. Malicious Code and Exploit Mitigation
  • 1. Malicious Code and Exploit Mitigation
  • 2. What is Malicious Code
  • 3. How to Sniff Them Out
  • 4. The Usual Suspects
  • 5. Find the Exploits on Our Own

  • 20. Metasploit
  • 1. Exploitation Introduction
  • 2. Compare to Known Attacks
  • 3. Threat Scanning and Assessment
  • 4. Looking Around Metasploit
  • 5. Lets Leverage
  • Metasploit.txt

  • 21. Network Security Devices
  • 1. Network Security Devices
  • 2. Hardware Security Devices
  • 3. Software Security Devices
  • 4. Network Security Monitoring
  • 5. Looking At The Packets
  • 6. Next Generation Firewalls

  • 22. Networking and Protocols
  • 1. Networking and Protocols
  • 2. Full Packet Capturing
  • 3. Full Packet Capturing Examples
  • 4. The Flow Of The Packet
  • 5. Applicability To System And Network Security

  • 23. Security Frameworks and CIS Controls
  • 1. Security Frameworks and CIS Controls
  • 2. Policy
  • 3. Auditing
  • 4. Critical Security Controls - Basic
  • 5. Critical Security Controls Foundational
  • 6. Critical Security Controls Organizational

  • 24. Wireless Network Security
  • 1. Wireless Network Security
  • 2. Faraday Cages
  • 3. Robbery In Plain Site
  • 4. Weak Encryption
  • 5. Breaking the Wi-Fi

  • 25. Virtualization and Cloud Security
  • 1. Virtualization and Cloud Security
  • 2. Knowing What Virtualization is Being Used
  • 3. Installing and Configuring Hyper-V and VM Workstation
  • 4. Virtualization Can Mess With Inventory
  • 5. Escaping the Machine
  • 6. Virtual Review

  • 26. Vulnerability Scanning and Penetration Testing
  • 1. Vulnerability Scanning and Pen Testing
  • 2. Using nMap to find the Target
  • 3. Installing and Configuring Nessus
  • 4. Scanning with Nessus

  • 27. Web Communication Security
  • 1.Web Communication Security
  • 2. The Basics of SSL and TLS
  • 3. Knowing the Traffic
  • 4. Ingredients of a Cookie
  • 5. Local and External Web
  • 6. Secure Traffic Within the Organization

  • 28. Picking the Attack Vector
  • 1. Picking the Attack Vector
  • 2. Using Scan Results to Pick the Attack Vector
  • 3. Picking the Attack Tool
  • 4. Presenting Your Findings
  • 5. Review

  • 29. Windows Access Controls
  • 1. Windows Access Controls
  • 2. Local Security Policy
  • 3. Group Policy
  • 4.Windows Defender
  • 5. Control the CLI

  • 30. Windows as a Service
  • 1. Windows as a Service
  • 2. Software as a Service in Windows
  • 3. Platform as a Service in Windows
  • 4. Infrastructure as a Service in Windows
  • 5. Visualize the Service
  • 6. Windows Services
  • 7. Configuring Services in the GPO

  • 31. Windows Security Infrastructure
  • 1. Windows Security Infrastructure
  • 2. Windows Security
  • 3. Application Control
  • 4. File System Security
  • 5. Register the Security
  • 6. Backup from the Incident

  • 32. Windows Automation, Auditing, and Forensics
  • 1. Windows Automation, Auditing, and Forensics
  • 2. Automation
  • 3. Auditing
  • 4. Forensics
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 12185
    حجم: 9459 مگابایت
    مدت زمان: 1529 دقیقه
    تاریخ انتشار: 28 اردیبهشت 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید