وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

GIAC Security Essentials (GSEC)

سرفصل های دوره

Introduction
  • 001. GIAC Security Essentials (GSEC) Introduction

  • Lesson 1 TCPIP Essentials
  • 001. Learning objectives
  • 002. 1.1 Network Protocols and Reference Models
  • 003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6
  • 004. 1.3 Layer 4 Protocols
  • 005. 1.4 Setting up a Lab Environment
  • 006. 1.5 Using tcpdump and Wireshark

  • Lesson 2 Critical Controls
  • 001. Learning objectives
  • 002. 2.1 CIA Triad and Parkerian Hexad
  • 003. 2.2 Categories and Types of Controls
  • 004. 2.3 Understanding the Enterprise Architecture
  • 005. 2.4 Introduction to Threat Enumeration

  • Lesson 3 Access Control & Password Management
  • 001. Learning objectives
  • 002. 3.1 Access Control Concepts
  • 003. 3.2 Password Management
  • 004. 3.3 Introduction to Password Cracking

  • Lesson 4 Network Security Devices and Device Security
  • 001. Learning objectives
  • 002. 4.1 Network Topologies and Zones
  • 003. 4.2 Overview of Network Devices and Hardening
  • 004. 4.3 Survey of Security Devices and Wireshark
  • 005. 4.4 Configuring Firewalls at Amazon Web Services
  • 006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall
  • 007. 4.6 Examining a Classic IPS Sensor Device

  • Lesson 5 Web Communication Security
  • 001. Learning objectives
  • 002. 5.1 Introducing the Center for Internet Security (CIS)
  • 003. 5.2 Overview of CIS Controls
  • 004. 5.3 Samples and Case Studies

  • Lesson 6 Wireless Network Security
  • 001. Learning objectives
  • 002. 6.1 The Evolution of IEEE 802.11 Security
  • 003. 6.2 WPA3 Security
  • 004. 6.3 PAN, NFC, and 5G Concepts
  • 005. 6.4 The Internet of Things (IoT)

  • Lesson 7 Malicious Code & Exploit Mitigation
  • 001. Learning objectives
  • 002. 7.1 Common Attack Types
  • 003. 7.2 CryptoMalware
  • 004. 7.3 Defensive Strategies

  • Lesson 8 Defense in Depth and Defensible Network Architecture
  • 001. Learning objectives
  • 002. 8.1 Defense in Depth Overview and Strategies
  • 003. 8.2 Core Security Strategies
  • 004. 8.3 Defensible Network Architectures

  • Lesson 9 Active Defense
  • 001. Learning objectives
  • 002. 9.1 Overview of Active Defense
  • 003. 9.2 Active Defense Techniques
  • 004. 9.3 Active Defense Tools

  • Lesson 10 Endpoint Security
  • 001. Learning objectives
  • 002. 10.1 Overview of Endpoint Security
  • 003. 10.2 Host-based Intrusion Detection
  • 004. 10.3 Host-based Intrusion Prevention
  • 005. 10.4 Next-generation Endpoint Security Solutions

  • Lesson 11 Log Management & SIEM
  • 001. Learning objectives
  • 002. 11.1 Overview of Logging
  • 003. 11.2 Logging System Setup and Configuration
  • 004. 11.3 Logging Analysis Fundamentals
  • 005. 11.4 Core SIEM Activities

  • Lesson 12 Vulnerability Scanning and Penetration Testing
  • 001. Learning objectives
  • 002. 12.1 Overview of Vulnerability Management
  • 003. 12.2 Network Scanning
  • 004. 12.3 Using Xenmap and Yersinia
  • 005. 12.4 Penetration Testing

  • Lesson 13 Virtualization and Cloud Security
  • 001. Learning objectives
  • 002. 13.1 Overview of Virtualization and VM Security
  • 003. 13.2 Cloud Models and Value Proposition
  • 004. 13.3 Common Attacks Against Cloud Services
  • 005. 13.4 Introduction to Microsoft Azure IAM

  • Lesson 14 Cryptography Concepts and Algorithms
  • 001. Learning objectives
  • 002. 14.1 Overview of Cryptology and Cryptosystems
  • 003. 14.2 Cryptographic Hashing
  • 004. 14.3 Symmetric Key Cryptography
  • 005. 14.4 Asymmetric Key Cryptography

  • Lesson 15 Applied Cryptography
  • 001. Learning objectives
  • 002. 15.1 Digital Signatures
  • 003. 15.2 IPsec
  • 004. 15.3 SSLTLS
  • 005. 15.4 Public Key Infrastructure

  • Lesson 16 Security Policy
  • 001. Learning objectives
  • 002. 16.1 The Importance of Written Security Policies
  • 003. 16.2 Standards, Guidelines, and Procedures
  • 004. 16.3 Acceptable Use Policies
  • 005. 16.4 Survey of Sample Policies

  • Lesson 17 IT Risk Management
  • 001. Learning objectives
  • 002. 17.1 Overview of Risk Management
  • 003. 17.2 Risk Management Best Practices
  • 004. 17.3 Threat Assessment, Analysis, and Reporting

  • Lesson 18 Incident Handling and Response
  • 001. Learning objectives
  • 002. 18.1 Fundamentals of Incident Handling
  • 003. 18.2 Six Step Incident Response Process
  • 004. 18.3 Conducting a Forensic Investigation

  • Lesson 19 Contingency Plans
  • 001. Learning objectives
  • 002. 19.1 Business Continuity Planning (BCP)
  • 003. 19.2 Business Impact Analysis (BIA)
  • 004. 19.3 Backups and Restoration
  • 005. 19.4 Disaster Recovery Planning (DRP)

  • Lesson 20 Windows Security Infrastructure
  • 001. Learning objectives
  • 002. 20.1 Operating Systems and Services
  • 003. 20.2 Windows Workgroups vs. Domains
  • 004. 20.3 Windows-as-a-Service

  • Lesson 21 Windows Access Controls
  • 001. Learning objectives
  • 002. 21.1 NTFS and Shared Folder Permissions
  • 003. 21.2 Registry Keys and REGEDIT.EXE
  • 004. 21.3 Windows Privileges
  • 005. 21.4 Overview of BitLocker Drive Encryption

  • Lesson 22 Enforcing Windows Security Policy
  • 001. Learning objectives
  • 002. 22.1 Security Templates and SCA Snap-in
  • 003. 22.2 Understanding Group Policy Objects
  • 004. 22.3 Administrative Users, AppLocker, and User Account Control

  • Lesson 23 Windows Network Services and Cloud Computing
  • 001. Learning objectives
  • 002. 23.1 Azure and High Availability
  • 003. 23.2 Configuring Azure VM Attributes
  • 004. 23.3 Microsoft Azure Active Directory (MAAD)

  • Lesson 24 Windows Automation, Auditing, and Forensics
  • 001. Learning objectives
  • 002. 24.1 Windows PowerShell
  • 003. 24.2 Administrative Tools and Utilities
  • 004. 24.3 Windows Auditing and Forensics

  • Lesson 25 Linux Security Structure, Permissions and Access
  • 001. Learning objectives
  • 002. 25.1 Comparing Linux Operating Systems
  • 003. 25.2 Mobile Device Security
  • 004. 25.3 Linux Shells and Kernels
  • 005. 25.4 Linux Permissions
  • 006. 25.5 Linux User Accounts

  • Lesson 26 Linux Services Hardening and Securing
  • 001. Learning objectives
  • 002. 26.1 Starting Services at Boot Time
  • 003. 26.2 Configuration Management Tools
  • 004. 26.3 Linux Kernel Security
  • 005. 26.4 Linux System Enhancers

  • Lesson 27 Linux Monitoring and Attack Detection
  • 001. Learning objectives
  • 002. 27.1 Configuring and Monitoring Logs
  • 003. 27.2 Leveraging the Auditd tool
  • 004. 27.3 Linux Security Utilities

  • Module 1 Network Security Essentials
  • 001. Module introduction

  • Module 2 Defense in Depth and Attacks
  • 001. Module introduction

  • Module 3 Threat Management
  • 001. Module introduction

  • Module 4 Cryptography, Risk Management, and Response
  • 001. Module introduction

  • Module 5 Windows Security Essentials
  • 001. Module introduction

  • Module 6 Linux Security Essentials
  • 001. Module introduction

  • Summary
  • 001. GIAC Security Essentials (GSEC) Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 8638
    حجم: 2844 مگابایت
    مدت زمان: 698 دقیقه
    تاریخ انتشار: 13 فروردین 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید