GIAC Security Essentials (GSEC) Certification



Disclaimer: Tech-Act is an independent training services provider. Any use of third party trademarks, brand names, products and services is only referential.Tech-Act disclaims any sponsorship, affiliation or endorsement of or by any third parties. Tech-Act is an authorized training partner only where explicitly stated and as listed here.



REQUEST INFORMATION


GIAC Security Essentials (GSEC) Certification


About This Course

Global Information Assurance Certification or GIAC certification is a credible credential that certifies a professional’s proficiencies, skills and expertise to incorporate and utilize information security (IS) practices in any enterprise. The GSEC certification tests the key skills and knowledge needed to oversee security responsibilities within an enterprise IT setting. The GSEC certification ought to be renewed in every four years.

Further, the GIAC Security Essentials (GSSEC) certified professionals are able to demonstrate their expertise in applying key information security (IS) concepts, techniques and skills that go beyond the basic principles and terminologies. GSEC holders qualify for taking up hands-on accountabilities and roles within an enterprise IT system security domain.


Who Should Attend This Course

N/A


Why This Course

Further, the GIAC Security Essentials (GSSEC) certified professionals are able to demonstrate their expertise in applying key information security (IS) concepts, techniques and skills that go beyond the basic principles and terminologies. GSEC holders qualify for taking up hands-on accountabilities and roles within an enterprise IT system security domain.

After successful completion of the GIAC Security Essentials (GSEC) Certification, you learn about:

  • Access Control
  • Cyber Defense
  • DNS
  • Disaster Recovery
  • Incident Response
  • Information Security (IS)
  • Malware
  • Network Security
  • Security Policy
  • TCP-IP
  • Vulnerability Management
  • Windows Security
  • Wireless Security
  • Globally recognized
  • Improves professional credibility
  • Improves job prospects and payscale

Course Objectives
  • Access Control
  • Password Management
  • Active Defense
  • Advanced Threat
  • Contingency Plans
  • Critical Controls
  • Cryptography
  • Network Architecture
  • Endpoint Security
  • Windows Security
  • Incident Handling
  • Incident Response
  • Risk Management
  • Linux Security
  • Exploit Mitigation
  • Network Device Security
  • Virtualization
  • Cloud Security
  • Vulnerability Scanning
  • Penetration Testing
  • Access Controls
  • Wireless Network Security

Course Prerequisites

No prerequisites as such to take up the GIAC Security Essentials Certification (GSEC). Any professional seeking to hone his/her knowledge about Information Security (IS) can enroll for this training.


Course Benefits


After successful completion of the GIAC Security Essentials (GSEC) Certification, you learn about:

  • Access Control
  • Cyber Defense
  • DNS
  • Disaster Recovery
  • Incident Response
  • Information Security (IS)
  • Malware
  • Network Security
  • Security Policy
  • TCP-IP
  • Vulnerability Management
  • Windows Security
  • Wireless Security
  • Globally recognized
  • Improves professional credibility
  • Improves job prospects and payscale

Curriculum


Networking

Networking Fundamentals

This section explores the fundamentals of networking. It discusses various network types such as local area networks, wide area networks, metropolitan area networks and personal area networks. It covers different types of network topologies such as bus, ring, star, mesh and hybrid networks. It also covers network devices such as hubs, bridges, routers and switches.

Understanding DNS

This section dives into important services in networking known as the domain naming system or DNS. It looks at the architecture, service, records as well as explains the process of name resolution within networks.

Protocols and Packets

This section dives into the world of protocols and packets. It shows the basic structure of protocol and looks at TCP and UDP header formats. It covers the basics of the Open Systems Interconnection (OSI) model and the TCP/IP protocol stack.

Network Security

Network Security

This section discusses network perimeter security by describing the functions of different types of firewalls. It also discusses where and how to implement a firewall and the role of a proxy.

Vulnerability Scanning

This section discusses vulnerability scanning. It examines different approaches and remediation methods. It demonstrates Nessus and Nmap.

IDS and IPS

This section compares and contrast Intrusion Detection and Prevention systems (IDSs and IPSs). It shares pros and cons of each and discusses how to logically place them within a network.

Authentication and Access Control

Access Control

This section discusses authentication and password management. It explains the difference between the AAAs (authentication, authorization and accountability. It also discusses the CIA (confidentiality, integrity, and availability) and a couple of access control methods.

Risk Management

Risk Management

This section discusses Risk Management. It explains qualitative and quantitative risk assessment methodologies. It shows common methods for calculating risk and approaches for dealing with risk (transfer, accept, avoid, or mitigate).

Attacks and Malware

Attacks and Malware

This section explores common malware types and attacks. It shows attack methods like phishing, SQL injection, cross-site scripting (XSS), and Denial of Service (DoS). It looks into network mapping/scanning techniques and defines viruses/malicious code.

Incident Response

Incident Response

This section explores the fundamentals of Incident Handling. It explains how to prepare for an incident through policies and training. It covers incident identification, containment, eradication, recovery, investigation techniques and legal considerations.

Encryption

Cryptography Fundamentals

This section explores the concepts of cryptography fundamentals. It looks at the encryption in its basic form and discusses a couple different cipher types like transposition and substitution ciphers.

PKI and Steganography

This section covers public key infrastructure (PKI). It dives more into asymmetric key encryption, the infrastructure, and components such as certificates, certificate issuance, certificate validation, smart cards and certificate-based authentication.

Windows

Workgroups and Domains

This section explains Microsoft Windows workgroups and Active Directory domains. It looks at the decentralized nature of Windows workgroups and compares that to the centralized environment of Active Directory domains. It explores the authentication mechanisms used to log users on in workgroups and domains.

Windows Permissions

This section demonstrates controlling access to resource within a Windows environment through permissions. It looks at NTFS and shared permissions as well as discusses the two permission set’s interaction with each other. It also covers printer permissions that can be applied to shared printers within a network.

Windows Updates

This section discusses concepts related to patch management of Windows-based systems through updates. It dive into the different components of updates such as service packs, hot fixes, automatic updates and the Windows Server Update Service also known as WSUS.

Windows Backup and Restore

This section looks at the various concepts surrounding maintaining Windows systems. It explains the overall backup process and demonstrates that process through the Windows Server Backup tool. It explores the importance of system state information and backup types.

Templates and Group Policy

This section discusses the importance and utilization of Security Templates in a Windows environment and controlling settings through Group Policy in Windows domains. It explores password policies, lockout policies, software restriction policies and AppLocker.

Windows Network Security

This section explains Windows security starting with Microsoft Firewall. It demonstrates how to create and implement custom rules. It demonstrates how to create IPSec policies in a Windows environment.

Linux

Linux Overview

This section discusses about Linux. It provides a good foundation and breakdown of the different Linux distributions, where they originated and what they are used for. It focuses on TCP/IP configuration and demonstrates how to configure a Linux system.

Linux Configuration Fundamentals

This section explores into configuring a Linux system, particularly in a multi-user environment. It looks at creating a non-administrative account that can be used for everyday computing, and how to escalate privileges when necessary. It demonstrates creating additional users and controlling their access.

Virtualization

Virtualization

This section explores Virtualization as it pertains to maintaining a secure environment. It explains what is virtual environment and common concepts like Type1 vs Type2 hypervisors, use cases, and security procedures like hardening, auditing, and management systems.

Schedule & Fees


SELF PACED Online INSTRUCTOR LED CLASSROOM
Duration 1 Year Access
Course Material
Exam Voucher
Face Time With Instructor
Course Price $399 On Request On Request
Enroll Now Enquire Now Enquire Now

Course FAQ


Why Tech-Act for GIAC Security Essentials (GSEC) Certification?

Tech-Act is a leading and authorized learning partner for IT giants such as CompTIA, EC Council and Pearson Vue and let you pick the pace of your training. In addition, every trainer employed at Tech-Act brings in extensive industry experience.

What are the key benefits of GIAC Security Essentials (GSEC) Certification?

After successful completion of the GIAC Security Essentials (GSEC) Certification, you learn about:

  • Access Control
  • Cyber Defense
  • DNS
  • Disaster Recovery
  • Incident Response
  • Information Security (IS)
  • Malware
  • Network Security
  • Security Policy
  • TCP-IP
  • Vulnerability Management
  • Windows Security
  • Wireless Security
  • Globally recognized
  • Improves professional credibility

Do you have certified trainers onboard?

Yes

What is the eligibility criteria to enroll for GIAC Security Essentials (GSEC) Certification?

No prerequisites as such to take up the GIAC Security Essentials Certification (GSEC). Any professional seeking to hone his/her knowledge about Information Security (IS) can enroll for this training.

GIAC recommends to sit for a practical project to achieve the GSEC certification.

Testimonials



0

Your Cart