GiAC® Security Essentials Certification (GSEC)
Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques.
Course Outline
With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization's network depends on the effectiveness of the organization's defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:
- What is the risk?
- Is it the highest priority risk?
- What is the most cost-effective way to reduce the risk?
Security is all about making sure you focus on the right areas of defense. In SEC401 you will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations.
WHAT YOU'LL LEARN
- To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand
- To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security
- Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work
- Why some organizations are winning and some are losing when it comes to security and, most importantly, how to be on the winning side
- The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND.
OUTLINE
- Chapter 1: Information Security and the GIAC Seuciryt Essentials Certification
- Chapter 2: Networking Fundamentals
- Chapter 3: Network Design
- Chapter 4: Authentication and Access Control
- Chapter 5: Network Security
- Chapter 6: Linux
- Chapter 7: Windows
- Chapter 8: Encryption
- Chapter 9: Risk Management
- Chapter 10: Virtual Machines
- Chapter 11: Vulnerability Control
- Chapter 12: Malware
- Chapter 13: Physical Security
- Chapter 14: Wireless Technologies
- Chapter 15: VoIP
WHO SHOULD ATTEND
Anyone who works in security, is interested in security, or has to understand security should take this course
Training Location
Online Classroom
your office
your city,
your province
your country