Companies Home Search Profile

GIAC Security Essentials (GSEC) Online Training

Focused View

Erik Choron

25:28:36

135 View
  • 1. Access Control Fundamentals .mp4
    04:35
  • 2. Boundary Defense .mp4
    06:41
  • 3. Controlled Access Based on Need to Know .mp4
    05:15
  • 4. Limitation and Control of Network Ports .mp4
    05:14
  • 5. Wireless Access Control .mp4
    05:15
  • 6. Secure Configuration for Network Devices .mp4
    09:37
  • 7. Email and Web Browser Protections .mp4
    05:38
  • 8. Account Monitoring and Control .mp4
    04:49
  • 1. Password Management Overview .mp4
    06:17
  • 2. Attacks Against Passwords .mp4
    05:37
  • 3. Hashing Examples with Common Passwords .mp4
    05:14
  • 4. Implementing AAA .mp4
    06:24
  • 5. Windows Password Management .mp4
    07:08
  • 6. Protecting SAM .mp4
    06:25
  • 7. John The Ripper (Hash Suite) .mp4
    09:41
  • 8. Linux Password Management .mp4
    04:03
  • 1. AWS Fundamentals and Security Introduction .mp4
    03:36
  • 2. AWS Identity and Access Management .mp4
    06:13
  • 3. AWS CloudTrail and CloudWatch .mp4
    06:06
  • 4. AWS Inspector and CloudFront .mp4
    06:10
  • 5. AWS Shield .mp4
    09:16
  • 6. AWS Route53 and KMS .mp4
    08:02
  • 7. CloudFlare Overview .mp4
    06:26
  • 1. Containers and MacOS Security Overview .mp4
    03:47
  • 2. Containers (and their security concerns) .mp4
    11:34
  • 3. MacOS .mp4
    10:45
  • 4. MacOS Security (overview) .mp4
    11:00
  • 5. Container and MacOS Review .mp4
    11:07
  • 1. Active Defense Overview .mp4
    02:12
  • 2. Honeypots and Decoys .mp4
    14:19
  • 3. Tripwire .mp4
    11:27
  • 4. Security Through Obscurity .mp4
    11:50
  • 5. nMap and Logging .mp4
    08:44
  • 1. Cryptography Overview .mp4
    06:10
  • 2. Synchronous Crypto .mp4
    08:28
  • 3. Synchronous Crypto Examples .mp4
    11:28
  • 4. Asynchronous Crypto .mp4
    07:34
  • 5. Asynchronous Crypto Example .mp4
    10:33
  • 6. Cryptography Review .mp4
    01:39
  • 1. Cryptography Algorithms & Deployment Overview .mp4
    01:47
  • 2. Synchronous Algorithms .mp4
    08:11
  • 3. Synchronous Algorithms Applications .mp4
    10:36
  • 4. Asynchronous Algorithms .mp4
    04:44
  • 5. Asynchronous Algorithms Applications .mp4
    06:57
  • 1. Data Loss Prevention Overview .mp4
    01:02
  • 2. Data Classification .mp4
    05:48
  • 3. Data Protection -2.mp4
    07:50
  • 4. Prevention at the Perimeter .mp4
    05:20
  • 5. Back ups .mp4
    08:15
  • 6. Regulatory Requirements .mp4
    04:27
  • 7. Data Recovery .mp4
    11:48
  • 8. Virtual Protection .mp4
    03:33
  • 1. Defense in Depth .mp4
    02:11
  • 2. Physical Controls .mp4
    08:31
  • 3. Technical Controls .mp4
    10:51
  • 4. Administrative controls .mp4
    07:29
  • 5. Sandboxing on the Network .mp4
    09:10
  • 6. Sandboxing on the Host .mp4
    07:43
  • Scapy commands.txt
  • 1. Introduction .mp4
    01:38
  • 2. VLAN Structure .mp4
    08:43
  • 3. DMZ Structure .mp4
    07:18
  • 4. Monitoring the Network .mp4
    13:18
  • 5. Honeypot and Honeynet .mp4
    09:32
  • 6. Passive Network Monitoring .mp4
    05:47
  • 1. Introduction .mp4
    00:51
  • 2. Physical Security .mp4
    05:21
  • 3. System Security .mp4
    07:29
  • 4. Security Operation Centers .mp4
    12:42
  • 5. The Different Tiers of SOC Analyst .mp4
    10:16
  • 6. SOC Challenges .mp4
    09:23
  • 1. Introduction .mp4
    01:47
  • 2. Enforcing Domain Membership .mp4
    17:19
  • 3. Group Policy Application .mp4
    09:23
  • 4. Protocol Hardening .mp4
    10:07
  • 5. Standardized Images .mp4
    06:42
  • PowerShell Commands.txt
  • 1. Introducing Kali .mp4
    01:29
  • 2. What is Kali .mp4
    08:36
  • 3. Recon the network .mp4
    15:07
  • 4. Move in for the attack .mp4
    17:49
  • 5. Wrapping Up .mp4
    02:21
  • 1. Introduction .mp4
    01:40
  • 2. Core Definitions .mp4
    08:22
  • 3. Incident detection .mp4
    06:55
  • 4. Speed of the attack .mp4
    08:19
  • 5. Incident Response Policies .mp4
    09:13
  • 6. Incident Response Tools .mp4
    08:46
  • 7. Endpoints .mp4
    01:51
  • 1. Introduction .mp4
    02:40
  • 2. Mobile Device Management .mp4
    10:05
  • 3. Needed Security Features for Mobile Devices .mp4
    09:20
  • 4. Protect the device .mp4
    09:20
  • 5. iPhone Security .mp4
    10:52
  • 6. Android Security .mp4
    02:43
  • 1. Introduction .mp4
    04:21
  • 2. Linux File Systems .mp4
    07:32
  • 3. File permissions .mp4
    11:04
  • 4. Network Settings .mp4
    13:47
  • 5. Talking with other Operating Systems .mp4
    06:26
  • 6. Linux Resources .mp4
    04:25
  • 1. Linux Security and Hardening .mp4
    01:27
  • 2. Network protection with iptables .mp4
    06:46
  • 3. Configuring iptables .mp4
    09:32
  • 4. iptables demonstration .mp4
    12:14
  • 5. shadow and passwd files .mp4
    07:30
  • 6. proc the kernel .mp4
    05:31
  • 7. Using the knowledge to watch a system .mp4
    04:59
  • 1. Introduction .mp4
    01:21
  • 2. Windows logs .mp4
    08:24
  • 3. Capturing Windows Logs remotely .mp4
    15:10
  • 4. Linux logs .mp4
    12:10
  • 5. SIEMs .mp4
    09:00
  • 1. Malicious Code and Exploit Mitigation .mp4
    01:08
  • 2. What is Malicious Code .mp4
    12:11
  • 3. How to Sniff Them Out .mp4
    11:30
  • 4. The Usual Suspects .mp4
    17:44
  • 5. Find the Exploits on Our Own .mp4
    04:14
  • 1. Exploitation Introduction .mp4
    04:33
  • 2. Compare to Known Attacks .mp4
    09:13
  • 3. Threat Scanning and Assessment .mp4
    15:23
  • 4. Looking Around Metasploit .mp4
    10:17
  • 5. Lets Leverage .mp4
    09:07
  • Metasploit.txt
  • 1. Network Security Devices .mp4
    01:07
  • 2. Hardware Security Devices .mp4
    07:27
  • 3. Software Security Devices .mp4
    08:04
  • 4. Network Security Monitoring .mp4
    09:37
  • 5. Looking At The Packets .mp4
    14:50
  • 6. Next Generation Firewalls .mp4
    05:35
  • 1. Networking and Protocols .mp4
    01:22
  • 2. Full Packet Capturing .mp4
    08:21
  • 3. Full Packet Capturing Examples .mp4
    12:57
  • 4. The Flow Of The Packet .mp4
    07:33
  • 5. Applicability To System And Network Security .mp4
    15:47
  • 1. Security Frameworks and CIS Controls .mp4
    04:17
  • 2. Policy .mp4
    08:02
  • 3. Auditing .mp4
    10:58
  • 4. Critical Security Controls - Basic .mp4
    09:30
  • 5. Critical Security Controls Foundational .mp4
    12:17
  • 6. Critical Security Controls Organizational .mp4
    07:43
  • 1. Wireless Network Security .mp4
    01:33
  • 2. Faraday Cages .mp4
    09:36
  • 3. Robbery In Plain Site .mp4
    14:21
  • 4. Weak Encryption .mp4
    15:24
  • 5. Breaking the Wi-Fi .mp4
    05:29
  • 1. Virtualization and Cloud Security .mp4
    00:55
  • 2. Knowing What Virtualization is Being Used .mp4
    06:50
  • 3. Installing and Configuring Hyper-V and VM Workstation .mp4
    16:12
  • 4. Virtualization Can Mess With Inventory .mp4
    05:31
  • 5. Escaping the Machine .mp4
    14:17
  • 6. Virtual Review .mp4
    02:40
  • 1. Vulnerability Scanning and Pen Testing .mp4
    03:31
  • 2. Using nMap to find the Target .mp4
    20:25
  • 3. Installing and Configuring Nessus .mp4
    21:51
  • 4. Scanning with Nessus .mp4
    10:52
  • 1.Web Communication Security .mp4
    00:53
  • 2. The Basics of SSL and TLS .mp4
    12:42
  • 3. Knowing the Traffic .mp4
    12:15
  • 4. Ingredients of a Cookie .mp4
    10:55
  • 5. Local and External Web .mp4
    05:30
  • 6. Secure Traffic Within the Organization .mp4
    06:55
  • 1. Picking the Attack Vector .mp4
    08:52
  • 2. Using Scan Results to Pick the Attack Vector .mp4
    14:09
  • 3. Picking the Attack Tool .mp4
    11:15
  • 4. Presenting Your Findings .mp4
    10:12
  • 5. Review .mp4
    01:20
  • 1. Windows Access Controls .mp4
    03:14
  • 2. Local Security Policy .mp4
    15:18
  • 3. Group Policy .mp4
    14:06
  • 4.Windows Defender .mp4
    11:34
  • 5. Control the CLI .mp4
    08:44
  • 1. Windows as a Service .mp4
    02:56
  • 2. Software as a Service in Windows .mp4
    04:01
  • 3. Platform as a Service in Windows .mp4
    06:03
  • 4. Infrastructure as a Service in Windows .mp4
    04:29
  • 5. Visualize the Service .mp4
    08:45
  • 6. Windows Services .mp4
    12:16
  • 7. Configuring Services in the GPO .mp4
    06:51
  • 1. Windows Security Infrastructure .mp4
    01:36
  • 2. Windows Security .mp4
    16:16
  • 3. Application Control .mp4
    08:26
  • 4. File System Security .mp4
    12:15
  • 5. Register the Security .mp4
    14:19
  • 6. Backup from the Incident .mp4
    06:21
  • 1. Windows Automation, Auditing, and Forensics .mp4
    01:26
  • 2. Automation .mp4
    17:19
  • 3. Auditing .mp4
    10:05
  • 4. Forensics .mp4
    29:49
  • Description


    This intermediate GIAC Security Essentials training prepares security professionals to take the GSEC exam, which is the one required exam to earn the Security Essentials certification.

    The Global Information Assurance Certification is an industry credential IT professionals earn to prove that they’re technically proficient in a specialized field. The GIAC Security Essentials is a broad certification that proves a security professional understands the theory of protecting large networks – but more importantly, it’s a certification that shows they’re proficient in the real-world skills necessary to keep it safe.

    More details


    The GSEC covers tons of different topics, tools and vendors. This GSEC course readies you with a wide set of skills and knowledge that the most advanced security professionals rely on.

    For managers with GIAC products, this GIAC training can be used for GSEC exam prep, onboarding new security professionals, individual or team training plans, or as a GIAC reference resource.

    Security Essentials: What You Need to Know

    This Security Essentials training has videos that cover topics such as:

    • Physical security controls that stop attacks before they begin
    • Interacting with and securing cloud-based network instances
    • Maintaining data security with secured containers
    • Architecting a network that can be monitored effectively
    • Reading, managing and understanding network logs

    Who Should Take Security Essentials Training?

    This Security Essentials training is considered professional-level GIAC training, which means it was designed for security professionals. This cybersecurity skills course is designed for security professionals with three to five years of experience with securing enterprise networks.

    New or aspiring security professionals. If you’re a brand new cybersecurity professional, this GSEC course is an advanced and challenging step in your career. This course covers active defense topics, physical security, cryptography, vulnerability scanning, and much more. If you want to go from a novice to an advanced security expert, this GSEC training is the fast-track to getting there.

    Experienced security professionals. The GSEC is a great certification for cybersecurity professionals with a few years of experience, and this GSEC course will show you everything you need to succeed. Because the GSEC exam covers tons of different technologies and tools for securing enterprise networks, even the most experienced cybersecurity professionals should take this GSEC training so that they understand what will be on the exam.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    Online training allows for the flexibility to learn or better a skill within a timeline and remote environment — that doesn't take away from work or family.

    Erik brings over 20 years of IT experience to his training. He holds nearly 20 IT certifications, the majority of which focus on cybersecurity. Prior to joining CBT Nuggets, he served as a First Sergeant in the U.S. Army. His interest in tech and eventually IT was spurred after receiving a 486 computer from his grandfather and learning Basic and Pascal. When Erik isn't creating training videos, he enjoys spending time with his family, going to professional wrestling events, and doing mechanical work.

    Certifications: Certifications: Certified Ethical Hacker, GIAC Continuous Monitoring Certification (GMON), GIAC Systems and Network Auditor (GSNA), GIAC Critical Controls Certification (GCCC),GIAC Certified Intrusion Analyst (GCIA) - Gold, GIAC Certified Incident Handler (GCIH), GIAC Certified Enterprise Defender (GCED), GIAC Security Essentials (GSEC), Microsoft MCSA: Server 2012, CompTIA Security+, CompTIA Cloud+, CompTIA A+, PMI® Project Management Professional (PMP)

    Areas of expertise: Digital forensics and cyber defense

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 186
    • duration 25:28:36
    • Release Date 2023/05/17