Autoplay
Autocomplete
Previous Lesson
Complete and Continue
GIAC Security Essentials Certification (GSEC)
Training Overview
Description of Training
Video Overview (0:35)
Introduction
Introduction (0:35)
Your Instructor (2:01)
GSEC Exam (4:33)
Course Outline (6:16)
Course Materials
Build GSEC Lab
Lab Requirement (1:51)
Download the requirement (10:04)
Setup the Lab Part 1 (8:32)
Setup your Lab Part 2 (4:51)
Setup the Lab Part 3 (10:01)
Setup the Lab Part 4 (5:41)
Networking Concepts
Introduction (1:55)
Network Basics (12:07)
Internet Protocol – IP (16:12)
OSI Model Part 1 (14:42)
OSI Model Part 2 (14:14)
TCPIP Model (2:49)
Default Gateway (7:10)
Networking Concepts Demonstration (11:47)
Network Architecture Components (17:09)
Types of Network (5:12)
TCP Commands (9:02)
Defense in Depth
Defense in Depth (4:16)
Important Definitions Part 1 (12:28)
Important Definitions Part 2 (4:42)
Compliance (8:50)
Due Care and Due Diligence (8:42)
Security Documents (15:35)
The Relationship Between Security Document Types (3:08)
Security Document Types (5:17)
Policy Sample (3:14)
Access Control (6:43)
Authorization (19:22)
Authentication (18:50)
Single Sign on SSO (12:59)
Access Control Attack (1:43)
Password Hacking Techniques (8:43)
Default Password (5:28)
Important tool 2 (14:32)
Cain in Action (18:22)
Xhydra (7:33)
Ncrack (8:44)
Web Application Vulnerability (0:58)
DVWA (9:14)
Hackthissite (3:11)
What is SQL Injection (14:09)
SQL Injection Attack 1 (7:57)
SQL Injection Attack 2 (14:06)
XSS Introduction (3:03)
Reflected XSS (12:43)
Stored XSS (5:18)
Major Web Application Vulnerabilities (3:06)
Internet Security Technologies
Introduction (3:11)
Introduction to Malware (5:16)
Types of Malware (10:11)
Create a Virus (6:25)
Creating a Virus Using a Tool (2:44)
Can I Bypass the AV (4:25)
Introduction to Denail of Service (13:30)
Denial of Service Attack Demonstration 1 (11:01)
Denial of Service Attack Demonstration 2 (9:14)
Denial of Service Attack Demonstration 3 (6:49)
What is Buffer Overflow (5:32)
How to search for Buffer Overflow (14:09)
Buffer Overflow Part 1 (48:31)
Buffer Overflow Part 2 (16:37)
Buffer Overflow Part 3 (26:09)
IDS, Firewalls, Honeypots (2:45)
Honeypots (10:12)
Firewalls (12:06)
Intrusion Detection System - IDS (4:22)
What is Social Engineering - (5:28)
Fake Email - Spoofing (6:17)
Social Engineering Toolkit (4:45)
Phishing Credential Harvest (13:16)
Advanced Social engineering technique (19:03)
Network Scanning Overview (5:21)
Important Scanning Definition (13:18)
Network Scanning Methodology (2:55)
Identifying Live System (6:40)
Port Scanning (9:29)
Advanced Scanning Techniques (7:23)
OS Security
Introduction (3:53)
Securing Passwords (9:23)
Securing Operating Systems (9:34)
Firewalls (10:56)
Securing Network Switches (8:51)
Securing Network Routers (7:46)
Securing Wireless Networks (9:28)
IDS, IPS, and Honeypots (10:56)
Antiviruses (9:03)
OS Security (1:11)
Encryption (5:12)
Physical Security (7:08)
Securing Wireless Networks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock