GIAC Security Essentials (GSEC) Complete Video Course
Home > Art, Film & Photography > GIAC Security Essentials (GSEC) Complete Video Course: (LiveLessons)
GIAC Security Essentials (GSEC) Complete Video Course: (LiveLessons)

GIAC Security Essentials (GSEC) Complete Video Course: (LiveLessons)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

11+ Hours of Video Instruction GIAC Security Essentials (GSEC) Complete Video Course will provide the learner with everything they need to know for exam success, including all required key security concepts and terminologies, and effective techniques to detect and prevent all known attacks. Overview The GIAC Security Essentials (GSEC) Complete Video Course has been designed to provide the learner with complete exam objective coverage in order to prepare you for exam success! Security is considered one of the top IT fields for this new decade and beyond, and the GSEC exam is an important credential to achieve in order to continue your career advancement in IT security. This course has been organized to align with the objectives of the exam by the presenter, Michael J. Shannon, who is an expert in IT and security, with more than 30 years of experience. Michael has organized the course into 6 Modules: Module 1: Network Security Essentials Module 2: Defense in Depth and Attacks Module 3: Threat Management Module 4: Cryptography, Risk Management, and Response Module 5: Windows Security Essentials Module 6: Linux Security Essentials The course walks you through hands-on demonstrations of security concepts, as well as in-depth explanations and case studies of various security components, including threat & risk management, cryptography, and understanding how to navigate threats in both Windows and Linux operating systems. Michael also provides insight into the tools and utilities available for combatting security threats in each OS in order to prepare you for everything the exam can throw at you to ensure exam success. Skill Level Beginner/Intermediate Learn How To Manage Network Security including Device, Web Communication, and Wireless Network Security Prepare for malicious attacks by implementing active defense strategies Assess threats through vulnerability scanning and managing penetration testing to ensure systems are prepared for attacks. Apply cryptography and risk management strategies Handle incident response and contingency plans Work with tools and utilities Microsoft provides for security Work with services and utilities Linux provides for security Prepare for the GSEC exam with hours of repeatable hands-on demonstrations Prepare for implementing, monitoring, and maintaining enterprise security in the real-world Who Should Take This Course The target audience for this course is anyone who wants to achieve the GIAC Security Essentials (GSEC) certification or learners who simply want to get a foundation in implementing real-world, cutting-edge security solutions on a path to more advanced security administration and engineering skills. Course Requirements Knowledge of information security fundamentals found in the GISF entry-level GIAC security certification or CompTIA Security+ is recommended but not required. Lesson Descriptions Module 1, “Network Security Essentials,” starts with TCP/IP Essentials. The lesson then moves on to critical security controls, access controls, and password management. This lesson also explores network security devices and device security; web communication security based on the Center for Internet Security (CIS), and wireless network security. Module 2, "Defense in Depth and Attacks,” looks at malicious code and exploit mitigation, along with defense in depth and defensible network architecture. Lastly, this lesson covers active defense and implementing endpoint security. Module 3,“Threat Management," discusses log management and SIEM. It then gets into vulnerability scanning, penetration testing, virtualization, and lastly, Cloud Security. Module 4, “Cryptography, Risk Management, and Response,” evaluates cryptography concepts and algorithms, which will then be applied with security policies and procedures. Next, this lesson will cover IT risk management, as well as incident handling and response. Lastly, this lesson will cover several aspects of contingency planning. Module 5, “Windows Security Essentials,” is a hands-on demonstration of Windows security infrastructure; Windows access controls and security policy enforcement; Network services; Azure cloud computing; and Windows Automation, Auditing, and Forensics. Module 6,“Linux Security Essentials,” will also be hands-on demonstrations, but this lesson will cover all things Linux: Linux Security Structure, Permissions and Access, Linux server Hardening and Securing, Monitoring and Attack Detection, and Linux security utilities. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of Contents:
Module 1Network Security Essentials Lesson 1 TCP/IP Essentials Lesson 2 Critical Controls Lesson 3 Access Control & Password Management Lesson 4 Network Security Devices and Device Security Lesson 5 Web Communication Security Lesson 6 Wireless Network Security Module 2Defense in Depth and Attacks Lesson 7 Malicious Code & Exploit Mitigation Lesson 8 Defense in Depth and Defensible Network Architecture Lesson 9 Active Defense Lesson 10 Endpoint Security Module 3Threat Management Lesson 11 Log Management & SIEM Lesson 12 Vulnerability Scanning and Penetration Testing Lesson 13 Virtualization and Cloud Security Module 4Cryptography, Risk Management, and Response Lesson 14 Cryptography Concepts and Algorithms Lesson 15 Applied Cryptography Lesson 16 Security Policy Lesson 17 IT Risk Management Lesson 18 Incident Handling and Response Lesson 19 Contingency Plans Module 5Windows Security Essentials Lesson 20 Windows Security Infrastructure Lesson 21 Windows Access Controls Lesson 22 Enforcing Windows Security Policy Lesson 23 Windows Network Services and Cloud Computing Lesson 24 Windows Automation, Auditing, and Forensics Module 6Linux Security Essentials Lesson 25 Linux Security: Structure, Permissions and Access Lesson 26 Linux Services: Hardening and Securing Lesson 27 Linux: Monitoring and Attack Detection

About the Author :
Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security, and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT, he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, and MindSharp, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He has attained the CISSP, CCNP Security, ITIL 4 Managing Professional, OpenFAIR, GSEC, and Security+ certifications in the security field. His hobbies are playing guitar, songwriting, trading cybercurrencies, and playing golf.


Best Sellers


Product Details
  • ISBN-13: 9780136910480
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson IT Certification
  • Language: English
  • ISBN-10: 0136910483
  • Publisher Date: 05 Nov 2020
  • Binding: Digital online
  • Series Title: LiveLessons


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
GIAC Security Essentials (GSEC) Complete Video Course: (LiveLessons)
Pearson Education (US) -
GIAC Security Essentials (GSEC) Complete Video Course: (LiveLessons)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

GIAC Security Essentials (GSEC) Complete Video Course: (LiveLessons)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!