GSEC Certification -Security Essentials – Mohamed Atef
Original price was: $120.00.$21.00Current price is: $21.00.
GSEC Certification -Security Essentials – Mohamed Atef has the same quality as the author’s salapage. Take The Next Step in Information Security Career With GSEC Certification
Salepage link: At HERE. Archive: http://archive.is/wip/1LtRH
GSEC Certification – Security Essentials
Take The Next Step in Information Security Career With GSEC Certification
Course Curriculum
Introduction
- 0. Introduction (0:35)
- 1. Your Instructor (2:00)
- 2.GSEC Exam (4:33)t
- 3. Course Ouline (6:16)
- How to get the course materials and access to the students portal (3:28)
Build GSEC lab
- 4.Lab Requirement (1:51)
- 5.Download the requirement (10:04)
- 6.Setup the Lab Part 1 (8:32)
- 7.Setup the lab Part 2 (4:51)
- 8.Setup the lab Part 3 (10:01)
- 9.Setup the lab Part 4 (5:41)
Networking Concepts
- 10.Introduction (1:55)
- 11.Network Basics (12:07)
- 12.Internet Protocol – IP (16:12)
- 13.OSI Model Part 1 (14:42)
- 14.OSI Model Part 2 (14:14)
- 15. TCPIP Model (2:49)
- 16.Default Gateway (7:10)
- 17.Demonstration (11:47)
- 18.Network Architecture Components (17:09)
- 19.Types of Network (5:12)
- 20.TCP Commands (9:02)
- 21.Resources 2 (1:10)
Defense in Depth
- 22.Defense in Depth (4:16)
- 23.Important Definitions Part 1 (12:28)
- 24. Important Definitions Part 2 (4:42)
- 26.Compliance (8:50)
- 25.Due Care and Due Diligence (8:42)
- 27.Security Documents (15:35)
- 30.The Relationship Between Security Document Types (3:08)
- 28.Security Document Types (5:17)
- 29. Policy Sample (3:14)
- 30.The Relationship Between Security Document Types (3:08)
- 31.Access Control (6:43)
- 32.Authorization (19:22)
- 33.Authentication (18:50)
- 34. Single Sign on SSO (12:59)
- 35.Access Control Attack (1:43)
- 36.Password Hacking techniques (8:43)
- 37.Default Password (5:28)
- 38.Important tool 2 (14:33)
- 39.Cain in Action (18:22)
- 40.Xhydra (7:33)
- 41.Ncrack (8:44)
- 42. Web application vulnerability (0:58)
- 43. DVWA (9:14)
- 44.Hackthissite (3:11)
- What is SQL Injection (14:09)
- SQL Injection attack 1 (7:57)
- 47. SQL Injection attack 2 (14:06)
- 48. XSS Introduction (3:03)
- 49. Reflected XSS (12:43)
- 50.Stored XSS (5:18)
- 51.Major Web Application vulnerabilities (3:06)
Internet Security Technologies
- 52.Introduction (3:11)
- 53..Introduction to Maleware (5:16)
- 54.Types of Malware (10:11)
- 55.Create a virus (6:25)
- 56.Creating a Virus using a Tool (2:44)
- 57.Can I Bypass the AV (4:25)
- 58.Introduction to Denail of Service (13:30)
- 59.Denial of Service Attack Demonstration 1 (11:01)
- 60.Denial of Service Attack Demonstration 2 (9:14)
- 61.Denial of Service Attack Demonstration 3 (6:49)
- 62.What is Buffer Overflow (5:32)
- 63.How to search for Buffer Overflow (14:09)
- 64.Buffer Overflow Part 1 (48:31)
- 65.Buffer Overflow Part 2 (16:37)
- 66. Buffer Overflow Part 3 (26:09)
- 67.IDS, Firewalls, Honeypots (2:45)
- 68.Honeypots (10:12)
- 69.Firewalls (12:06)
- 70..Intrusion Detection System – IDS (4:22)
- 71. What is Social Engineering – (5:28)
- 72.Fake Email – Spoofing (6:17)
- 73.Social Engineering Toolkit (4:45)
- 74.Phising Credential Harvest – (13:16)
- 75.Advanced Social engineering technique (19:03)
- 76.Network Scanning Overview (5:21)
- 77.Important Scanning Defination (13:19)
- 79.Network Scanning Methology (2:55)
- 80.Identifying Live system (6:40)
- 81.Port Scanning (9:29)
- 82.Advanced Scanning Techniques (7:23)
OS Security
- 1. Introduction (3:53)
- 1. Securing Passwords 2 (9:23)
- 2. Securing Operating Systems 2 (9:34)
- 3. Firewalls 2 (10:56)
- 4. Securing Network Switches 2 (8:51)
- 5. Securing Network Routers 2 (7:46)
- 6. Securing Wireless Networks 2 (9:28)
- 7. IDS, IPS, and Honeypots 2 (10:56)
- 8. Antiviruses 2 (9:03)
- 83.OS Security (1:11)
- 9. Encryption 2 (5:12)
- 10. Physical Security 2 (7:08)
.rTable { display: table; width: 100%;}
.rTableRow { display: table-row; }
.rTableHeading { background-color: #ddd; display: table-header-group; }
.rTableCell, .rTableHead { display: table-cell; padding: 3px 10px; border: 1px solid #999999; }
.rTableHeading { display: table-header-group; background-color: #ddd; font-weight: bold; }
.rTableFoot { display: table-footer-group; font-weight: bold; background-color: #ddd; }
.rTableBody { display: table-row-group; }
Here's an overview of the prominent keywords and a list of famous authors:
Business and Sales: Explore business strategies, sales skills, entrepreneurship, and brand-building from authors like Joe Wicks, Jillian Michaels, and Tony Horton.
Sports and Fitness: Enhance athleticism, improve health and fitness with guidance from experts like Shaun T, Kayla Itsines, and Yoga with Adriene.
Personal Development: Develop communication skills, time management, creative thinking, and enhance self-awareness from authors like Gretchen Rubin, Simon Sinek, and Marie Kondo.
Technology and Coding: Learn about artificial intelligence, data analytics, programming, and blockchain technology from thought leaders like Neil deGrasse Tyson, Amy Cuddy, and Malcolm Gladwell.
Lifestyle and Wellness: Discover courses on holistic health, yoga, and healthy living from authors like Elizabeth Gilbert, Bill Nye, and Tracy Anderson.
Art and Creativity: Explore the world of art, creativity, and painting with guidance from renowned artists like Bob Ross and others.
All the courses on WSOlib are led by top authors and experts in their respective fields. Rest assured that the knowledge and skills you acquire are reliable and highly applicable.
Specification: GSEC Certification -Security Essentials – Mohamed Atef
|
User Reviews
Only logged in customers who have purchased this product may leave a review.
Original price was: $120.00.$21.00Current price is: $21.00.
There are no reviews yet.