GSEC Certification – Security Essentials – Mohamed Atef

5,478.00

GSEC Certification – Security EssentialsTake The Next Step in Information Security Career With GSEC CertificationCourse CurriculumIntroduction0. Introduction (0:35)1. Your Instructor (2:00)2.GSEC Exam (4:33)t3. Course Ouline (6:16)How to get the course materials and access to the students portal (3:28)Build GSEC lab4.Lab Requirement (1:51)5.Download the requirement (10:04)6.Setup the Lab Part 1 (8:32)7.Setup the lab Part 2 (4:51)8.Setup the lab Part 3 (10:01)9.Setup the lab Part 4 (5:41)Networking Concepts10.Introduction (1:55)11.Network Basics (12:07)12.Internet Protocol – IP (16:12)13.OSI Model Part 1 (14:42)14.OSI Model Part 2 (14:14)15. TCPIP Model (2:49)16.Default Gateway (7:10)17.Demonstration (11:47)18.Network Architecture Components (17:09)19.Types of Network (5:12)20.TCP Commands (9:02)21.Resources 2 (1:10)Defense in Depth22.Defense in Depth (4:16)23.Important Definitions Part 1 (12:28)24. Important Definitions Part 2 (4:42)26.Compliance (8:50)25.Due Care and Due Diligence (8:42)27.Security Documents (15:35)30.The Relationship Between Security Document Types (3:08)28.Security Document Types (5:17)29. Policy Sample (3:14)30.The Relationship Between Security Document Types (3:08)31.Access Control (6:43)32.Authorization (19:22)33.Authentication (18:50)34. Single Sign on SSO (12:59)35.Access Control Attack (1:43)36.Password Hacking techniques (8:43)37.Default Password (5:28)38.Important tool 2 (14:33)39.Cain in Action (18:22)40.Xhydra (7:33)41.Ncrack (8:44)42. Web application vulnerability (0:58)43. DVWA (9:14)44.Hackthissite (3:11)What is SQL Injection (14:09)SQL Injection attack 1 (7:57)47. SQL Injection attack 2 (14:06)48. XSS Introduction (3:03)49. Reflected XSS (12:43)50.Stored XSS (5:18)51.Major Web Application vulnerabilities (3:06)Internet Security Technologies52.Introduction (3:11)53..Introduction to Maleware (5:16)54.Types of Malware (10:11)55.Create a virus (6:25)56.Creating a Virus using a Tool (2:44)57.Can I Bypass the AV (4:25)58.Introduction to Denail of Service (13:30)59.Denial of Service Attack Demonstration 1 (11:01)60.Denial of Service Attack Demonstration 2 (9:14)61.Denial of Service Attack Demonstration 3 (6:49)62.What is Buffer Overflow (5:32)63.How to search for Buffer Overflow (14:09)64.Buffer Overflow Part 1 (48:31)65.Buffer Overflow Part 2 (16:37)66. Buffer Overflow Part 3 (26:09)67.IDS, Firewalls, Honeypots (2:45)68.Honeypots (10:12)69.Firewalls (12:06)70..Intrusion Detection System – IDS (4:22)71. What is Social Engineering – (5:28)72.Fake Email – Spoofing (6:17)73.Social Engineering Toolkit (4:45)74.Phising Credential Harvest – (13:16)75.Advanced Social engineering technique (19:03)76.Network Scanning Overview (5:21)77.Important Scanning Defination (13:19)79.Network Scanning Methology (2:55)80.Identifying Live system (6:40)81.Port Scanning (9:29)82.Advanced Scanning Techniques (7:23)OS Security1. Introduction (3:53)1. Securing Passwords 2 (9:23)2. Securing Operating Systems 2 (9:34)3. Firewalls 2 (10:56)4. Securing Network Switches 2 (8:51)5. Securing Network Routers 2 (7:46)6. Securing Wireless Networks 2 (9:28)7. IDS, IPS, and Honeypots 2 (10:56)8. Antiviruses 2 (9:03)83.OS Security (1:11)9. Encryption 2 (5:12)10. Physical Security 2 (7:08)Get GSEC Certification – Security Essentials – Mohamed Atef, Only Price $37Tag: GSEC Certification – Security Essentials – Mohamed Atef Review. GSEC Certification – Security Essentials – Mohamed Atef download. GSEC Certification – Security Essentials – Mohamed Atef discount.