Gsec Overview

This certification course will validate a practitioner knowledge of information security beyond simple terminology and concepts. GSEC certification holders are demonstrating that they are qualified for hands-on IT systems roles with respect to security tasks.

The following topics will be mainly covered

  • Depth knowledge in active defense, access control & password management
  • Basic concepts of cryptography, algorithms and deployment, and application
  • Defensible network architecture, networking & protocols, and network security
  • Handling of Incident & its response, vulnerability scanning and penetration testing
  • Security policy, contingency plans, critical controls and IT risk management
  • Web communication security, virtualization and cloud security, and endpoint security
  • Windows: access controls, automation, auditing, forensics, security infrastructure, & securing network services
  • Linux security: structure, permissions, & access; hardening & securing; monitoring & attack detection; & security utilities

Audience

  • Anyone new to information security who has some background in information systems & networking
  • Security professionals
  • Security managers
  • Operations personnel
  • IT engineers and supervisors
  • Security administrators
  • Forensic analysts
  • Penetration testers
  • Auditors

Giac security Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : 1,500 (Includes Taxes) 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)








Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients. Click here

Enquire Now

Course Prerequisites

  • A basic understanding of technology, networks, and security.
  • Recommended to finish certification in Introduction to Cyber Security, however this is not a prerequisite but it will provide the introductory knowledge

Upon completion of this course, you will be able to accomplish:

  • Knowing of how to apply what you learn directly to your job when you go back to work
  • Knowing how to design and build a network architecture by using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
  • To run Windows command line tools to analyse a system looking for high-risk items
  • Utilizing of Linux command line tools and basic scripting to automate the running of programs to perform continuous monitoring of systems
  • Creating an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
  • To Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, configure the system to be more secure
  • Building a map on network visibility which can be used for hardening of a network - validating the attack surface and determining the best methodology to reduce the attack surface through hardening and patching
  • To sniff network communication protocols and to determine the content of network communication (including unprotected access credentials), by using of tools such as tcpdump and Wireshark.