Date: 12/02/2024 - 12/06/2024 (Monday - Friday) | 8:30 AM - 4:30 PM (EST)
Location: ONLINE (Virtual Classroom Live)
Delivery Format: VIRTUAL CLASSROOM LIVE
Request Quote & Enroll
GSEC - GIAC Security Essentials Certification
GSEC - GIAC Security Essentials Certification Course Details:
With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization's network depends on the effectiveness of the organization's defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:
- What is the risk?
- Is it the highest priority risk?
- What is the most cost-effective way to reduce the risk?
Security is all about making sure you focus on the right areas of defense. You will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations.
This Course Supports a DoD Approved 8570 Baseline Certification and meets: DoD Directive 8140 / 8570.01-M IT Training Requirements.
Date: 03/17/2025 - 03/21/2025 (Monday - Friday) | 8:30 AM - 4:30 PM (EDT)
Location: ONLINE (Virtual Classroom Live)
Delivery Format: VIRTUAL CLASSROOM LIVE
Request Quote & Enroll
Chapter 1: Information Security and the GIAC Seuciryt Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Network Security
Chapter 6: Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Physical Security
Chapter 14: Wireless Technologies
Chapter 15: VoIP
*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand
To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security
Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work
Why some organizations are winning and some are losing when it comes to security and, most importantly, how to be on the winning side
The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND.
Anyone who works in security, is interested in security, or has to understand security should take this course