User log in
User registration
Registrations are open
Click here to register
Email: forgotten email?
Password: lost pass?
  Resend activation email
Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Protect your privacy! Use a VPN When Downloading Torrents
Your IP Address is . Location is .
Your Internet Provider is tracking your torrent activity! Hide your IP ADDRESS with a VPN!
We strongly recommend using Trust.Zone VPN to anonymize your torrenting. It's FREE!
Also, while you are using Tb654192rusa59b29et.m87dc82Zone VPN you get No Ads for Demonoid members Get a59b29eVPN Na59b29eow for FREd772d72Eve5b45a!
Details for O’REILLY | GIAC Security Essentials (GSEC) [FCO]
Created by Ratio: 9.77SaM 2 months ago
Miscellaneous
Lynda and other Courses >>> https://www.freecoursesonline.me/
Forum for discussion >>> https://1hack.us/




Author: Michael J. Shannon
Language: English
Released: September 2020
Duration: 11h 38m
Publisher(s): Pearson IT Certification
ISBN: 0136910513
Skill Level: Beginner/Intermediate
Course Source: https://www.oreilly.com/videos/giac-security-essentials/9780136910510/

Description:

GIAC Security Essentials (GSEC) Complete Video Course will provide the learner with everything they need to know for exam success, including all required key security concepts and terminologies, and effective techniques to detect and prevent all known attacks.

The GIAC Security Essentials (GSEC) Complete Video Course has been designed to provide the learner with complete exam objective coverage in order to prepare you for exam success! Security is considered one of the top IT fields for this new decade and beyond, and the GSEC exam is an important credential to achieve in order to continue your career advancement in IT security. This course has been organized to align with the objectives of the exam by the presenter, Michael J. Shannon, who is an expert in IT and security, with more than 30 years of experience. Michael has organized the course into 6 Modules:
Module 1: Network Security Essentials Module 2: Defense in Depth and Attacks Module 3: Threat Management Module 4: Cryptography, Risk Management, and Response Module 5: Windows Security Essentials Module 6: Linux Security Essentials
The course walks you through hands-on demonstrations of security concepts, as well as in-depth explanations and case studies of various security components, including threat & risk management, cryptography, and understanding how to navigate threats in both Windows and Linux operating systems. Michael also provides insight into the tools and utilities available for combatting security threats in each OS in order to prepare you for everything the exam can throw at you to ensure exam success.

Learn How To:

• Manage Network Security including Device, Web Communication, and Wireless Network Security
• Prepare for malicious attacks by implementing active defense strategies
• Assess threats through vulnerability scanning and managing penetration testing to ensure systems are prepared for attacks.
• Apply cryptography and risk management strategies
• Handle incident response and contingency plans
• Work with tools and utilities Microsoft provides for security
• Work with services and utilities Linux provides for security
• Prepare for the GSEC exam with hours of repeatable hands-on demonstrations
• Prepare for implementing, monitoring, and maintaining enterprise security in the real-world

Who Should Take This Course:

The target audience for this course is anyone who wants to achieve the GIAC Security Essentials (GSEC) certification or learners who simply want to get a foundation in implementing real-world, cutting-edge security solutions on a path to more advanced security administration and engineering skills.

Course Requirements:

Knowledge of information security fundamentals found in the GISF entry-level GIAC security certification or CompTIA Security+ is recommended but not required.

About Instructor:

Michael J. Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990s. He soon began to focus on security, and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT, he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, and MindSharp, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He has attained the CISSP, CCNP Security, ITIL 4 Managing Professional, OpenFAIR, GSEC, and Security+ certifications in the security field. His hobbies are playing guitar, songwriting, trading cybercurrencies, and playing golf.

Facebook Twitter Digg Reddit LinkedIn StumbleUpon Email
Show Demonoid some love with BitCoin: 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk How to get BitCoins?
Peers: 14 seeders, 1 leechers, 379 total - Updated: 2 months ago
Size: 2.89 GB  

Sponsored links
Related torrents
Torrents you may also like:
Download this torrent
Extra information
Tracker: udp://tracker.torrent.eu.org:451/announce
Torrent hash: CD0D4475 14FBA025 6AAFEAC2 5DB825C6 A3470178
Files described inside the torrent: 140 [ Click here to hide the full list ]
[00]. Websites you may like/0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url377 B
[00]. Websites you may like/1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url286 B
[00]. Websites you may like/3. FTUApps.com Download Cracked Developers Applications For Free.url239 B
[00]. Websites you may like/For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url1.82 KB
[00]. Websites you may like/How you can help our Group!.txt204 B
[0] Introduction/[0] GIAC Security Essentials (GSEC)_ Introduction.mp49.40 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[38] Learning objectives.mp42.26 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[39] 8.1 Defense in Depth Overview and Strategies.mp421.20 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[40] 8.2 Core Security Strategies.mp46.47 MB
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture/[41] 8.3 Defensible Network Architectures.mp414.66 MB
[11] Lesson 9_ Active Defense/[42] Learning objectives.mp41.89 MB
[11] Lesson 9_ Active Defense/[43] 9.1 Overview of Active Defense.mp419.11 MB
[11] Lesson 9_ Active Defense/[44] 9.2 Active Defense Techniques.mp418.64 MB
[11] Lesson 9_ Active Defense/[45] 9.3 Active Defense Tools.mp437.00 MB
[12] Lesson 10_ Endpoint Security/[46] Learning objectives.mp42.61 MB
[12] Lesson 10_ Endpoint Security/[47] 10.1 Overview of Endpoint Security.mp424.00 MB
[12] Lesson 10_ Endpoint Security/[48] 10.2 Host-based Intrusion Detection.mp411.92 MB
[12] Lesson 10_ Endpoint Security/[49] 10.3 Host-based Intrusion Prevention.mp414.01 MB
[12] Lesson 10_ Endpoint Security/[50] 10.4 Next-generation Endpoint Security Solutions.mp415.73 MB
[13] Module 3_ Threat Management/[51] Module introduction.mp42.59 MB
[14] Lesson 11_ Log Management & SIEM/[52] Learning objectives.mp42.15 MB
[14] Lesson 11_ Log Management & SIEM/[53] 11.1 Overview of Logging.mp430.21 MB
[14] Lesson 11_ Log Management & SIEM/[54] 11.2 Logging System Setup and Configuration.mp415.64 MB
[14] Lesson 11_ Log Management & SIEM/[55] 11.3 Logging Analysis Fundamentals.mp418.75 MB
[14] Lesson 11_ Log Management & SIEM/[56] 11.4 Core SIEM Activities.mp421.72 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[57] Learning objectives.mp42.62 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[58] 12.1 Overview of Vulnerability Management.mp436.43 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[59] 12.2 Network Scanning.mp442.15 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[60] 12.3 Using Xenmap and Yersinia.mp434.73 MB
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing/[61] 12.4 Penetration Testing.mp455.43 MB
[16] Lesson 13_ Virtualization and Cloud Security/[62] Learning objectives.mp43.05 MB
[16] Lesson 13_ Virtualization and Cloud Security/[63] 13.1 Overview of Virtualization and VM Security.mp427.20 MB
[16] Lesson 13_ Virtualization and Cloud Security/[64] 13.2 Cloud Models and Value Proposition.mp475.61 MB
[16] Lesson 13_ Virtualization and Cloud Security/[65] 13.3 Common Attacks Against Cloud Services.mp432.86 MB
[16] Lesson 13_ Virtualization and Cloud Security/[66] 13.4 Introduction to Microsoft Azure IAM.mp446.62 MB
[17] Module 4_ Cryptography, Risk Management, and Response/[67] Module introduction.mp44.67 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[68] Learning objectives.mp42.53 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[69] 14.1 Overview of Cryptology and Cryptosystems.mp427.34 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[70] 14.2 Cryptographic Hashing.mp427.03 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[71] 14.3 Symmetric Key Cryptography.mp418.38 MB
[18] Lesson 14_ Cryptography Concepts and Algorithms/[72] 14.4 Asymmetric Key Cryptography.mp411.18 MB
[19] Lesson 15_ Applied Cryptography/[73] Learning objectives.mp42.19 MB
[19] Lesson 15_ Applied Cryptography/[74] 15.1 Digital Signatures.mp414.25 MB
[19] Lesson 15_ Applied Cryptography/[75] 15.2 IPsec.mp444.97 MB
[19] Lesson 15_ Applied Cryptography/[76] 15.3 SSLTLS.mp415.68 MB
[19] Lesson 15_ Applied Cryptography/[77] 15.4 Public Key Infrastructure.mp445.27 MB
[1] Module 1_ Network Security Essentials/[1] Module introduction.mp44.74 MB
[20] Lesson 16_ Security Policy/[78] Learning objectives.mp42.80 MB
[20] Lesson 16_ Security Policy/[79] 16.1 The Importance of Written Security Policies.mp418.45 MB
[20] Lesson 16_ Security Policy/[80] 16.2 Standards, Guidelines, and Procedures.mp416.83 MB
[20] Lesson 16_ Security Policy/[81] 16.3 Acceptable Use Policies.mp49.04 MB
[20] Lesson 16_ Security Policy/[82] 16.4 Survey of Sample Policies.mp446.05 MB
[21] Lesson 17_ IT Risk Management/[83] Learning objectives.mp42.16 MB
[21] Lesson 17_ IT Risk Management/[84] 17.1 Overview of Risk Management.mp432.20 MB
[21] Lesson 17_ IT Risk Management/[85] 17.2 Risk Management Best Practices.mp432.38 MB
[21] Lesson 17_ IT Risk Management/[86] 17.3 Threat Assessment, Analysis, and Reporting.mp455.71 MB
[22] Lesson 18_ Incident Handling and Response/[87] Learning objectives.mp42.32 MB
[22] Lesson 18_ Incident Handling and Response/[88] 18.1 Fundamentals of Incident Handling.mp414.97 MB
[22] Lesson 18_ Incident Handling and Response/[89] 18.2 Six Step Incident Response Process.mp432.36 MB
[22] Lesson 18_ Incident Handling and Response/[90] 18.3 Conducting a Forensic Investigation.mp439.72 MB
[23] Lesson 19_ Contingency Plans/[91] Learning objectives.mp42.41 MB
[23] Lesson 19_ Contingency Plans/[92] 19.1 Business Continuity Planning (BCP).mp427.85 MB
[23] Lesson 19_ Contingency Plans/[93] 19.2 Business Impact Analysis (BIA).mp410.94 MB
[23] Lesson 19_ Contingency Plans/[94] 19.3 Backups and Restoration.mp421.73 MB
[23] Lesson 19_ Contingency Plans/[95] 19.4 Disaster Recovery Planning (DRP).mp439.99 MB
[24] Module 5_ Windows Security Essentials/[96] Module introduction.mp43.09 MB
[25] Lesson 20_ Windows Security Infrastructure/[100] 20.3 Windows-as-a-Service.mp421.85 MB
[25] Lesson 20_ Windows Security Infrastructure/[97] Learning objectives.mp42.24 MB
[25] Lesson 20_ Windows Security Infrastructure/[98] 20.1 Operating Systems and Services.mp413.92 MB
[25] Lesson 20_ Windows Security Infrastructure/[99] 20.2 Windows Workgroups vs. Domains.mp426.82 MB
[26] Lesson 21_ Windows Access Controls/[101] Learning objectives.mp42.42 MB
[26] Lesson 21_ Windows Access Controls/[102] 21.1 NTFS and Shared Folder Permissions.mp415.18 MB
[26] Lesson 21_ Windows Access Controls/[103] 21.2 Registry Keys and REGEDIT.EXE.mp412.35 MB
[26] Lesson 21_ Windows Access Controls/[104] 21.3 Windows Privileges.mp418.72 MB
[26] Lesson 21_ Windows Access Controls/[105] 21.4 Overview of BitLocker Drive Encryption.mp418.49 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[106] Learning objectives.mp42.43 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[107] 22.1 Security Templates and SCA Snap-in.mp416.92 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[108] 22.2 Understanding Group Policy Objects.mp413.43 MB
[27] Lesson 22_ Enforcing Windows Security Policy/[109] 22.3 Administrative Users, AppLocker, and User Account Control.mp415.09 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[110] Learning objectives.mp42.40 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[111] 23.1 Azure and High Availability.mp429.46 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[112] 23.2 Configuring Azure VM Attributes.mp425.28 MB
[28] Lesson 23_ Windows Network Services and Cloud Computing/[113] 23.3 Microsoft Azure Active Directory (MAAD).mp435.36 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[114] Learning objectives.mp42.03 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[115] 24.1 Windows PowerShell.mp446.91 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[116] 24.2 Administrative Tools and Utilities.mp447.06 MB
[29] Lesson 24_ Windows Automation, Auditing, and Forensics/[117] 24.3 Windows Auditing and Forensics.mp425.54 MB
[2] Lesson 1_ TCP IP Essentials/[2] Learning objectives.mp43.04 MB
[2] Lesson 1_ TCP IP Essentials/[3] 1.1 Network Protocols and Reference Models.mp430.47 MB
[2] Lesson 1_ TCP IP Essentials/[4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp453.97 MB
[2] Lesson 1_ TCP IP Essentials/[5] 1.3 Layer 4 Protocols.mp454.60 MB
[2] Lesson 1_ TCP IP Essentials/[6] 1.4 Setting up a Lab Environment.mp440.83 MB
[2] Lesson 1_ TCP IP Essentials/[7] 1.5 Using tcpdump and Wireshark.mp426.93 MB
[30] Module 6_ Linux Security Essentials/[118] Module introduction.mp43.10 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[119] Learning objectives.mp42.74 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[120] 25.1 Comparing Linux Operating Systems.mp428.13 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[121] 25.2 Mobile Device Security.mp412.54 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[122] 25.3 Linux Shells and Kernels.mp418.85 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[123] 25.4 Linux Permissions.mp429.35 MB
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access/[124] 25.5 Linux User Accounts.mp426.20 MB
[32] Lesson 26_ Linux Services_ Hardening and Securing/[125] Learning objectives.mp42.51 MB
[32] Lesson 26_ Linux Services_ Hardening and Securing/[126] 26.1 Starting Services at Boot Time.mp432.87 MB
[32] Lesson 26_ Linux Services_ Hardening and Securing/[127] 26.2 Configuration Management Tools.mp417.73 MB
[32] Lesson 26_ Linux Services_ Hardening and Securing/[128] 26.3 Linux Kernel Security.mp428.08 MB
[32] Lesson 26_ Linux Services_ Hardening and Securing/[129] 26.4 Linux System Enhancers.mp422.55 MB
[33] Lesson 27_ Linux_ Monitoring and Attack Detection/[130] Learning objectives.mp42.31 MB
[33] Lesson 27_ Linux_ Monitoring and Attack Detection/[131] 27.1 Configuring and Monitoring Logs.mp423.45 MB
[33] Lesson 27_ Linux_ Monitoring and Attack Detection/[132] 27.2 Leveraging the Auditd tool.mp414.11 MB
[33] Lesson 27_ Linux_ Monitoring and Attack Detection/[133] 27.3 Linux Security Utilities.mp420.28 MB
[34] Summary/[134] GIAC Security Essentials (GSEC)_ Summary.mp46.69 MB
[3] Lesson 2_ Critical Controls/[10] 2.2 Categories and Types of Controls.mp425.76 MB
[3] Lesson 2_ Critical Controls/[11] 2.3 Understanding the Enterprise Architecture.mp45.92 MB
[3] Lesson 2_ Critical Controls/[12] 2.4 Introduction to Threat Enumeration.mp411.10 MB
[3] Lesson 2_ Critical Controls/[8] Learning objectives.mp42.58 MB
[3] Lesson 2_ Critical Controls/[9] 2.1 CIA Triad and Parkerian Hexad.mp410.78 MB
[4] Lesson 3_ Access Control & Password Management/[13] Learning objectives.mp41.90 MB
[4] Lesson 3_ Access Control & Password Management/[14] 3.1 Access Control Concepts.mp485.30 MB
[4] Lesson 3_ Access Control & Password Management/[15] 3.2 Password Management.mp433.58 MB
[4] Lesson 3_ Access Control & Password Management/[16] 3.3 Introduction to Password Cracking.mp440.48 MB
[5] Lesson 4_ Network Security Devices and Device Security/[17] Learning objectives.mp43.69 MB
[5] Lesson 4_ Network Security Devices and Device Security/[18] 4.1 Network Topologies and Zones.mp429.49 MB
[5] Lesson 4_ Network Security Devices and Device Security/[19] 4.2 Overview of Network Devices and Hardening.mp460.00 MB
[5] Lesson 4_ Network Security Devices and Device Security/[20] 4.3 Survey of Security Devices and Wireshark.mp460.20 MB
[5] Lesson 4_ Network Security Devices and Device Security/[21] 4.4 Configuring Firewalls at Amazon Web Services.mp433.17 MB
[5] Lesson 4_ Network Security Devices and Device Security/[22] 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp430.05 MB
[5] Lesson 4_ Network Security Devices and Device Security/[23] 4.6 Examining a Classic IPS Sensor Device.mp425.42 MB
[6] Lesson 5_ Web Communication Security/[24] Learning objectives.mp42.09 MB
[6] Lesson 5_ Web Communication Security/[25] 5.1 Introducing the Center for Internet Security (CIS).mp419.82 MB
[6] Lesson 5_ Web Communication Security/[26] 5.2 Overview of CIS Controls.mp428.25 MB
[6] Lesson 5_ Web Communication Security/[27] 5.3 Samples and Case Studies.mp425.99 MB
[7] Lesson 6_ Wireless Network Security/[28] Learning objectives.mp42.61 MB
[7] Lesson 6_ Wireless Network Security/[29] 6.1 The Evolution of IEEE 802.11 Security.mp462.46 MB
[7] Lesson 6_ Wireless Network Security/[30] 6.2 WPA3 Security.mp413.92 MB
[7] Lesson 6_ Wireless Network Security/[31] 6.3 PAN, NFC, and 5G Concepts.mp415.25 MB
[7] Lesson 6_ Wireless Network Security/[32] 6.4 The Internet of Things (IoT).mp419.99 MB
[8] Module 2_ Defense in Depth and Attacks/[33] Module introduction.mp43.35 MB
[9] Lesson 7_ Malicious Code & Exploit Mitigation/[34] Learning objectives.mp42.08 MB
[9] Lesson 7_ Malicious Code & Exploit Mitigation/[35] 7.1 Common Attack Types.mp471.66 MB
[9] Lesson 7_ Malicious Code & Exploit Mitigation/[36] 7.2 CryptoMalware.mp433.11 MB
[9] Lesson 7_ Malicious Code & Exploit Mitigation/[37] 7.3 Defensive Strategies.mp425.00 MB
Comments
No comments posted yet

Disclaimer: None of the files shown here are actually hosted or transmitted by this server. The links are provided solely by this site's users. The site moderation is also a service provided by the site's users. The administrator of this site (demonoid.is) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

By using this site you indicate your agreement to our terms and conditions
   
Link to us | Contact us | API | Commemoration | Feeds/RSS | DMCA
This site and the Demonoid logo are Copyright © Demonoid. All rights reserved.

Show Demonoid some love with 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk