GIAC Security Essentials GSEC Training Course

  • Designed for results
  • World-class experts
  • Flexible online learning

Overview

Advance your career in IT security with this video-based, online, certification training course. Upon completion of this self-paced course, you’ll be fully prepared to take the GIAC Security Essentials exam to earn your GSEC certification. The 11 hours of expert-led lessons included in this course cover every objective on the exam. You’ll also get flashcards and quizzes to maximize learning, and 2 sample tests to practice taking the exam. Through the guided labs provided, you’ll build real-world, hands-on experience combating security threats.

Who should take this course

Skill level | Beginner to intermediate

  • Anyone preparing for the GIAC Security Essentials exam to become GSEC certified
  • Anyone eager to learn security solutions implementation on a path to more advanced security administration and engineering skills
  • Anyone looking for techniques to detect and prevent cybersecurity attacks

It is recommended, but not required, that candidates for this course have the knowledge of information security fundamentals offered by the CompTIA Security+ training course

For an optimal course experience, we recommend using these browsers and devices.

Course includes

  • 11 hours of expert-led training videos to watch and learn at your own pace
  • Hands-on labs to simulate real-world experience combating security threats
  • Self-study tools, such as flashcards to master key terms and quizzes to self-assess your progress
  • 2 complete practice tests to ensure you’re ready to take the GSEC exam with confidence
  • 1 year of access*

What you'll learn

This Pearson IT Training Course will help you master the skills tested on the GSEC exam, including but not limited to:

  • Managing network security, including device, web communication, and wireless network security
  • Preparing for malicious attacks by implementing active defense strategies
  • Assessing threats through vulnerability scanning and managing penetration testing to ensure systems are prepared for attacks
  • Applying cryptography and risk management strategies
  • Handling incident response and contingency plans
  • Working with the tools and utilities Microsoft Windows provides for security
  • Working with the services and utilities Linux provides for security
  • Implementing, monitoring, and maintaining enterprise security in the real world

*Retake guarantee

Retake guaranteeDidn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.

About Pearson IT Training Courses

Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.

From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Course expert

  • Michael J. Shannon - Author, IT specialist, and technical instructor

    Michael J. Shannon

    Michael J. Shannon possesses years of IT experience, numerous publications under his belt, and a wealth of expertise teaching in the field. Throughout his 30 years in IT he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, and MindSharp, among others. Mr. Shannon has authored several books, training manuals, published articles, and CBT modules over the years as well. He has attained the CCNP Security, CISSP, ITIL Intermediate SO and RCV, and Security+ certifications in the security field. He is a technical instructor for Skillsoft Corp. specializing in all things security.

Course outline

  • Introduction
  • Module introduction
  • Lesson 1: TCP/IP Essentials
    • Learning objectives
    • 1.1 Network Protocols and Reference Models
    • 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6
    • 1.3 Layer 4 Protocols
    • 1.4 Setting up a Lab Environment
    • 1.5 Using tcpdump and Wireshark
    • Lab: Capturing a Packet Using Wireshark
    • Lesson 1: Flashcards
    • Lesson 1: Quiz
  • Lesson 2: Critical Controls
    • Learning objectives
    • 2.1 CIA Triad and Parkerian Hexad
    • 2.2 Categories and Types of Controls
    • 2.3 Understanding the Enterprise Architecture
    • 2.4 Introduction to Threat Enumeration
    • Lesson 2: Flashcards
    • Lesson 2: Quiz
  • Lesson 3: Access Control & Password Management
    • Learning objectives
    • 3.1 Access Control Concepts
    • 3.2 Password Management
    • 3.3 Introduction to Password Cracking
    • Lab: Using the John the Ripper Tool
    • Lab: Performing the Intense Scan in Zenmap
    • Lesson 3: Flashcards
    • Lesson 3: Quiz
  • Lesson 4: Network Security Devices and Device Security
    • Learning objectives
    • 4.1 Network Topologies and Zones
    • 4.2 Overview of Network Devices and Hardening
    • 4.3 Survey of Security Devices and Wireshark
    • 4.4 Configuring Firewalls at Amazon Web Services
    • Lab: Creating a Network ACL and Adding Inbound and Outbound Rules to It
    • Lab: Creating a Web ACL
    • 4.5 Exploring a Palo Alto Networks Next-Generation Firewall
    • 4.6 Examining a Classic IPS Sensor Device
    • Lesson 4: Flashcards
    • Lesson 4: Quiz
  • Lesson 5: Web Communication Security
    • Learning objectives
    • 5.1 Introducing the Center for Internet Security (CIS)
    • 5.2 Overview of CIS Controls
    • 5.3 Samples and Case Studies
    • Lesson 5: Flashcards
    • Lesson 5: Quiz
  • Lesson 6: Wireless Network Security
    • Learning objectives
    • 6.1 The Evolution of IEEE 802.11 Security
    • 6.2 WPA3 Security
    • 6.3 PAN, NFC, and 5G Concepts
    • 6.4 The Internet of Things (IoT)
    • Lab: Creating a Security Profile
    • Lesson 6: Flashcards
    • Lesson 6 : Quiz
  • Module introduction
  • Lesson 7: Malicious Code & Exploit Mitigation
    • Learning objectives
    • 7.1 Common Attack Types
    • 7.2 CryptoMalware
    • 7.3 Defensive Strategies
    • Lesson 7: Flashcards
    • Lesson 7: Quiz
  • Lesson 8: Defense in Depth and Defensible Network Architecture
    • Learning objectives
    • 8.1 Defense in Depth Overview and Strategies
    • 8.2 Core Security Strategies
    • 8.3 Defensible Network Architectures
    • Lesson 8: Flashcards
    • Lesson 8: Quiz
  • Lesson 9: Active Defense
    • Learning objectives
    • 9.1 Overview of Active Defense
    • 9.2 Active Defense Techniques
    • Lab: Creating Reverse and Bind Shells using Netcat
    • Lab: Setting up a Honeypot on Kali Linux
    • 9.3 Active Defense Tools
    • Lesson 9: Flashcards
    • Lesson 9: Quiz
  • Lesson 10: Endpoint Security
    • Learning objectives
    • 10.1 Overview of Endpoint Security
    • 10.2 Host-based Intrusion Detection
    • 10.3 Host-based Intrusion Prevention
    • Lab: Enabling Intrusion Prevention and Detection
    • 10.4 Next-generation Endpoint Security Solutions
    • Lesson 10: Flashcards
    • Lesson 10: Quiz
  • Module introduction
  • Lesson 11: Log Management & SIEM
    • Learning objectives
    • 11.1 Overview of Logging
    • 11.2 Logging System Setup and Configuration
    • 11.3 Logging Analysis Fundamentals
    • 11.4 Core SIEM Activities
    • Lesson 11: Flashcards
    • Lesson 11: Quiz
  • Lesson 12: Vulnerability Scanning and Penetration Testing
    • Learning objectives
    • 12.1 Overview of Vulnerability Management
    • 12.2 Network Scanning
    • 12.3 Using Xenmap and Yersinia
    • Lab: Using OWASP ZAP
    • 12.4 Penetration Testing
    • Lesson 12: Flashcards
    • Lesson 12: Quiz
  • Lesson 13: Virtualization and Cloud Security
    • Learning objectives
    • 13.1 Overview of Virtualization and VM Security
    • 13.2 Cloud Models and Value Proposition
    • 13.3 Common Attacks Against Cloud Services
    • 13.4 Introduction to Microsoft Azure IAM
    • Lesson 13: Flashcards
    • Lesson 13: Quiz
  • Module introduction
  • Lesson 14: Cryptography Concepts and Algorithms
    • Learning objectives
    • 14.1 Overview of Cryptology and Cryptosystems
    • 14.2 Cryptographic Hashing
    • Lab: Observing an MD5 Generated Hash Value
    • Lab: Observing a SHA256 Generated Hash Value
    • 14.3 Symmetric Key Cryptography
    • Lab: Using a Symmetric Algorithm
    • 14.4 Asymmetric Key Cryptography
    • Lab: Using an Asymmetric Algorithm
    • Lesson 14: Flashcards
    • Lesson 14: Quiz
  • Lesson 15: Applied Cryptography
    • Learning objectives
    • 15.1 Digital Signatures
    • Lab: Creating and Disabling an AWS KMS Key
    • 15.2 IPsec
    • Lab: Creating a VPN Connection Using the AWS-Managed VPN Option
    • 15.3 SSL/TLS
    • 15.4 Public Key Infrastructure
    • Lesson 15: Flashcards
    • Lesson 15: Quiz
  • Lesson 16: Security Policy
    • Learning objectives
    • 16.1 The Importance of Written Security Policies
    • 16.2 Standards, Guidelines, and Procedures
    • 16.3 Acceptable Use Policies
    • 16.4 Survey of Sample Policies
    • Lesson 16: Flashcards
    • Lesson 16: Quiz
  • Lesson 17: IT Risk Management
    • Learning objectives
    • 17.1 Overview of Risk Management
    • 17.2 Risk Management Best Practices
    • 17.3 Threat Assessment, Analysis, and Reporting
    • Lab: Using Nmap for Network Enumeration
    • Lesson 17: Flashcards
    • Lesson 17: Quiz
  • Lesson 18: Incident Handling and Response
    • Learning objectives
    • 18.1 Fundamentals of Incident Handling
    • 18.2 Six Step Incident Response Process
    • 18.3 Conducting a Forensic Investigation
    • Lesson 18: Flashcards
    • Lesson 18: Quiz
  • Lesson 19: Contingency Plans
    • Learning objectives
    • 19.1 Business Continuity Planning (BCP)
    • 19.2 Business Impact Analysis (BIA)
    • 19.3 Backups and Restoration
    • 19.4 Disaster Recovery Planning (DRP)
    • Lesson 19: Flashcards
    • Lesson 19: Quiz
  • Module introduction
  • Lesson 20: Windows Security Infrastructure
    • Learning objectives
    • 20.1 Operating Systems and Services
    • 20.2 Windows Workgroups vs. Domains
    • Lab: Using the whois Program
    • Lab: Disabling a User Account
    • 20.3 Windows-as-a-Service
    • Lesson 20: Flashcards
    • Lesson 20: Quiz
  • Lesson 21: Windows Access Controls
    • Learning objectives
    • 21.1 NTFS and Shared Folder Permissions
    • Lab: Managing NTFS Permissions
    • 21.2 Registry Keys and REGEDIT.EXE
    • Lab: Enabling Credential Guard Using Regedit
    • 21.3 Windows Privileges
    • Lab: Setting Security Policies
    • 21.4 Overview of BitLocker Drive Encryption
    • Lab: Using BitLocker in Windows 10
    • Lesson 21: Flashcards
    • Lesson 21: Quiz
  • Lesson 22: Enforcing Windows Security Policy
    • Learning objectives
    • 22.1 Security Templates and SCA Snap-in
    • 22.2 Understanding Group Policy Objects
    • 22.3 Administrative Users, AppLocker, and User Account Control
    • Lab: Creating an AppLocker Rule
    • Lesson 22: Flashcards
    • Lesson 22: Quiz
  • Lesson 23: Windows Network Services and Cloud Computing
    • Learning objectives
    • 23.1 Azure and High Availability
    • Lab: Configuring a High Availability Set
    • 23.2 Configuring Azure VM Attributes
    • Lab: Creating a Virtual Machine in Azure
    • 23.3 Microsoft Azure Active Directory (MAAD)
    • Lesson 23: Flashcards
    • Lesson 23: Quiz
  • Lesson 24: Windows Automation, Auditing, and Forensics
    • Learning objectives
    • 24.1 Windows PowerShell
    • Lab: Investigating the Windows PowerShell Pipeline
    • 24.2 Administrative Tools and Utilities
    • Lab: Configuring an Application using Task Manager
    • Lab: Using Event Viewer
    • 24.3 Windows Auditing and Forensics
    • Lesson 24: Flashcards
    • Lesson 24: Quiz
  • Module introduction
  • Lesson 25: Linux Security: Structure, Permissions and Access
    • Learning objectives
    • 25.1 Comparing Linux Operating Systems
    • Lab: Using Amazon EC2
    • 25.2 Mobile Device Security
    • 25.3 Linux Shells and Kernels
    • 25.4 Linux Permissions
    • Lab: Managing Basic Permissions
    • Lab: Understanding SUID or SGID and Unix Program
    • 25.5 Linux User Accounts
    • Lesson 25: Flashcards
    • Lesson 25: Quiz
  • Lesson 26: Linux Services: Hardening and Securing
    • Learning objectives
    • 26.1 Starting Services at Boot Time
    • 26.2 Configuration Management Tools
    • 26.3 Linux Kernel Security
    • Lab: Administering Kernel Security Parameters
    • 26.4 Linux System Enhancers
    • Lesson 26: Flashcards
    • Lesson 26: Quiz
  • Lesson 27: Linux: Monitoring and Attack Detection
    • Learning objectives
    • 27.1 Configuring and Monitoring Logs
    • 27.2 Leveraging the Auditd tool
    • 27.3 Linux Security Utilities
    • Lab: Configuring a Linux Firewall Using the Iptables
    • Lab: Using Linux Commands
    • Lab: Monitoring Logs in Linux
    • Lesson 27: Flashcards
    • Lesson 27: Quiz
  • Summary
Add to cart form
$250

Everything you need

  • Video-based lessons (11 hours)
  • Interactive lab exercises
  • Self-study quizzes
  • Practice tests
  • 1-year access

Course experts

Recommended for you

GIAC Security Essentials GSEC Training Course

$250.00