O'Reilly logo
live online training icon Live Online training

GIAC GSEC Crash Course

Pass the GIAC Security Essentials (GSEC) exam

Topic: Security
Michael Shannon

This live and interactive training is designed to help you prepare for the GIAC certification exam.

In this training we will review:

  • Key topics and methodologies that you need to master the GSEC exam objectives
  • Step by step deep dives and examples for security concepts and terminologies
  • Clear and concise explanations on tools and techniques used to detect and prevent attacks required by GIAC.
  • Sample questions for each of the topics covered in the exam

This Crash Course is the perfect way to learn what’s on the exam and to gauge your skills.

What you'll learn-and how you can apply it

  • Review every main topic of the exam material
  • Get visibility into the terminology, technology, and tools required to pass the exam
  • Learn best practices and strategies for first time success

This training course is for you because...

  • You need to learn about security beyond the Security+ level and in a more practical way than CISSP knowledge which is demanded by GIAC
  • You want to improve the chances of passing the GSEC on the first attempt
  • You are considering an advanced career in security and desire to follow other certifications in the GIAC path

Prerequisites

  • Knowledge of information security fundamentals found in the GISF entry-level GIAC security certification or CompTIA Security+ is recommended but not required.

Materials, downloads, or Supplemental Content needed in advance

  • The student should download Kali Linux installed in a Type 2 Hypervisor product such as VirtualBox to prepare for the exam. You can find out how to do that here: https://learning.oreilly.com/videos/the-art-of/9780135767849/9780135767849-SPTT_02_01>

About your instructor

  • Michael J Shannon began his IT career when he transitioned from recording studio engineer to network technician for a major telecommunications company in the early 1990’s. He soon began to focus on security and was one of the first 10 people to attain the HIPAA Certified Security Specialist. Throughout his 30 years in IT he has worked as an employee, contractor, and consultant for several companies including Platinum Technologies, Fujitsu, IBM, State Farm, MindSharp, Thomson, Pearson, and Skillsoft among others. Mr. Shannon has authored several books, training manuals, blog articles, and CBT modules over the years as well. He has attained the CISSP, ITIL 4 Managing Professional, CCNP Security, Palo Alto PCNSE7 and OpenFAIR certifications in the security field as well as several cloud-based certifications for AWS, Google Cloud, and Azure. His hobbies are playing guitar, songwriting, and golf. He resides with his wife in Abilene Texas.

Schedule

The timeframes are only estimates and may vary according to how the class is progressing

Day 1

Session 1: TCP/IP Essentials, Critical Controls, Access Control & Password Management Length (50 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Break (length: 10 minutes)

Session 2: Network Essentials, Web Communication Security, and Wireless Network Security Length (50 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Break (length: 10 minutes)

Session 3: Malicious Code & Exploit Mitigation, Defense in Depth, Defensible Network Architecture, and Active Defense Length (50 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Break (length: 10 minutes)

Session 4: Endpoint Security, Log Management & SIEM, and Vulnerability Scanning and Penetration Testing Length (60 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Day 2

Session 1: Virtualization and Cloud Security, Cryptography and Algorithms, and Applied Cryptography Length (50 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Break (length: 10 minutes)

Session 2: Security Policy and IT Risk Management, Incident Handling and Response and Contingency Planning Length (50 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Break (length: 10 minutes)

Session 3: Windows Security Infrastructure, Access Controls, Security Policy, Network Services, Cloud Computing, Automation, Auditing, and Forensics Length (50 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions

Break (length: 10 minutes)

Session 4: Linux Security: Structure, Permissions and Access, Hardening and Securing, Monitoring and Attack Detection, and Linux Security Utilities Length (60 minutes)

  • Instructor will teach from prepared slides
  • Participants will watch, listen and chat in questions