101 Labs – GIAC Security Essentials (GSEC)

GIAC GSEC labs are an essential part of your study program if you want to pass the highly regarded GSEC exam. Much of the syllabus expects you to know how to securely manage passwords, mitigate exploits, secure endpoints, and more.

GIAC (Global Information Assurance Certification) certifications are intended for information security professionals and individuals who want to validate their knowledge and expertise in various domains of cybersecurity. GIAC certifications are well-respected in the industry and are designed to demonstrate a high level of proficiency in specific areas of information security .

Updated for the latest exam syllabus:

  • GIAC-GSEC

GIAC GSEC certification requires you passing the tough exam questions, many are based on real-world security problems and devices. Getting hands-on experience is vital if you want to pass your GSEC exam first time (around 30% fail).

101 Labs – GIAC GSEC covers many important aspects of the exam including hacking commands, Python scripts, password cracking, wireless security, packet sniffers, penetration testing, encryption and more. We take you by the hand and guide you through the GSEC exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day.

This is 100% hands-on training, please use this course along with your study guide or classroom course. We DO NOT teach theory on this website.

The GIAC GSEC certification is the perfect starting block for a range of hands-on security professional careers including cyber security, ethical hacker, security consultant and many others. There is currently a massive shortfall in certified security engineers with most Cyber Security departments having to run 24/7.

This course shows you how to configure multiple security services including pentesting, Windows and Linux security, set up honeypot traps, SSH hardening and more. You use free software, virtual machines and exploit software to configure all the labs. By the end of the course you will have configured more security protocols and services than most security engineers do in five years on the job.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of  security internetworking. We only ever use industry experts to create your labs and never IT Trainers. Your course instructor configures, supports and troubleshoots the security infrastructure for a large corporation. He’s both CISSP and CEH certified.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Are new to the world of IT security and want to learn all the basics
  • Want to learn how to protect networks from hacking attacks
  • Have an interest in Penetration Testing, CyberOps or Info Security
  • Don’t feel ready for advanced exams such as Certified Ethical Hacker
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your GSEC exam
  • Want access to four GSEC practice tests (200 questions)

Typical GSEC Careers

This certification will prepare you for the following career paths:

  • New InfoSec professional
  • Security professional
  • Security manager
  • Operations personnel
  • IT engineers and supervisor
  • Security administrator
  • Forensic analyst
  • Penetration tester
  • Auditors
Module 1 Network Security Essentials
Unit 1 Welcome  
Unit 2 Wireshark Introduction  
Unit 3 Wireshark - Beyond the Basics  
Unit 4 Tcpdump Introduction  
Unit 5 tcpdump - Beyond the Basics  
Unit 6 Netcat  
Unit 7 Telnet  
Unit 8 Nmap Part 1  
Unit 9 Nmap Part 2  
Unit 10 Nmap Part 3  
Unit 11 Zenmap  
Unit 12 SSH Server Setup  
Unit 13 SSH Connectivity  
Unit 14 SSH Key Pair Authentication  
Unit 15 SSH Server on Windows  
Module 2 Linux Security
Unit 1 Linux Directory Navigation  
Unit 2 Linux File Management  
Unit 3 Linux Text Editing  
Unit 4 Sudo Command in Linux  
Unit 5 Linux Services and Processes  
Unit 6 Linux File and Folder Permissions  
Unit 7 File and Content Search in Linux  
Unit 8 Linux Log Analysis  
Unit 9 Linux Local Users  
Unit 10 Linux Directory Encryption  
Unit 11 AppArmor  
Unit 12 SELinux  
Unit 13 Linux Firewall Part 1  
Unit 14 Linux Firewall Part 2  
Unit 15 Bash Scripting Basics 1  
Unit 16 Bash Scripting Basics 2  
Module 3 Microsoft Security
Unit 1 Windows Local Users  
Unit 2 Windows Local Security Groups  
Unit 3 Using Runas to Perform Administrative Tasks  
Unit 4 NTFS Basic Permissions  
Unit 5 NTFS Advanced Permissions  
Unit 6 Share Folder Permissions  
Unit 7 Windows 11 Account Lockout and Password Policies  
Unit 8 Windows 11 Audit Policies  
Unit 9 AppLocker  
Unit 10 Windows UAC - User Access Control  
Unit 11 Windows Event Logs Part 1  
Unit 12 Windows Event Logs Part 2  
Unit 13 Windows Firewall Part 1  
Unit 14 Windows Firewall Part 2  
Unit 15 Microsoft Defender AV Part 1  
Unit 16 Microsoft Defender AV Part 2  
Unit 17 PowerShell Basics Part 1  
Unit 18 PowerShell Basics Part 2  
Unit 19 PowerShell Scripting Part 1  
Unit 20 PowerShell Scripting Part 2  
Unit 21 Windows Server Part 1  
Unit 22 Windows Server Part 2  
Unit 23 Windows Active Directory Part 1  
Unit 24 Windows Active Directory Part 2  
Unit 25 Windows Active Directory Part 3  
Unit 26 Windows Active Directory Part 4  
Unit 27 Group Policy Part 1  
Unit 28 Group Policy Part 2  
Unit 29 Group Policy Part 3  
Unit 30 Group Policy Part 4  
Unit 31 Windows Updates Part 1  
Unit 32 Windows Updates Part 2  
Unit 33 Securing Microsoft Remote Desktop Part 1  
Unit 34 Securing Microsoft Remote Desktop Part 2  
Module 4 Data Security Technologies
Unit 1 SIEM - Security Onion Installation Part 1  
Unit 2 SIEM - Security Onion Installation Part 2  
Unit 3 SIEM Alerts  
Unit 4 SIEM Cases  
Unit 5 SIEM Dashboards and Hunt  
Unit 6 Containers Part 1  
Unit 7 Containers Part 2  
Unit 8 Containers Part 3  
Unit 9 Shodan  
Unit 10 Vulnerability Scanning with Greenbone Part 1  
Unit 11 Vulnerability Scanning with Greenbone Part 2  
Unit 12 Vulnerability Scanning with Greenbone Part 3  
Module 5 Defense in Depth
Unit 1 CIS Controls - Windows Server 2022 - Part 1  
Unit 2 CIS Controls - Windows Server 2022 - Part 2  
Unit 3 CIS Controls - Windows 11 - Part 1  
Unit 4 CIS Controls - Windows 11 - Part 2  
Unit 5 CIS Controls - Ubuntu Linux - Part 1  
Unit 6 CIS Controls - Ubuntu Linux - Part 2  
Unit 7 Password Cracking with Hashcat  
Unit 8 Password Cracking with John the Ripper  
Unit 9 Directory Enumeration with Gobuster  
Unit 10 Directory Enumeration with ffuf  
Module 6 Vulnerability Management and Response
Unit 1 Searchsploit  
Unit 2 GitHub and POC Exploits  
Unit 3 Metasploit Part 1  
Unit 4 Metasploit Part 2  
Unit 5 Metasploitable Brute Force FTP with Hydra  
Unit 6 Metasploitable Exploiting VSFTPD Vulnerability  
Unit 7 Metasploitable Exploiting VSFTPD With Python  
Unit 8 Metasploitable Bruteforce Port 22 SSH  
Unit 9 Metasploitable Enumerate Users with SMTP  
Unit 10 Metasploitable Exploiting PHP_CGI  
Unit 11 Metasploitable Meterpreter  
Unit 12 Metasploitable Reverse Shell with netcat  
Unit 13 Metasploitable System Enumeration - Manual  
Unit 14 Metasploitable System Enumeration - Scripted  
Unit 15 Metaploitable Privilege Escalation  
Module 7 Exams
Unit 1 Exam 1  
Unit 2 Exam 2  
Unit 3 Exam 3  
Unit 4 Exam 4