101 Labs – GIAC Security Essentials (GSEC)

GIAC GSEC labs are an essential part of your study program if you want to pass the highly regarded GSEC exam. Much of the syllabus expects you to know how to securely manage passwords, mitigate exploits, secure endpoints, and more.

GIAC (Global Information Assurance Certification) certifications are intended for information security professionals and individuals who want to validate their knowledge and expertise in various domains of cybersecurity. GIAC certifications are well-respected in the industry and are designed to demonstrate a high level of proficiency in specific areas of information security .

Updated for the latest exam syllabus:

  • GIAC-GSEC

GIAC GSEC certification requires you passing the tough exam questions, many are based on real-world security problems and devices. Getting hands-on experience is vital if you want to pass your GSEC exam first time (around 30% fail).

101 Labs – GIAC GSEC covers many important aspects of the exam including hacking commands, Python scripts, password cracking, wireless security, packet sniffers, penetration testing, encryption and more. We take you by the hand and guide you through the GSEC exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day.

This is 100% hands-on training, please use this course along with your study guide or classroom course. We DO NOT teach theory on this website.

The GIAC GSEC certification is the perfect starting block for a range of hands-on security professional careers including cyber security, ethical hacker, security consultant and many others. There is currently a massive shortfall in certified security engineers with most Cyber Security departments having to run 24/7.

This course shows you how to configure multiple security services including pentesting, Windows and Linux security, set up honeypot traps, SSH hardening and more. You use free software, virtual machines and exploit software to configure all the labs. By the end of the course you will have configured more security protocols and services than most security engineers do in five years on the job.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of  security internetworking. We only ever use industry experts to create your labs and never IT Trainers. Your course instructor configures, supports and troubleshoots the security infrastructure for a large corporation. He’s both CISSP and CEH certified.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Are new to the world of IT security and want to learn all the basics
  • Want to learn how to protect networks from hacking attacks
  • Have an interest in Penetration Testing, CyberOps or Info Security
  • Don’t feel ready for advanced exams such as Certified Ethical Hacker
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your GSEC exam
  • Want access to four GSEC practice tests (200 questions)

Typical GSEC Careers

This certification will prepare you for the following career paths:

  • New InfoSec professional
  • Security professional
  • Security manager
  • Operations personnel
  • IT engineers and supervisor
  • Security administrator
  • Forensic analyst
  • Penetration tester
  • Auditors
Module 1Network Security Essentials
Unit 1Welcome 
Unit 2Wireshark Introduction 
Unit 3Wireshark - Beyond the Basics 
Unit 4Tcpdump Introduction 
Unit 5tcpdump - Beyond the Basics 
Unit 6Netcat 
Unit 7Telnet 
Unit 8Nmap Part 1 
Unit 9Nmap Part 2 
Unit 10Nmap Part 3 
Unit 11Zenmap 
Unit 12SSH Server Setup 
Unit 13SSH Connectivity 
Unit 14SSH Key Pair Authentication 
Unit 15SSH Server on Windows 
Module 2Linux Security
Unit 1Linux Directory Navigation 
Unit 2Linux File Management 
Unit 3Linux Text Editing 
Unit 4Sudo Command in Linux 
Unit 5Linux Services and Processes 
Unit 6Linux File and Folder Permissions 
Unit 7File and Content Search in Linux 
Unit 8Linux Log Analysis 
Unit 9Linux Local Users 
Unit 10Linux Directory Encryption 
Unit 11AppArmor 
Unit 12SELinux 
Unit 13Linux Firewall Part 1 
Unit 14Linux Firewall Part 2 
Unit 15Bash Scripting Basics 1 
Unit 16Bash Scripting Basics 2 
Module 3Microsoft Security
Unit 1Windows Local Users 
Unit 2Windows Local Security Groups 
Unit 3Using Runas to Perform Administrative Tasks 
Unit 4NTFS Basic Permissions 
Unit 5NTFS Advanced Permissions 
Unit 6Share Folder Permissions 
Unit 7Windows 11 Account Lockout and Password Policies 
Unit 8Windows 11 Audit Policies 
Unit 9AppLocker 
Unit 10Windows UAC - User Access Control 
Unit 11Windows Event Logs Part 1 
Unit 12Windows Event Logs Part 2 
Unit 13Windows Firewall Part 1 
Unit 14Windows Firewall Part 2 
Unit 15Microsoft Defender AV Part 1 
Unit 16Microsoft Defender AV Part 2 
Unit 17PowerShell Basics Part 1 
Unit 18PowerShell Basics Part 2 
Unit 19PowerShell Scripting Part 1 
Unit 20PowerShell Scripting Part 2 
Unit 21Windows Server Part 1 
Unit 22Windows Server Part 2 
Unit 23Windows Active Directory Part 1 
Unit 24Windows Active Directory Part 2 
Unit 25Windows Active Directory Part 3 
Unit 26Windows Active Directory Part 4 
Unit 27Group Policy Part 1 
Unit 28Group Policy Part 2 
Unit 29Group Policy Part 3 
Unit 30Group Policy Part 4 
Unit 31Windows Updates Part 1 
Unit 32Windows Updates Part 2 
Unit 33Securing Microsoft Remote Desktop Part 1 
Unit 34Securing Microsoft Remote Desktop Part 2 
Module 4Data Security Technologies
Unit 1SIEM - Security Onion Installation Part 1 
Unit 2SIEM - Security Onion Installation Part 2 
Unit 3SIEM Alerts 
Unit 4SIEM Cases 
Unit 5SIEM Dashboards and Hunt 
Unit 6Containers Part 1 
Unit 7Containers Part 2 
Unit 8Containers Part 3 
Unit 9Shodan 
Unit 10Vulnerability Scanning with Greenbone Part 1 
Unit 11Vulnerability Scanning with Greenbone Part 2 
Unit 12Vulnerability Scanning with Greenbone Part 3 
Module 5Defense in Depth
Unit 1CIS Controls - Windows Server 2022 - Part 1 
Unit 2CIS Controls - Windows Server 2022 - Part 2 
Unit 3CIS Controls - Windows 11 - Part 1 
Unit 4CIS Controls - Windows 11 - Part 2 
Unit 5CIS Controls - Ubuntu Linux - Part 1 
Unit 6CIS Controls - Ubuntu Linux - Part 2 
Unit 7Password Cracking with Hashcat 
Unit 8Password Cracking with John the Ripper 
Unit 9Directory Enumeration with Gobuster 
Unit 10Directory Enumeration with ffuf 
Module 6Vulnerability Management and Response
Unit 1Searchsploit 
Unit 2GitHub and POC Exploits 
Unit 3Metasploit Part 1 
Unit 4Metasploit Part 2 
Unit 5Metasploitable Brute Force FTP with Hydra 
Unit 6Metasploitable Exploiting VSFTPD Vulnerability 
Unit 7Metasploitable Exploiting VSFTPD With Python 
Unit 8Metasploitable Bruteforce Port 22 SSH 
Unit 9Metasploitable Enumerate Users with SMTP 
Unit 10Metasploitable Exploiting PHP_CGI 
Unit 11Metasploitable Meterpreter 
Unit 12Metasploitable Reverse Shell with netcat 
Unit 13Metasploitable System Enumeration - Manual 
Unit 14Metasploitable System Enumeration - Scripted 
Unit 15Metaploitable Privilege Escalation 
Module 7Exams
Unit 1Exam 1 
Unit 2Exam 2 
Unit 3Exam 3 
Unit 4Exam 4