101 Labs – GIAC Security Essentials (GSEC)
GIAC GSEC labs are an essential part of your study program if you want to pass the highly regarded GSEC exam. Much of the syllabus expects you to know how to securely manage passwords, mitigate exploits, secure endpoints, and more.
GIAC (Global Information Assurance Certification) certifications are intended for information security professionals and individuals who want to validate their knowledge and expertise in various domains of cybersecurity. GIAC certifications are well-respected in the industry and are designed to demonstrate a high level of proficiency in specific areas of information security .
Updated for the latest exam syllabus:
- GIAC-GSEC
GIAC GSEC certification requires you passing the tough exam questions, many are based on real-world security problems and devices. Getting hands-on experience is vital if you want to pass your GSEC exam first time (around 30% fail).
101 Labs – GIAC GSEC covers many important aspects of the exam including hacking commands, Python scripts, password cracking, wireless security, packet sniffers, penetration testing, encryption and more. We take you by the hand and guide you through the GSEC exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day.
This is 100% hands-on training, please use this course along with your study guide or classroom course. We DO NOT teach theory on this website.
The GIAC GSEC certification is the perfect starting block for a range of hands-on security professional careers including cyber security, ethical hacker, security consultant and many others. There is currently a massive shortfall in certified security engineers with most Cyber Security departments having to run 24/7.
This course shows you how to configure multiple security services including pentesting, Windows and Linux security, set up honeypot traps, SSH hardening and more. You use free software, virtual machines and exploit software to configure all the labs. By the end of the course you will have configured more security protocols and services than most security engineers do in five years on the job.
Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of security internetworking. We only ever use industry experts to create your labs and never IT Trainers. Your course instructor configures, supports and troubleshoots the security infrastructure for a large corporation. He’s both CISSP and CEH certified.
Take this course if you:
- Want to lay a foundation for a career in security
- Are new to the world of IT security and want to learn all the basics
- Want to learn how to protect networks from hacking attacks
- Have an interest in Penetration Testing, CyberOps or Info Security
- Don’t feel ready for advanced exams such as Certified Ethical Hacker
- Want an understanding of network security, hacking tools and technology
- Want to gain confidence in your hands-on IT skills
- Want to gain an edge in your GSEC exam
- Want access to four GSEC practice tests (200 questions)
Typical GSEC Careers
This certification will prepare you for the following career paths:
- New InfoSec professional
- Security professional
- Security manager
- Operations personnel
- IT engineers and supervisor
- Security administrator
- Forensic analyst
- Penetration tester
- Auditors
Module 1 | Network Security Essentials | |
---|---|---|
Unit 1 | Welcome | |
Unit 2 | Wireshark Introduction | |
Unit 3 | Wireshark - Beyond the Basics | |
Unit 4 | Tcpdump Introduction | |
Unit 5 | tcpdump - Beyond the Basics | |
Unit 6 | Netcat | |
Unit 7 | Telnet | |
Unit 8 | Nmap Part 1 | |
Unit 9 | Nmap Part 2 | |
Unit 10 | Nmap Part 3 | |
Unit 11 | Zenmap | |
Unit 12 | SSH Server Setup | |
Unit 13 | SSH Connectivity | |
Unit 14 | SSH Key Pair Authentication | |
Unit 15 | SSH Server on Windows | |
Module 2 | Linux Security | |
Unit 1 | Linux Directory Navigation | |
Unit 2 | Linux File Management | |
Unit 3 | Linux Text Editing | |
Unit 4 | Sudo Command in Linux | |
Unit 5 | Linux Services and Processes | |
Unit 6 | Linux File and Folder Permissions | |
Unit 7 | File and Content Search in Linux | |
Unit 8 | Linux Log Analysis | |
Unit 9 | Linux Local Users | |
Unit 10 | Linux Directory Encryption | |
Unit 11 | AppArmor | |
Unit 12 | SELinux | |
Unit 13 | Linux Firewall Part 1 | |
Unit 14 | Linux Firewall Part 2 | |
Unit 15 | Bash Scripting Basics 1 | |
Unit 16 | Bash Scripting Basics 2 | |
Module 3 | Microsoft Security | |
Unit 1 | Windows Local Users | |
Unit 2 | Windows Local Security Groups | |
Unit 3 | Using Runas to Perform Administrative Tasks | |
Unit 4 | NTFS Basic Permissions | |
Unit 5 | NTFS Advanced Permissions | |
Unit 6 | Share Folder Permissions | |
Unit 7 | Windows 11 Account Lockout and Password Policies | |
Unit 8 | Windows 11 Audit Policies | |
Unit 9 | AppLocker | |
Unit 10 | Windows UAC - User Access Control | |
Unit 11 | Windows Event Logs Part 1 | |
Unit 12 | Windows Event Logs Part 2 | |
Unit 13 | Windows Firewall Part 1 | |
Unit 14 | Windows Firewall Part 2 | |
Unit 15 | Microsoft Defender AV Part 1 | |
Unit 16 | Microsoft Defender AV Part 2 | |
Unit 17 | PowerShell Basics Part 1 | |
Unit 18 | PowerShell Basics Part 2 | |
Unit 19 | PowerShell Scripting Part 1 | |
Unit 20 | PowerShell Scripting Part 2 |