GSEC Certification – Security Essentials – Mohamed Atef

🎉 Special Offer: Exclusive Deal Just for You! 🎉

Use code COURSEFARM to get 30% OFF on all products!

-71%

GSEC Certification – Security Essentials – Mohamed Atef

GSEC Certification – Security Essentials – Mohamed Atef

GSEC Certification – Security Essentials – Mohamed Atef

Original price was: $120.00.Current price is: $35.00.

In stock

Original price was: $120.00.Current price is: $35.00.

Lifetime support – Download unlimited when you buy GSEC Certification – Security Essentials – Mohamed Atef Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …

Purchase this product now and earn 35 Points!
10 Points = $1

Description

GSEC Certification - Security Essentials - Mohamed AtefGSEC Certification – Security Essentials – Mohamed Atef


Take The Next Step in Information Security Career With GSEC Certification

Course Curriculum

Introduction

  • 0. Introduction (0:35)
  • 1. Your Instructor (2:00)
  • 2.GSEC Exam (4:33)t
  • 3. Course Ouline (6:16)
  • How to get the course materials and access to the students portal (3:28)

Build GSEC lab

  • 4.Lab Requirement (1:51)
  • 5.Download the requirement (10:04)
  • 6.Setup the Lab Part 1 (8:32)
  • 7.Setup the lab Part 2 (4:51)
  • 8.Setup the lab Part 3 (10:01)
  • 9.Setup the lab Part 4 (5:41)

Networking Concepts

  • 10.Introduction (1:55)
  • 11.Network Basics (12:07)
  • 12.Internet Protocol – IP (16:12)
  • 13.OSI Model Part 1 (14:42)
  • 14.OSI Model Part 2 (14:14)
  • 15. TCPIP Model (2:49)
  • 16.Default Gateway (7:10)
  • 17.Demonstration (11:47)
  • 18.Network Architecture Components (17:09)
  • 19.Types of Network (5:12)
  • 20.TCP Commands (9:02)
  • 21.Resources 2 (1:10)

Defense in Depth

  • 22.Defense in Depth (4:16)
  • 23.Important Definitions Part 1 (12:28)
  • 24. Important Definitions Part 2 (4:42)
  • 26.Compliance (8:50)
  • 25.Due Care and Due Diligence (8:42)
  • 27.Security Documents (15:35)
  • 30.The Relationship Between Security Document Types (3:08)
  • 28.Security Document Types (5:17)
  • 29. Policy Sample (3:14)
  • 30.The Relationship Between Security Document Types (3:08)
  • 31.Access Control (6:43)
  • 32.Authorization (19:22)
  • 33.Authentication (18:50)
  • 34. Single Sign on SSO (12:59)
  • 35.Access Control Attack (1:43)
  • 36.Password Hacking techniques (8:43)
  • 37.Default Password (5:28)
  • 38.Important tool 2 (14:33)
  • 39.Cain in Action (18:22)
  • 40.Xhydra (7:33)
  • 41.Ncrack (8:44)
  • 42. Web application vulnerability (0:58)
  • 43. DVWA (9:14)
  • 44.Hackthissite (3:11)
  • What is SQL Injection (14:09)
  • SQL Injection attack 1 (7:57)
  • 47. SQL Injection attack 2 (14:06)
  • 48. XSS Introduction (3:03)
  • 49. Reflected XSS (12:43)
  • 50.Stored XSS (5:18)
  • 51.Major Web Application vulnerabilities (3:06)

Lifetime support – Download unlimited when you buy GSEC Certification – Security Essentials – Mohamed Atef Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …

Internet Security Technologies

  • 52.Introduction (3:11)
  • 53..Introduction to Maleware (5:16)
  • 54.Types of Malware (10:11)
  • 55.Create a virus (6:25)
  • 56.Creating a Virus using a Tool (2:44)
  • 57.Can I Bypass the AV (4:25)
  • 58.Introduction to Denail of Service (13:30)
  • 59.Denial of Service Attack Demonstration 1 (11:01)
  • 60.Denial of Service Attack Demonstration 2 (9:14)
  • 61.Denial of Service Attack Demonstration 3 (6:49)
  • 62.What is Buffer Overflow (5:32)
  • 63.How to search for Buffer Overflow (14:09)
  • 64.Buffer Overflow Part 1 (48:31)
  • 65.Buffer Overflow Part 2 (16:37)
  • 66. Buffer Overflow Part 3 (26:09)
  • 67.IDS, Firewalls, Honeypots (2:45)
  • 68.Honeypots (10:12)
  • 69.Firewalls (12:06)
  • 70..Intrusion Detection System – IDS (4:22)
  • 71. What is Social Engineering – (5:28)
  • 72.Fake Email – Spoofing (6:17)
  • 73.Social Engineering Toolkit (4:45)
  • 74.Phising Credential Harvest – (13:16)
  • 75.Advanced Social engineering technique (19:03)
  • 76.Network Scanning Overview (5:21)
  • 77.Important Scanning Defination (13:19)
  • 79.Network Scanning Methodology (2:55)
  • 80.Identifying Live system (6:40)
  • 81.Port Scanning (9:29)
  • 82.Advanced Scanning Techniques (7:23)

OS Security

  • 1. Introduction (3:53)
  • 1. Securing Passwords 2 (9:23)
  • 2. Securing Operating Systems 2 (9:34)
  • 3. Firewalls 2 (10:56)
  • 4. Securing Network Switches 2 (8:51)
  • 5. Securing Network Routers 2 (7:46)
  • 6. Securing Wireless Networks 2 (9:28)
  • 7. IDS, IPS, and Honeypots 2 (10:56)
  • 8. Antiviruses 2 (9:03)
  • 83.OS Security (1:11)
  • 9. Encryption 2 (5:12)
  • 10. Physical Security 2 (7:08)

Reviews

There are no reviews yet.


Be the first to review “GSEC Certification – Security Essentials – Mohamed Atef”


Featured Products

Best Selling Products

Latest Products

Top Rated products