-71%
GSEC Certification – Security Essentials – Mohamed Atef
$35.00
Lifetime support – Download unlimited when you buy GSEC Certification – Security Essentials – Mohamed Atef Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
- Description
- Reviews (0)
Description
GSEC Certification – Security Essentials – Mohamed Atef
Take The Next Step in Information Security Career With GSEC Certification
Course Curriculum
Introduction
- 0. Introduction (0:35)
- 1. Your Instructor (2:00)
- 2.GSEC Exam (4:33)t
- 3. Course Ouline (6:16)
- How to get the course materials and access to the students portal (3:28)
Build GSEC lab
- 4.Lab Requirement (1:51)
- 5.Download the requirement (10:04)
- 6.Setup the Lab Part 1 (8:32)
- 7.Setup the lab Part 2 (4:51)
- 8.Setup the lab Part 3 (10:01)
- 9.Setup the lab Part 4 (5:41)
Networking Concepts
- 10.Introduction (1:55)
- 11.Network Basics (12:07)
- 12.Internet Protocol – IP (16:12)
- 13.OSI Model Part 1 (14:42)
- 14.OSI Model Part 2 (14:14)
- 15. TCPIP Model (2:49)
- 16.Default Gateway (7:10)
- 17.Demonstration (11:47)
- 18.Network Architecture Components (17:09)
- 19.Types of Network (5:12)
- 20.TCP Commands (9:02)
- 21.Resources 2 (1:10)
Defense in Depth
- 22.Defense in Depth (4:16)
- 23.Important Definitions Part 1 (12:28)
- 24. Important Definitions Part 2 (4:42)
- 26.Compliance (8:50)
- 25.Due Care and Due Diligence (8:42)
- 27.Security Documents (15:35)
- 30.The Relationship Between Security Document Types (3:08)
- 28.Security Document Types (5:17)
- 29. Policy Sample (3:14)
- 30.The Relationship Between Security Document Types (3:08)
- 31.Access Control (6:43)
- 32.Authorization (19:22)
- 33.Authentication (18:50)
- 34. Single Sign on SSO (12:59)
- 35.Access Control Attack (1:43)
- 36.Password Hacking techniques (8:43)
- 37.Default Password (5:28)
- 38.Important tool 2 (14:33)
- 39.Cain in Action (18:22)
- 40.Xhydra (7:33)
- 41.Ncrack (8:44)
- 42. Web application vulnerability (0:58)
- 43. DVWA (9:14)
- 44.Hackthissite (3:11)
- What is SQL Injection (14:09)
- SQL Injection attack 1 (7:57)
- 47. SQL Injection attack 2 (14:06)
- 48. XSS Introduction (3:03)
- 49. Reflected XSS (12:43)
- 50.Stored XSS (5:18)
- 51.Major Web Application vulnerabilities (3:06)
Lifetime support – Download unlimited when you buy GSEC Certification – Security Essentials – Mohamed Atef Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Internet Security Technologies
- 52.Introduction (3:11)
- 53..Introduction to Maleware (5:16)
- 54.Types of Malware (10:11)
- 55.Create a virus (6:25)
- 56.Creating a Virus using a Tool (2:44)
- 57.Can I Bypass the AV (4:25)
- 58.Introduction to Denail of Service (13:30)
- 59.Denial of Service Attack Demonstration 1 (11:01)
- 60.Denial of Service Attack Demonstration 2 (9:14)
- 61.Denial of Service Attack Demonstration 3 (6:49)
- 62.What is Buffer Overflow (5:32)
- 63.How to search for Buffer Overflow (14:09)
- 64.Buffer Overflow Part 1 (48:31)
- 65.Buffer Overflow Part 2 (16:37)
- 66. Buffer Overflow Part 3 (26:09)
- 67.IDS, Firewalls, Honeypots (2:45)
- 68.Honeypots (10:12)
- 69.Firewalls (12:06)
- 70..Intrusion Detection System – IDS (4:22)
- 71. What is Social Engineering – (5:28)
- 72.Fake Email – Spoofing (6:17)
- 73.Social Engineering Toolkit (4:45)
- 74.Phising Credential Harvest – (13:16)
- 75.Advanced Social engineering technique (19:03)
- 76.Network Scanning Overview (5:21)
- 77.Important Scanning Defination (13:19)
- 79.Network Scanning Methodology (2:55)
- 80.Identifying Live system (6:40)
- 81.Port Scanning (9:29)
- 82.Advanced Scanning Techniques (7:23)
OS Security
- 1. Introduction (3:53)
- 1. Securing Passwords 2 (9:23)
- 2. Securing Operating Systems 2 (9:34)
- 3. Firewalls 2 (10:56)
- 4. Securing Network Switches 2 (8:51)
- 5. Securing Network Routers 2 (7:46)
- 6. Securing Wireless Networks 2 (9:28)
- 7. IDS, IPS, and Honeypots 2 (10:56)
- 8. Antiviruses 2 (9:03)
- 83.OS Security (1:11)
- 9. Encryption 2 (5:12)
- 10. Physical Security 2 (7:08)
Reviews
There are no reviews yet.