English | Size: 2.98 GB
Genre: eLearning
Take The Next Step in Information Security Career With GSEC Certification
Course Curriculum
Introduction
Preview0. Introduction (0:35)
Preview1. Your Instructor (2:00)
Start2.GSEC Exam (4:33)
Start3. Course Ouline (6:16)
StartHow to get the course materials and access to the students portal (3:28)
Build GSEC lab
Start4.Lab Requirement (1:51)
Start5.Download the requirement (10:04)
Start6.Setup the Lab Part 1 (8:32)
Start7.Setup the lab Part 2 (4:51)
Start8.Setup the lab Part 3 (10:01)
Start9.Setup the lab Part 4 (5:41)
Networking Concepts
Start10.Introduction (1:55)
Start11.Network Basics (12:07)
Start12.Internet Protocol – IP (16:12)
Start13.OSI Model Part 1 (14:42)
Start14.OSI Model Part 2 (14:14)
Start15. TCPIP Model (2:49)
Start16.Default Gateway (7:10)
Start17.Demonstration (11:47)
Start18.Network Architecture Components (17:09)
Start19.Types of Network (5:12)
Start20.TCP Commands (9:02)
Start21.Resources 2 (1:10)
Defense in Depth
Start22.Defense in Depth (4:16)
Start23.Important Definitions Part 1 (12:28)
Start24. Important Definitions Part 2 (4:42)
Start26.Compliance (8:50)
Start25.Due Care and Due Diligence (8:42)
Start27.Security Documents (15:35)
Start30.The Relationship Between Security Document Types (3:08)
Start28.Security Document Types (5:17)
Start29. Policy Sample (3:14)
Start30.The Relationship Between Security Document Types (3:08)
Start31.Access Control (6:43)
Start32.Authorization (19:22)
Start33.Authentication (18:50)
Start34. Single Sign on SSO (12:59)
Start35.Access Control Attack (1:43)
Start36.Password Hacking techniques (8:43)
Start37.Default Password (5:28)
Start38.Important tool 2 (14:33)
Start39.Cain in Action (18:22)
Start40.Xhydra (7:33)
Start41.Ncrack (8:44)
Start42. Web application vulnerability (0:58)
Start43. DVWA (9:14)
Start44.Hackthissite (3:11)
StartWhat is SQL Injection (14:09)
StartSQL Injection attack 1 (7:57)
Start47. SQL Injection attack 2 (14:06)
Start48. XSS Introduction (3:03)
Start49. Reflected XSS (12:43)
Start50.Stored XSS (5:18)
Start51.Major Web Application vulnerabilities (3:06)
Internet Security Technologies
Start52.Introduction (3:11)
Start53..Introduction to Maleware (5:16)
Start54.Types of Malware (10:11)
Start55.Create a virus (6:25)
Start56.Creating a Virus using a Tool (2:44)
Start57.Can I Bypass the AV (4:25)
Start58.Introduction to Denail of Service (13:30)
Start59.Denial of Service Attack Demonstration 1 (11:01)
Start60.Denial of Service Attack Demonstration 2 (9:14)
Start61.Denial of Service Attack Demonstration 3 (6:49)
Start62.What is Buffer Overflow (5:32)
Start63.How to search for Buffer Overflow (14:09)
Start64.Buffer Overflow Part 1 (48:31)
Start65.Buffer Overflow Part 2 (16:37)
Start66. Buffer Overflow Part 3 (26:09)
Start67.IDS, Firewalls, Honeypots (2:45)
Start68.Honeypots (10:12)
Start69.Firewalls (12:06)
Start70..Intrusion Detection System – IDS (4:22)
Start71. What is Social Engineering – (5:28)
Start72.Fake Email – Spoofing (6:17)
Start73.Social Engineering Toolkit (4:45)
Start74.Phising Credential Harvest – (13:16)
Start75.Advanced Social engineering technique (19:03)
Start76.Network Scanning Overview (5:21)
Start77.Important Scanning Defination (13:19)
Start79.Network Scanning Methology (2:55)
Start80.Identifying Live system (6:40)
Start81.Port Scanning (9:29)
Start82.Advanced Scanning Techniques (7:23)
OS Security
Start1. Introduction (3:53)
Start1. Securing Passwords 2 (9:23)
Start2. Securing Operating Systems 2 (9:34)
Start3. Firewalls 2 (10:56)
Start4. Securing Network Switches 2 (8:51)
Start5. Securing Network Routers 2 (7:46)
Start6. Securing Wireless Networks 2 (9:28)
Start7. IDS, IPS, and Honeypots 2 (10:56)
Start8. Antiviruses 2 (9:03)
Start83.OS Security (1:11)
Start9. Encryption 2 (5:12)
Start10. Physical Security 2 (7:08)
rapidgator.net/file/2338d2e744fdf595c65323cf36725be2/GSEC-Certification-Security-Essentials.30.5.part1.rar.html
rapidgator.net/file/2e597c142283ad6ce8bd50226a772292/GSEC-Certification-Security-Essentials.30.5.part2.rar.html
rapidgator.net/file/fcda5b2bf52a69be1bbdf3fbb7b8fb0c/GSEC-Certification-Security-Essentials.30.5.part3.rar.html
nitroflare.com/view/F3D3197D25CA78B/GSEC-Certification-Security-Essentials.30.5.part1.rar
nitroflare.com/view/1BFFFDFCB08553E/GSEC-Certification-Security-Essentials.30.5.part2.rar
nitroflare.com/view/962A8CCD000C003/GSEC-Certification-Security-Essentials.30.5.part3.rar
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9