GSEC Certification -Security Essentials – Mohamed Atef

In Stock

Original price was: $120.00.Current price is: $21.00.

GSEC Certification -Security Essentials – Mohamed Atef has the same quality as the author’s salapage. Take The Next Step in Information Security Career With GSEC Certification

Purchase this course you will earn 21 Points worth of $2.10!
Quantity

Achieve more with the GSEC Certification -Security Essentials – Mohamed Atef course, priced at just Original price was: $120.00.Current price is: $21.00. on GBESY.biz! Explore our extensive collection of over 60,000 downloadable courses in Internet Marketing. We offer professional, self-paced digital education at up to 80% off original rates. Start transforming your expertise now!

Salepage link: At HERE. Archive: http://archive.is/wip/1LtRH

$120   $26 – GSEC Certification -Security Essentials – Mohamed Atef

GSEC Certification – Security Essentials

Take The Next Step in Information Security Career With GSEC Certification

Course Curriculum

Introduction

  • 0. Introduction (0:35)
  • 1. Your Instructor (2:00)
  • 2.GSEC Exam (4:33)t
  • 3. Course Ouline (6:16)
  • How to get the course materials and access to the students portal (3:28)

Build GSEC lab

  • 4.Lab Requirement (1:51)
  • 5.Download the requirement (10:04)
  • 6.Setup the Lab Part 1 (8:32)
  • 7.Setup the lab Part 2 (4:51)
  • 8.Setup the lab Part 3 (10:01)
  • 9.Setup the lab Part 4 (5:41)

Networking Concepts

  • 10.Introduction (1:55)
  • 11.Network Basics (12:07)
  • 12.Internet Protocol – IP (16:12)
  • 13.OSI Model Part 1 (14:42)
  • 14.OSI Model Part 2 (14:14)
  • 15. TCPIP Model (2:49)
  • 16.Default Gateway (7:10)
  • 17.Demonstration (11:47)
  • 18.Network Architecture Components (17:09)
  • 19.Types of Network (5:12)
  • 20.TCP Commands (9:02)
  • 21.Resources 2 (1:10)

Defense in Depth

  • 22.Defense in Depth (4:16)
  • 23.Important Definitions Part 1 (12:28)
  • 24. Important Definitions Part 2 (4:42)
  • 26.Compliance (8:50)
  • 25.Due Care and Due Diligence (8:42)
  • 27.Security Documents (15:35)
  • 30.The Relationship Between Security Document Types (3:08)
  • 28.Security Document Types (5:17)
  • 29. Policy Sample (3:14)
  • 30.The Relationship Between Security Document Types (3:08)
  • 31.Access Control (6:43)
  • 32.Authorization (19:22)
  • 33.Authentication (18:50)
  • 34. Single Sign on SSO (12:59)
  • 35.Access Control Attack (1:43)
  • 36.Password Hacking techniques (8:43)
  • 37.Default Password (5:28)
  • 38.Important tool 2 (14:33)
  • 39.Cain in Action (18:22)
  • 40.Xhydra (7:33)
  • 41.Ncrack (8:44)
  • 42. Web application vulnerability (0:58)
  • 43. DVWA (9:14)
  • 44.Hackthissite (3:11)
  • What is SQL Injection (14:09)
  • SQL Injection attack 1 (7:57)
  • 47. SQL Injection attack 2 (14:06)
  • 48. XSS Introduction (3:03)
  • 49. Reflected XSS (12:43)
  • 50.Stored XSS (5:18)
  • 51.Major Web Application vulnerabilities (3:06)

Internet Security Technologies

  • 52.Introduction (3:11)
  • 53..Introduction to Maleware (5:16)
  • 54.Types of Malware (10:11)
  • 55.Create a virus (6:25)
  • 56.Creating a Virus using a Tool (2:44)
  • 57.Can I Bypass the AV (4:25)
  • 58.Introduction to Denail of Service (13:30)
  • 59.Denial of Service Attack Demonstration 1 (11:01)
  • 60.Denial of Service Attack Demonstration 2 (9:14)
  • 61.Denial of Service Attack Demonstration 3 (6:49)
  • 62.What is Buffer Overflow (5:32)
  • 63.How to search for Buffer Overflow (14:09)
  • 64.Buffer Overflow Part 1 (48:31)
  • 65.Buffer Overflow Part 2 (16:37)
  • 66. Buffer Overflow Part 3 (26:09)
  • 67.IDS, Firewalls, Honeypots (2:45)
  • 68.Honeypots (10:12)
  • 69.Firewalls (12:06)
  • 70..Intrusion Detection System – IDS (4:22)
  • 71. What is Social Engineering – (5:28)
  • 72.Fake Email – Spoofing (6:17)
  • 73.Social Engineering Toolkit (4:45)
  • 74.Phising Credential Harvest – (13:16)
  • 75.Advanced Social engineering technique (19:03)
  • 76.Network Scanning Overview (5:21)
  • 77.Important Scanning Defination (13:19)
  • 79.Network Scanning Methology (2:55)
  • 80.Identifying Live system (6:40)
  • 81.Port Scanning (9:29)
  • 82.Advanced Scanning Techniques (7:23)

OS Security

  • 1. Introduction (3:53)
  • 1. Securing Passwords 2 (9:23)
  • 2. Securing Operating Systems 2 (9:34)
  • 3. Firewalls 2 (10:56)
  • 4. Securing Network Switches 2 (8:51)
  • 5. Securing Network Routers 2 (7:46)
  • 6. Securing Wireless Networks 2 (9:28)
  • 7. IDS, IPS, and Honeypots 2 (10:56)
  • 8. Antiviruses 2 (9:03)
  • 83.OS Security (1:11)
  • 9. Encryption 2 (5:12)
  • 10. Physical Security 2 (7:08)

 

.rTable { display: table; width: 100%;}
.rTableRow { display: table-row; }
.rTableHeading { background-color: #ddd; display: table-header-group; }
.rTableCell, .rTableHead { display: table-cell; padding: 3px 10px; border: 1px solid #999999; }
.rTableHeading { display: table-header-group; background-color: #ddd; font-weight: bold; }
.rTableFoot { display: table-footer-group; font-weight: bold; background-color: #ddd; }
.rTableBody { display: table-row-group; }

$120   $26 – GSEC Certification -Security Essentials – Mohamed Atef

Invest in endless knowledge with the GSEC Certification -Security Essentials – Mohamed Atef course at GBESY.biz! Gain lifetime access to premium digital content designed to fuel your professional and personal growth.

  • Lifetime Access: Unrestricted, permanent access to your purchased courses.
  • Unbeatable Value: Save significantly with prices up to 80% less than direct purchases.
  • Protected Payments: Complete your transactions securely.
  • Empowering Skills: Learn practical, in-demand skills for immediate application.
  • Immediate Download: Access your course content instantly after purchase.
  • Any Device, Anywhere: Study on your preferred device with full flexibility.

Discover your next opportunity with GBESY.biz!

Status

Language

Author

Reviews

There are no reviews yet.

Be the first to review “GSEC Certification -Security Essentials – Mohamed Atef”

Your email address will not be published. Required fields are marked *

Back to Top