Unlock Expert Knowledge: Discover the Premium GSEC Certification – Security Essentials – Mohamed Atef Course Exclusively at GBESY. Elevate your skills and achieve career success by learning from world-renowned instructors and industry experts through our extensive library of premium self-paced courses.
We join Groupbuy AND always try to share knowledge with more people. Especially the quality is the same as salepage. You can buy directly at salepage, with full price. (link SALEPAGE are mounted directly on the post)
GSEC Certification – Security Essentials – Mohamed Atef
Take The Next Step in Information Security Career With GSEC Certification
Course Curriculum
Introduction
- 0. Introduction (0:35)
- 1. Your Instructor (2:00)
- 2.GSEC Exam (4:33)t
- 3. Course Ouline (6:16)
- How to get the course materials and access to the students portal (3:28)
Build GSEC lab
- 4.Lab Requirement (1:51)
- 5.Download the requirement (10:04)
- 6.Setup the Lab Part 1 (8:32)
- 7.Setup the lab Part 2 (4:51)
- 8.Setup the lab Part 3 (10:01)
- 9.Setup the lab Part 4 (5:41)
Networking Concepts
- 10.Introduction (1:55)
- 11.Network Basics (12:07)
- 12.Internet Protocol – IP (16:12)
- 13.OSI Model Part 1 (14:42)
- 14.OSI Model Part 2 (14:14)
- 15. TCPIP Model (2:49)
- 16.Default Gateway (7:10)
- 17.Demonstration (11:47)
- 18.Network Architecture Components (17:09)
- 19.Types of Network (5:12)
- 20.TCP Commands (9:02)
- 21.Resources 2 (1:10)
Defense in Depth
- 22.Defense in Depth (4:16)
- 23.Important Definitions Part 1 (12:28)
- 24. Important Definitions Part 2 (4:42)
- 26.Compliance (8:50)
- 25.Due Care and Due Diligence (8:42)
- 27.Security Documents (15:35)
- 30.The Relationship Between Security Document Types (3:08)
- 28.Security Document Types (5:17)
- 29. Policy Sample (3:14)
- 30.The Relationship Between Security Document Types (3:08)
- 31.Access Control (6:43)
- 32.Authorization (19:22)
- 33.Authentication (18:50)
- 34. Single Sign on SSO (12:59)
- 35.Access Control Attack (1:43)
- 36.Password Hacking techniques (8:43)
- 37.Default Password (5:28)
- 38.Important tool 2 (14:33)
- 39.Cain in Action (18:22)
- 40.Xhydra (7:33)
- 41.Ncrack (8:44)
- 42. Web application vulnerability (0:58)
- 43. DVWA (9:14)
- 44.Hackthissite (3:11)
- What is SQL Injection (14:09)
- SQL Injection attack 1 (7:57)
- 47. SQL Injection attack 2 (14:06)
- 48. XSS Introduction (3:03)
- 49. Reflected XSS (12:43)
- 50.Stored XSS (5:18)
- 51.Major Web Application vulnerabilities (3:06)
Lifetime support – Download unlimited when you buy GSEC Certification – Security Essentials – Mohamed Atef Course at [GB]esy. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
Internet Security Technologies
- 52.Introduction (3:11)
- 53..Introduction to Maleware (5:16)
- 54.Types of Malware (10:11)
- 55.Create a virus (6:25)
- 56.Creating a Virus using a Tool (2:44)
- 57.Can I Bypass the AV (4:25)
- 58.Introduction to Denail of Service (13:30)
- 59.Denial of Service Attack Demonstration 1 (11:01)
- 60.Denial of Service Attack Demonstration 2 (9:14)
- 61.Denial of Service Attack Demonstration 3 (6:49)
- 62.What is Buffer Overflow (5:32)
- 63.How to search for Buffer Overflow (14:09)
- 64.Buffer Overflow Part 1 (48:31)
- 65.Buffer Overflow Part 2 (16:37)
- 66. Buffer Overflow Part 3 (26:09)
- 67.IDS, Firewalls, Honeypots (2:45)
- 68.Honeypots (10:12)
- 69.Firewalls (12:06)
- 70..Intrusion Detection System – IDS (4:22)
- 71. What is Social Engineering – (5:28)
- 72.Fake Email – Spoofing (6:17)
- 73.Social Engineering Toolkit (4:45)
- 74.Phising Credential Harvest – (13:16)
- 75.Advanced Social engineering technique (19:03)
- 76.Network Scanning Overview (5:21)
- 77.Important Scanning Defination (13:19)
- 79.Network Scanning Methodology (2:55)
- 80.Identifying Live system (6:40)
- 81.Port Scanning (9:29)
- 82.Advanced Scanning Techniques (7:23)
OS Security
- 1. Introduction (3:53)
- 1. Securing Passwords 2 (9:23)
- 2. Securing Operating Systems 2 (9:34)
- 3. Firewalls 2 (10:56)
- 4. Securing Network Switches 2 (8:51)
- 5. Securing Network Routers 2 (7:46)
- 6. Securing Wireless Networks 2 (9:28)
- 7. IDS, IPS, and Honeypots 2 (10:56)
- 8. Antiviruses 2 (9:03)
- 83.OS Security (1:11)
- 9. Encryption 2 (5:12)
- 10. Physical Security 2 (7:08)
Unlock Expert Knowledge with the GSEC Certification – Security Essentials – Mohamed Atef Course on GBESY.
Access over 70,000 premium learning programs curated by leading experts and renowned authors at GBESY. Our GSEC Certification – Security Essentials – Mohamed Atef course provides actionable knowledge and real-world skills through:
- Expert Authors: Learn from renowned figures like John Overdurf, Conor Harris, Samir Kahlot, and more.
- Flexible Learning: Enjoy self-paced study for ultimate convenience.
- Comprehensive Resources: Benefit from detailed manuals and step-by-step guidance.
- Lifetime Access: Get ongoing learning with free updates.
- Secure Purchase: Your transactions are protected with 256-bit AES encryption and verified payment gateways (PayPal, Stripe).
- Instant Download: Access your GSEC Certification – Security Essentials – Mohamed Atef course immediately after payment from your account dashboard or via email. Learn on any device.