On this accelerated Firebrand course, you'll prove you’re qualified for hands-on IT system security tasks and get GIAC GSEC certified in just five days. Fill the gaps in your IT security knowledge and build a solid foundation of security skills, principles and techniques – this certification is ideal for entry-level security professionals, operations personnel and managers alike.
You’ll learn how to design and build network architecture, run Windows/Linux command line tools, install VMware to create virtual machines and design an effective security policy for your organisation.
Apply your new knowledge within your organisation immediately. On Firebrand's accelerated GSEC course, you’ll study:
Firebrand's course will prepare you for the GIAC Security Essentials (GSEC) exam certification and provides knowledge equivalent to the SANS SEC401: Security Essentials
See prices now to find out how much you could save when you train at twice the speed.
Think you are ready for the course? Take a FREE practice test to assess your knowledge!
Other accelerated training providers rely heavily on lecture and independent self-testing and study.
Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.
This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.
802.11 Attacks & countermeasures
Different 802.11 protocols, common wireless attacks and how to prevent them.
Access Control Theory
The fundamental theory of access control.
Alternate Network Mapping Techniques
Network mapping techniques an attacker might use to examine wireless networks, and public switched telephony networks. You will also learn how to identify the basic penetration techniques at a high level.
Authentication and Password Management
The role of authentication controls, how they are managed, and the methods used to control access to systems.
Common Types of Attacks
Identify the most common attack methods, as well as the basic strategies used to mitigate those threats.
Critical aspect of contingency planning with a Business Continuity Plan (BCP) and Disaster Recover Plan (DRP).
Critical Security Controls
The background, history and purpose of the Critical Security Controls.
Demonstrate a high-level understanding of the mathematical concepts which contribute to modern cryptography.
Core concepts of cryptography and the three main algorithms.
The terminology and concepts of Risk and Defense-in-Depth, including threats and vulnerabilities.
High-level understanding of the Domain Name System architecture.
Fundamental understanding of firewalling technologies and techniques.
Basic honeypot techniques and common tools used to set up honeypots.
The structure and purpose of ICMP, as well as the fields in a ICMP datagram header.
Incident Handling Fundamentals
The concepts of incident handling and the six-step incident handling process.
Information warfare methods and defense.
Intrusion Detection Overview
Overall concepts of Intrusion Detection.
Build an understanding of how the IP protocol works.
Demonstrate a high-level understanding of how IPS systems operate.
Develop a high-level understanding of the IPv6 protocol.
Legal Aspects of Incident Handling
The basic legal issues in incident and evidence handling.
Linux/Unix Configuration Fundamentals
Linux/Unix fundamental configuration settings, including file permissions, user accounts, groups, and passwords, and commands used to display information and run backups.
Linux/Unix Logging and Log Management
Various logging capabilities and log file locations common to Linux operating systems.
Linux/Unix OS Security Tools and Utilities
How to use key security utilities and tools that are available for Linux/Unix systems, including file integrity, host firewalls, and applications such as SELinux.
Different variants of Linux/Unix, the Linux file system, and important commands.
Linux/Unix Patch Management
Process of patch management, best practices, and common patch management tools and techniques for Linux/Unix systems.
Linux/Unix Process and Service Management
How to manage Linux/Unix processes, run levels, and services, and best practices for common processes and services.
Details of the famous Mitnick-Shimomura attack, as well as what we can learn from this attack to appropriately protect our networks today against these vulnerabilities. You will also demonstrate an understanding of the strategies that would have prevented the Mitnick attack.
Essentials of IP addressing, subnets, CIDR and netmasks.
Basic network hardware, topologies and, architectures.
Network Mapping and Scanning
The common tools attackers use to scan systems and the techniques used to create a network map.
Properties and functions of network protocols and network protocol stacks.
Purpose and components of policy.
Protecting Data at Rest
Functionality of PGP cryptosystems and how they operate.
Public Key Infrastructure PKI
How PKI works and the key components for managing keys.
How to decode a packet from hexadecimal output.
Terminology and basic approaches to Risk Management.
Securing Windows Server Services
Basic measures in securing Windows IIS, SQL, and Terminal Servers.
The different methods of steganography, as well as some of the common tools used to hide data with steganography.
The structure and purpose of TCP, as well as the fields in a TCP datagram header.
The structure and purpose of UDP, as well as the fields in a UDP datagram header.
Virtual Private Networks VPNs
Build a high-level understanding of VPNs and identify IPSec and non-IPSec protocols used for VPN communications.
Viruses and Malicious Code
You will demonstrate an understanding of what malicious code is, how it propagates and why it is such an expensive problem. Additionally, you will demonstrate an understanding of the attack vectors leveraged by recent malicious code attacks.
Vulnerability Management Overview
Demonstrate the ability to perform reconnaissance and resource protection to manage vulnerabilities, and address threats and vectors.
How data generated from a port scanner like nmap, and vulnerability assessment tools like nessus can be used to examine systems, ports and applications in more depth to secure an environment.
Web Application Security
Build an understanding of web application security and common vulnerabilities including CGI, cookies, SSL and active content.
The techniques and technologies used to audit Windows hosts.
Windows Automation and Configuration
The techniques and technologies used to automate configuration.
Windows Network Security Overview
Basic measures in securing a Windows host, including managing services and VPNs.
Windows Permissions & User Rights
How permissions are applied in the Windows NT File System, Shared Folder, Encrypting File System, Printer, Registry Key, Active Directory, and how User Rights are applied.
Windows Security Templates & Group Policy
The features and functionality of Group Policy and best practices for locking down systems.
Windows Service Packs, Hotfixes and Backups
How to manage Windows Service Packs and Hotfixes, as well as backups and restoration for a network of Windows hosts.
Windows Workgroups, Active Directory and Group Policy Overview
Basic security infrastructure of local accounts, workgroups, Active Directory and Group Policy.
Build a fundamental understanding of wireless technologies including Bluetooth and Zigbee.
This course will prepare you for the following exam. The exam fee is not included in the course price. If you wish to take the exam, we’ll provide instructions on how to register with GIAC.
GIAC Security Essentials (GSEC)
You will be required to renew your GSEC certification every four years through Continuing Professional Experience (CPE) credits.
Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.
Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.
Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.
We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on +32 (0)2 234 77 05.
There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.
Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.
Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year. Students will only be responsible for accommodations and vendor exam fees.
You do not need to possess any prerequisites for this certification.
Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.
Just call us on +32 (0)2 234 77 05 and speak to one of our enrolment consultants.
Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.
Here's the Firebrand Training review section. Since 2001 we've trained exactly 72,589 students and asked them all to review our Accelerated Learning. Currently, 96.77% have said Firebrand exceeded their expectations.
Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.
"Excellent delivery and great facility."
David Chisholm, Rolls Royce. (21/10/2019 to 25/10/2019)
"Very informative. Lecturer was very knowledgeable on a wide variety of subjects. A pleasure being bombarded with so much information."
Japie Van Der Merwe, SBM. (8/7/2019 to 12/7/2019)
"It was a very useful experience and I feel more confident in my ability to pass the exam."
Anonymous. (8/7/2019 to 12/7/2019)
"Instructor was very good."
ADAM CHRISTIE, SBM. (22/10/2018 to 26/10/2018)
"The training instructor was excellent and had so much past experience and knowledge. He shared many important stories that we can take away and use in our day jobs. "
G.C.. (22/10/2018 to 26/10/2018)