Our UK training centre is reopening in June. Learn more about it on our blog.

GIAC Security Essentials (GSEC)

- Bara 5 dagar

On this accelerated Firebrand course, you'll prove you’re qualified for hands-on IT system security tasks and get GIAC GSEC certified in just five days. Fill the gaps in your IT security knowledge and build a solid foundation of security skills, principles and techniques – this certification is ideal for entry-level security professionals, operations personnel and managers alike.

You’ll learn how to design and build network architecture, run Windows/Linux command line tools, install VMware to create virtual machines and design an effective security policy for your organisation.

Build a solid base of effective IT security knowledge with GSEC

Apply your new knowledge within your organisation immediately. On Firebrand's accelerated GSEC course, you’ll study:

Läs mer...

  • Networking concepts
  • Defense in-depth
  • Internet security technologies
  • Secure communications
  • Windows security
  • Unix/Linux security

Firebrand's course will prepare you for the GIAC Security Essentials (GSEC) exam certification and provides knowledge equivalent to the SANS SEC401: Security Essentials

Se Benefits...

Det tar bara ett ögonblick att se hur billig din kurs är...

Här är 8 skäl varför du ska genomföra din GSEC hos Firebrand Training:

  1. Du blir utbildad och certifierad på bara 5 dagar. Hos oss får du din utbildning och certifiering på rekordtid, en certifering du också genomför här på plats som en integrerad del av den intensiva, accelererade utbildningen.
  2. Allt är inkluderat. Ett engångsbelopp täcker alla kursmaterial, examen, boende och mat och erbjuder det mest kostnadseffektiva sättet att erhålla din GSEC kurs och certifiering på. Och detta utan några oannonserade ytterligare kostnader.
  3. Du klarar GSEC certifieringen första gången eller kan gå om kursen kostnadsfritt. Det är vår garanti. Vi är säkra på att du kommer klara din certifiering första gången. Men skulle du mot förmodan inte göra det kan du inom ett år komma tillbaks, delta i hela kursen igen, och bara betala för eventuella övernattningar och din examen. Allt annat är gratis.
  4. Du lär dig mer.Traditionella utbildningsdagar pågår kl. 09.00-16.00 med långa lunch- och fikapauser. Hos Firebrand Training får du minst 12 timmars effektiv och fokuserad kvalitetsutbildning varje dag tillsammans med din instruktör, utan vare sig privata eller arbetsrelaterade störande moment.
  5. Du lär dig GSEC snabbare. Vi kombinerar de tre inlärningsmetoderna (Presentation|Övning|Diskussion) så att vi därigenom genomför kursen på ett sätt som säkerställer att du lär dig snabbare och lättare.
  6. Du är i säkra händer.Vi har utbildat och certifierat 75.614 personer, vi är auktoriserad partner med alla de stora namnen i branschen och har dessutom vunnit åtskilliga utmärkelser med bland annat ”Årets Learning Partner 2010, 2011, 2012, 2013 och 2015” från Microsoft Danmark och Gazelle priset 2013 - 1. plats för region Själland i Danmark med en tillväxt om 1.430% sedan 2009.
  7. Du lär dig inte bara teorin. Vi har vidareutvecklat GSECkursen med fler praktiska övningar som ger dig det extra du behöver för att kunna lösa praktiska problemställningar och klara din certifiering.
  8. Du lär dig från de bästa. Våra instruktörer är de bästa i branschen och erbjuder en helt unik blandning av kunskap, praktisk erfarenhet och passion för att lära ut.

Är du redo för kursen? Ta ett KOSTNADSFRITT test för att mäta och utvärdera din kunskap.

Please Note

  • Examination vouchers not included for GIAC, CREST and CISSP CBK Review
  • On site testing not included for GIAC, CREST or ITIL Managers and Revision Certification Courses

Se Curriculum...

802.11 Attacks & countermeasures

Different 802.11 protocols, common wireless attacks and how to prevent them.

Access Control Theory

The fundamental theory of access control.

Alternate Network Mapping Techniques

Network mapping techniques an attacker might use to examine wireless networks, and public switched telephony networks. You will also learn how to identify the basic penetration techniques at a high level.

Authentication and Password Management

The role of authentication controls, how they are managed, and the methods used to control access to systems.

Common Types of Attacks

Identify the most common attack methods, as well as the basic strategies used to mitigate those threats.

Contingency Planning

Critical aspect of contingency planning with a Business Continuity Plan (BCP) and Disaster Recover Plan (DRP).

Critical Security Controls

The background, history and purpose of the Critical Security Controls.

Crypto Concepts

Demonstrate a high-level understanding of the mathematical concepts which contribute to modern cryptography.

Crypto Fundamentals

Core concepts of cryptography and the three main algorithms.

Defense-in-Depth

The terminology and concepts of Risk and Defense-in-Depth, including threats and vulnerabilities.

DNS

High-level understanding of the Domain Name System architecture.

Firewalls

Fundamental understanding of firewalling technologies and techniques.

Honeypots

Basic honeypot techniques and common tools used to set up honeypots.

ICMP

The structure and purpose of ICMP, as well as the fields in a ICMP datagram header.

Incident Handling Fundamentals

The concepts of incident handling and the six-step incident handling process.

Information Warfare

Information warfare methods and defense.

Intrusion Detection Overview

Overall concepts of Intrusion Detection.

IP Packets

Build an understanding of how the IP protocol works.

IPS Overview

Demonstrate a high-level understanding of how IPS systems operate.

IPv6

Develop a high-level understanding of the IPv6 protocol.

Legal Aspects of Incident Handling

The basic legal issues in incident and evidence handling.

Linux/Unix Configuration Fundamentals

Linux/Unix fundamental configuration settings, including file permissions, user accounts, groups, and passwords, and commands used to display information and run backups.

Linux/Unix Logging and Log Management

Various logging capabilities and log file locations common to Linux operating systems.

Linux/Unix OS Security Tools and Utilities

How to use key security utilities and tools that are available for Linux/Unix systems, including file integrity, host firewalls, and applications such as SELinux.

Linux/Unix Overview

Different variants of Linux/Unix, the Linux file system, and important commands.

Linux/Unix Patch Management

Process of patch management, best practices, and common patch management tools and techniques for Linux/Unix systems.

Linux/Unix Process and Service Management

How to manage Linux/Unix processes, run levels, and services, and best practices for common processes and services.

Mitnick-Shimomura

Details of the famous Mitnick-Shimomura attack, as well as what we can learn from this attack to appropriately protect our networks today against these vulnerabilities. You will also demonstrate an understanding of the strategies that would have prevented the Mitnick attack.

Network Addressing

Essentials of IP addressing, subnets, CIDR and netmasks.

Network Fundamentals

Basic network hardware, topologies and, architectures.

Network Mapping and Scanning

The common tools attackers use to scan systems and the techniques used to create a network map.

Network Protocol

Properties and functions of network protocols and network protocol stacks.

Policy Framework

Purpose and components of policy.

Protecting Data at Rest

Functionality of PGP cryptosystems and how they operate.

Public Key Infrastructure PKI

How PKI works and the key components for managing keys.

Reading Packets

How to decode a packet from hexadecimal output.

Risk Management

Terminology and basic approaches to Risk Management.

Securing Windows Server Services

Basic measures in securing Windows IIS, SQL, and Terminal Servers.

Steganography Overview

The different methods of steganography, as well as some of the common tools used to hide data with steganography.

TCP

The structure and purpose of TCP, as well as the fields in a TCP datagram header.

UDP

The structure and purpose of UDP, as well as the fields in a UDP datagram header.

Virtual Private Networks VPNs

Build a high-level understanding of VPNs and identify IPSec and non-IPSec protocols used for VPN communications.

Viruses and Malicious Code

You will demonstrate an understanding of what malicious code is, how it propagates and why it is such an expensive problem. Additionally, you will demonstrate an understanding of the attack vectors leveraged by recent malicious code attacks.

Vulnerability Management Overview

Demonstrate the ability to perform reconnaissance and resource protection to manage vulnerabilities, and address threats and vectors.

Vulnerability Scanning

How data generated from a port scanner like nmap, and vulnerability assessment tools like nessus can be used to examine systems, ports and applications in more depth to secure an environment.

Web Application Security

Build an understanding of web application security and common vulnerabilities including CGI, cookies, SSL and active content.

Windows Auditing

The techniques and technologies used to audit Windows hosts.

Windows Automation and Configuration

The techniques and technologies used to automate configuration.

Windows Network Security Overview

Basic measures in securing a Windows host, including managing services and VPNs.

Windows Permissions & User Rights

How permissions are applied in the Windows NT File System, Shared Folder, Encrypting File System, Printer, Registry Key, Active Directory, and how User Rights are applied.

Windows Security Templates & Group Policy

The features and functionality of Group Policy and best practices for locking down systems.

Windows Service Packs, Hotfixes and Backups

How to manage Windows Service Packs and Hotfixes, as well as backups and restoration for a network of Windows hosts.

Windows Workgroups, Active Directory and Group Policy Overview

Basic security infrastructure of local accounts, workgroups, Active Directory and Group Policy.

Wireless Overview

Build a fundamental understanding of wireless technologies including Bluetooth and Zigbee.

Se Exam Track...

This course will prepare you for the following exam. The exam fee is not included in the course price. If you wish to take the exam, we’ll provide instructions on how to register with GIAC.

GIAC Security Essentials (GSEC)

  • 180 questions
  • 5 hour time limit
  • 73% minimum passing score

You will be required to renew your GSEC certification every four years through Continuing Professional Experience (CPE) credits.

Se What's Included...

Included:

  • Official Firebrand courseware

Se Prerequisites...

You do not need to possess any prerequisites for this certification.

Är du redo för din Firebrand kurs?

Vi intervjuar alla potentiella deltagare om deras bakgrund, utbildning, certifiering och personliga inställning. Om du kommer igenom denna process så har du riktigt goda möjligheter att klara din certifiering.

Firebrand Training erbjuder en ambitiös utbildningsmiljö som förutsätter att du verkligen dedikerar dig till kursen. Ovanstående förkunskaper är endast vägledande, många deltagare med mindre erfarenhet men med en annan bakgrund eller kunskap har framgångsrikt genomfört sin utbildning hos Firebrand Training.

Om du funderar på huruvida du uppfyller rekommenderade förkunskaper vänligen ring oss på (0)8 52 50 01 66 och prata med en av våra utbildningsrådgivare som kan hjälpa dig.

Se När...

GIAC GSEC Kursdatum

Startar

Slutar

Tillgänglighet

Plats

Registrera

24/2/2020 (Måndag)

28/2/2020 (Fredag)

Avslutad

-

 

29/6/2020 (Måndag)

3/7/2020 (Fredag)

Väntelista

Rikstäckande

 

10/8/2020 (Måndag)

14/8/2020 (Fredag)

Begränsat antal platser

Rikstäckande

 

21/9/2020 (Måndag)

25/9/2020 (Fredag)

Platser tillgängliga

Rikstäckande

 

2/11/2020 (Måndag)

6/11/2020 (Fredag)

Platser tillgängliga

Rikstäckande

 

14/12/2020 (Måndag)

18/12/2020 (Fredag)

Platser tillgängliga

Rikstäckande

 

Vi har utbildat 75.614 kursdeltagare under 12 år. Vi har bett alla göra en utvärdering av vår accelererade utbildning. För närvarande har 96,76% sagt att Firebrand överträffat deras förväntningar:

"Excellent delivery and great facility."
David Chisholm, Rolls Royce. (21/10/2019 till 25/10/2019)

"Very informative. Lecturer was very knowledgeable on a wide variety of subjects. A pleasure being bombarded with so much information."
Japie Van Der Merwe, SBM. (8/7/2019 till 12/7/2019)

"It was a very useful experience and I feel more confident in my ability to pass the exam."
Anonymous. (8/7/2019 till 12/7/2019)

"Instructor was very good."
ADAM CHRISTIE, SBM. (22/10/2018 till 26/10/2018)

"The training instructor was excellent and had so much past experience and knowledge. He shared many important stories that we can take away and use in our day jobs. "
G.C.. (22/10/2018 till 26/10/2018)

Senaste recensioner från våra studenter