Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:


GIAC® Security Essentials Certification (GSEC)

Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques.

With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization's network depends on the effectiveness of the organization's defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:

  • What is the risk?
  • Is it the highest priority risk?
  • What is the most cost-effective way to reduce the risk?

Security is all about making sure you focus on the right areas of defense. You will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations.


Learn more about this topic. View the recorded webinar Deploying MITRE ATT&CK Navigator to Improve Incident Response.


GK# 100373
Vendor Credits:
  • Global Knowledge Delivered Course
  • Training Exclusives
  • GSA Eligible
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.
Your Selections:
Access Period:
No available dates

Who Should Attend?

Anyone who works in security, is interested in security, or has to understand security should take this course

What You'll Learn

To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand
To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security
Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work
Why some organizations are winning and some are losing when it comes to security and, most importantly, how to be on the winning side
The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND.

Course Outline

Chapter 1: Information Security and the GIAC Seuciryt Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Network Security
Chapter 6: Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Physical Security
Chapter 14: Wireless Technologies
Chapter 15: VoIP


Related Certifications

GIAC Security Essentials (GSEC)