Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

GIAC® Security Essentials Certification (GSEC)

Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques.

GK# 100373

$795 - $4195 USD

Enroll Request Group Training

Course Overview

TOP

With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization's network depends on the effectiveness of the organization's defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:

  • What is the risk?
  • Is it the highest priority risk?
  • What is the most cost-effective way to reduce the risk?

Security is all about making sure you focus on the right areas of defense. You will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations.

 

Learn more about this topic. View the recorded webinar Deploying MITRE ATT&CK Navigator to Improve Incident Response.

 

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Limited Time Offer: This course is 25% off! Use promo code 25GTR at checkout.
  • Access Period:

$

Class is Full
This session is full. Please select a different session.

What You'll Learn

TOP

To develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand
To analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security
Practical tips and tricks to focus in on high-priority security problems within your organization and on doing the right things that will lead to security solutions that work
Why some organizations are winning and some are losing when it comes to security and, most importantly, how to be on the winning side
The core areas of security and how to create a security program that is anchored on PREVENT-DETECT-RESPOND.

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

Chapter 1: Information Security and the GIAC Seuciryt Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Network Security
Chapter 6: Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Physical Security
Chapter 14: Wireless Technologies
Chapter 15: VoIP

Who Should Attend

TOP

Anyone who works in security, is interested in security, or has to understand security should take this course

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience live, expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

On-Demand

Train at your own pace with 24/7 access to courses that help you acquire must-have technology skills.



Request this course in a different delivery format.
Enroll