Autoplay
Autocomplete
Previous Lesson
Complete and Continue
GSEC Certification - Security Essentials
Introduction
0. Introduction (0:35)
1. Your Instructor (2:00)
2.GSEC Exam (4:33)
3. Course Ouline (6:16)
Build GSEC lab
4.Lab Requirement (1:51)
5.Download the requirement (10:04)
6.Setup the Lab Part 1 (8:32)
7.Setup your lab Part 2 (4:51)
8.Setup the lab Part 3 (10:01)
9.Setup the lab Part 4 (5:41)
Networking Concepts
10.Introduction (1:55)
11.Network Basics (12:07)
12.Internet Protocol – IP (16:12)
13.OSI Model Part 1 (14:42)
14.OSI Model Part 2 (14:14)
15. TCPIP Model (2:49)
16.Default Gateway (7:10)
17.Demonstration (11:47)
18.Network Architecture Components (17:09)
19.Types of Network (5:12)
20.TCP Commands (9:02)
21.Resources 2 (1:10)
Defense in Depth
22.Defense in Depth (4:16)
23.Important Definitions Part 1 (12:28)
24. Important Definitions Part 2 (4:42)
25.Due Care and Due Diligence (8:42)
26.Compliance (8:50)
27.Security Documents (15:35)
28.Security Document Types (5:17)
29. Policy Sample (3:14)
30.The Relationship Between Security Document Types (3:08)
31.Access Control (6:43)
32.Authorization (19:22)
33.Authentication (18:50)
34. Single Sign on SSO (12:59)
35.Access Control Attack (1:43)
36.Password Hacking techniques (8:43)
37.Default Password (5:28)
38.Important tool 2 (14:32)
39.Cain in Action (18:22)
40.Xhydra (7:33)
41.Ncrack (8:44)
42. Web application vulnerability (0:58)
43. DVWA (9:14)
44.Hackthissite (3:11)
What is SQL Injection (14:09)
SQL Injection attack 1 (7:57)
47. SQL Injection attack 2 (14:06)
48. XSS Introduction (3:03)
49. Reflected XSS (12:43)
50.Stored XSS (5:18)
51.Major Web Application vulnerabilities (3:06)
Internet Security Technologies
52.Introduction (3:11)
53..Introduction to Maleware (5:16)
54.Types of Malware (10:11)
55.Create a virus (6:25)
56.Creating a Virus using a Tool (2:44)
57.Can I Bypass the AV (4:25)
58.Introduction to Denail of Service (13:30)
59.Denial of Service Attack Demonstration 1 (11:01)
60.Denial of Service Attack Demonstration 2 (9:14)
61.Denial of Service Attack Demonstration 3 (6:49)
62.What is Buffer Overflow (5:32)
63.How to search for Buffer Overflow (14:09)
64.Buffer Overflow Part 1 (48:31)
65.Buffer Overflow Part 2 (16:37)
66. Buffer Overflow Part 3 (26:09)
67.IDS, Firewalls, Honeypots (2:45)
68.Honeypots (10:12)
69.Firewalls (12:06)
70..Intrusion Detection System - IDS (4:22)
71. What is Social Engineering - (5:28)
72.Fake Email - Spoofing (6:17)
73.Social Engineering Toolkit (4:45)
74.Phising Credential Harvest - (13:16)
75.Advanced Social engineering technique (19:03)
76.Network Scanning Overview (5:21)
77.Important Scanning Defination (13:18)
79.Network Scanning Methology (2:55)
80.Identifying Live system (6:40)
81.Port Scanning (9:29)
82.Advanced Scanning Techniques (7:23)
OS Security
83.OS Security (1:11)
Introduction 2 (0:56)
1. Securing Passwords 2 (9:23)
2. Securing Operating Systems 2 (9:34)
3. Firewalls 2 (10:56)
4. Securing Network Switches 2 (8:51)
5. Securing Network Routers 2 (7:46)
6. Securing Wireless Networks 2 (9:28)
7. IDS, IPS, and Honeypots 2 (10:56)
8. Antiviruses 2 (9:03)
9. Encryption 2 (5:12)
10. Physical Security 2 (7:08)
28.Security Document Types
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock