Skip to content
Sale

GSEC Certification – Security Essentials – Mohamed Atef

Rated 0 out of 5
(be the first to review)

$34.00

Take The Next Step in Information Security Career With GSEC Certification

Purchase this course you will earn 34 Points = $3.40!
Category:

Description

Purchase GSEC Certification – Security Essentials – Mohamed Atef Course at eBokly. We actively participate in group buys and are committed to sharing knowledge with a wider audience. What's more, our courses maintain the same quality as the original sale page. You have the option to buy directly from the sale page at the full price (sale page link is provided within the post).

GSEC Certification – Security Essentials

Take The Next Step in Information Security Career With GSEC Certification

Course Curriculum

Introduction

  • 0. Introduction (0:35)
  • 1. Your Instructor (2:00)
  • 2.GSEC Exam (4:33)t
  • 3. Course Ouline (6:16)
  • How to get the course materials and access to the students portal (3:28)

Build GSEC lab

  • 4.Lab Requirement (1:51)
  • 5.Download the requirement (10:04)
  • 6.Setup the Lab Part 1 (8:32)
  • 7.Setup the lab Part 2 (4:51)
  • 8.Setup the lab Part 3 (10:01)
  • 9.Setup the lab Part 4 (5:41)

Networking Concepts

  • 10.Introduction (1:55)
  • 11.Network Basics (12:07)
  • 12.Internet Protocol – IP (16:12)
  • 13.OSI Model Part 1 (14:42)
  • 14.OSI Model Part 2 (14:14)
  • 15. TCPIP Model (2:49)
  • 16.Default Gateway (7:10)
  • 17.Demonstration (11:47)
  • 18.Network Architecture Components (17:09)
  • 19.Types of Network (5:12)
  • 20.TCP Commands (9:02)
  • 21.Resources 2 (1:10)

Defense in Depth

  • 22.Defense in Depth (4:16)
  • 23.Important Definitions Part 1 (12:28)
  • 24. Important Definitions Part 2 (4:42)
  • 26.Compliance (8:50)
  • 25.Due Care and Due Diligence (8:42)
  • 27.Security Documents (15:35)
  • 30.The Relationship Between Security Document Types (3:08)
  • 28.Security Document Types (5:17)
  • 29. Policy Sample (3:14)
  • 30.The Relationship Between Security Document Types (3:08)
  • 31.Access Control (6:43)
  • 32.Authorization (19:22)
  • 33.Authentication (18:50)
  • 34. Single Sign on SSO (12:59)
  • 35.Access Control Attack (1:43)
  • 36.Password Hacking techniques (8:43)
  • 37.Default Password (5:28)
  • 38.Important tool 2 (14:33)
  • 39.Cain in Action (18:22)
  • 40.Xhydra (7:33)
  • 41.Ncrack (8:44)
  • 42. Web application vulnerability (0:58)
  • 43. DVWA (9:14)
  • 44.Hackthissite (3:11)
  • What is SQL Injection (14:09)
  • SQL Injection attack 1 (7:57)
  • 47. SQL Injection attack 2 (14:06)
  • 48. XSS Introduction (3:03)
  • 49. Reflected XSS (12:43)
  • 50.Stored XSS (5:18)
  • 51.Major Web Application vulnerabilities (3:06)

Internet Security Technologies

  • 52.Introduction (3:11)
  • 53..Introduction to Maleware (5:16)
  • 54.Types of Malware (10:11)
  • 55.Create a virus (6:25)
  • 56.Creating a Virus using a Tool (2:44)
  • 57.Can I Bypass the AV (4:25)
  • 58.Introduction to Denail of Service (13:30)
  • 59.Denial of Service Attack Demonstration 1 (11:01)
  • 60.Denial of Service Attack Demonstration 2 (9:14)
  • 61.Denial of Service Attack Demonstration 3 (6:49)
  • 62.What is Buffer Overflow (5:32)
  • 63.How to search for Buffer Overflow (14:09)
  • 64.Buffer Overflow Part 1 (48:31)
  • 65.Buffer Overflow Part 2 (16:37)
  • 66. Buffer Overflow Part 3 (26:09)
  • 67.IDS, Firewalls, Honeypots (2:45)
  • 68.Honeypots (10:12)
  • 69.Firewalls (12:06)
  • 70..Intrusion Detection System – IDS (4:22)
  • 71. What is Social Engineering – (5:28)
  • 72.Fake Email – Spoofing (6:17)
  • 73.Social Engineering Toolkit (4:45)
  • 74.Phising Credential Harvest – (13:16)
  • 75.Advanced Social engineering technique (19:03)
  • 76.Network Scanning Overview (5:21)
  • 77.Important Scanning Defination (13:19)
  • 79.Network Scanning Methology (2:55)
  • 80.Identifying Live system (6:40)
  • 81.Port Scanning (9:29)
  • 82.Advanced Scanning Techniques (7:23)

OS Security

  • 1. Introduction (3:53)
  • 1. Securing Passwords 2 (9:23)
  • 2. Securing Operating Systems 2 (9:34)
  • 3. Firewalls 2 (10:56)
  • 4. Securing Network Switches 2 (8:51)
  • 5. Securing Network Routers 2 (7:46)
  • 6. Securing Wireless Networks 2 (9:28)
  • 7. IDS, IPS, and Honeypots 2 (10:56)
  • 8. Antiviruses 2 (9:03)
  • 83.OS Security (1:11)
  • 9. Encryption 2 (5:12)
  • 10. Physical Security 2 (7:08)

Get GSEC Certification – Security Essentials – Mohamed Atef, Only Price $37


Tag: GSEC Certification – Security Essentials – Mohamed Atef Review. GSEC Certification – Security Essentials – Mohamed Atef download. GSEC Certification – Security Essentials – Mohamed Atef discount.


Purchase the GSEC Certification – Security Essentials – Mohamed Atef course at the best price at eBokly. Upon completing your purchase, you will gain access to the downloads page. where you can conveniently retrieve all associated course files. Additionally, we will send you a download notification email to your registered mail.

Unlock your full potential with our GSEC Certification – Security Essentials – Mohamed Atef courses. Our courses are meticulously designed to empower you with the skills and knowledge needed for excellence.

Why wait? Take the first step towards greatness by acquiring our GSEC Certification – Security Essentials – Mohamed Atef courses today. We ensure a smooth and secure purchasing experience that guarantees your peace of mind. Rest assured that your financial information is safeguarded through our trusted payment gateways, Stripe and PayPal.

Stripe, renowned for its robust security measures, offers a secure and dependable payment process. Your sensitive data is encrypted using state-of-the-art technology, ensuring its confidentiality throughout the transaction.

PayPal, a globally recognized payment platform, adds an extra layer of security. With its buyer protection program, you can make your purchase with confidence, knowing that your financial details are protected, allowing you to focus on your learning journey.

Is it secure? to Use of?
  • Rest assured, your identity remains completely confidential. We do not share your information with anyone, ensuring the utmost security when you buy the GSEC Certification – Security Essentials – Mohamed Atef course.
  • 100% Safe Checkout Privateness coverage
  • We employ robust communication and encryption methods to protect sensitive information. All card numbers are encrypted using AES at rest-256, and the transmission of card numbers occurs in a separate hosting environment, without sharing or storing any data.
How Will the Course Be Delivered?
  • Upon successful payment for the “GSEC Certification – Security Essentials – Mohamed Atef course”, Most of the products will come to you immediately. But for some products were posted for offer. Please wait for our response, it might take a few hours due to the time zone difference.
  • If this occurs, kindly be patient. Our technical department will process the link shortly, and you will receive notifications directly via email. Your patience is greatly appreciated.
What Shipping Methods Are Available?
  • You will receive a download link in the invoice or in YOUR ACCOUNT.
  • The course link is always accessible. Simply log in to your account to download the GSEC Certification – Security Essentials – Mohamed Atef course whenever you need.
  • You can study online or download the content for better results, making it accessible from any device. Ensure your system does not go to sleep during the download process..
How Do I Track Order?
  • We promptly update the status of your order following your payment. If, after 7 days, there is no download link provided, the system will automatically process a refund..
  • We love to hear from you. Please don’t hesitate to email us with any comments, questions and suggestions.

Reviews

There are no reviews yet.

Leave a customer review
Cart
Back To Top