Requesting more information and/or the current price of this training is easy. We'll take any current promotions, subsidies, or customer discounts into account.
Vanaf juni 2020 is deze training weer klassikaal maar desgewenst ook nog Live Online bij te wonen. Je volgt de training dan live op afstand met onze eigen docent, kijkt mee met de aantekeningen op het whiteboard, doet mee met alle labs en kunt vragen stellen aan zowel de trainer als je mede-cursisten. Eigenlijk dus gewoon alsof je bij de klassikale training aanwezig bent, maar dan vanaf je eigen locatie. Mocht de training Live Online toch niet helemaal naar wens zijn geweest, dan mag je deze binnen een jaar kosteloos nogmaals klassikaal bij ons bijwonen.
De GSEC training legt het gewenste fundament voor IT professionals en -managers die betrokken zijn bij het technisch beveiligen van hun organisatie en meer willen weten dan concepten en terminologie alleen. Na een introductie over de werking van netwerken, netwerkprotocollen, het analyseren van netwerkverkeer, firewalls en routers, krijg je een brede overview van kwetsbaarheden, beveiligingstechnieken en defense-in-depth oplossingen aan de hand van praktische labs.
Deze training stelt je in staat oplossingen te bieden tegen dagelijkse bedreigingen (bijvoorbeeld voor Microsoft en Linux omgevingen), Advanced Persistent Threats, een IT omgeving te monitoren op kwaadaardige activiteit, kwetsbaarheden te identificeren en een omgeving daartegen te hardenen en beveiligen. Hierbij wordt ondermeer gebruik gemaakt van populaire tools als WireShark, Dumpsec, nmap en Splunk.
Centraal staat een risk-georiënteerde aanpak zodat ook nieuwe technische risico's en bedreigingen na deze training goed ingeschat en geanalyseerd kunnen worden zodat de aandacht op het juiste moment naar de juiste werkzaamheden gaat.
Deze GSEC training is een ideale voorbereiding op het GIAC Security Essentials (GSEC) examen en behandelt praktijkgericht de onderwerpen uit de SEC401: Security Essentials training.
Security professionals die zoeken naar een beter begrip van technische informatiebeveiliging, Systeem- netwerkbeheerders, Managersdie meer 'handen-en-voeten' willen geven aan hun kennis van informatiebeveiligings begrippen en -concepten, IT architecten. Basiskennis van IT, netwerken en security is vereist voor deelname.
5 dagen
Onze GSEC training sluit aan op onderstaande exam objectives die als volgt gedefinieerd worden op de GIAC website:
The candidate will understand the fundamental theory of access control and the role of passwords in managing access control.
The candidate will demonstrate a high-level understanding of what Active Defense is and the tools, methods, and techniques needed to utilize it effectively.
The candidate will be able to explain what APT is and the basic strategies on how they operate, defense methods, and attack remediation.
The candidate will understand the critical aspect of contingency planning with a business continuity plan and disaster recovery plan
The candidate will understand the purpose, implementation, and background of the Critical Security Controls
The candidate will have a basic understanding of the concepts of cryptography, including a high-level understanding of the major types of cryptosystems and steganography.
The candidate will have a basic understand of the mathematical concepts that contribute to cryptography and identify commonly used symmetric, asymmetric, and hashing cryptosystems.
The candidate will have a high-level understanding of the use, functionality, and operation of VPNs, GPG, and PKI
The candidate will understand what defense in depth is and an identify the key areas of security and demonstrate the different strategies for implementing effective security within an organization.
The candidate will demonstrate how to architect a network to be monitored and controlled to resist intrusion.
The candidate will demonstrate a basic understanding of the function and uses of endpoint security devices, such as endpoint firewalls, HIDS, and HIPS
The candidate will have a high-level understanding of the features of Group Policy and working with INF security templates
The candidate will understand the concepts of incident handling and the processes and areas of law pertaining to incident handling.
The candidate will understand the terminology and approaches to cyber security risk management including identification of the steps of the Threat Assessment process
The candidate will demonstrate understanding of a variety of Linux operating systems, including mobile systems, to better understand how to configure and secure Linux.
The candidate will demonstrate an ability to gain visibility into a Linux system to be able to secure and harden the system.
The candidate will demonstrate an understanding of the use of system baselines, log files, and other tools common to Linux operating systems in order to better monitor systems for signs of attack.
The candidate will demonstrate an understanding of how to use key security utilities and tools that are available for Linux systems to enhance system security.
The candidate will demonstrate a high-level understanding of the importance of logging, the setup and configuration of logging, and log analysis with the assistance of SIEMs
The candidate will understand important attack methods and basic defensive strategies to mitigate those threats.
The candidate will have a basic understanding of the risks of network devices and how to secure them.
The candidate will demonstrate a basic understanding of the function and uses of network security devices, such as, firewalls, NIDS, and NIPS
The candidate will demonstrate an understanding of the properties and functions of network protocols and network protocol stacks.
The candidate will know how to take basic measures in securing Windows network services such as IPSec, IIS, and Remote Desktop Services
The candidate will understand the purpose and components of policy.
The candidate will have a basic understanding of the risks of virtualization and cloud services and how to secure them.
The candidate will demonstrate an understanding of the concepts and relationship behind reconnaissance, resource protection, risks, threats, and vulnerabilities including preliminary abilities to create network maps and perform penetration testing techniques
The candidate will demonstrate an understanding of web application security and common vulnerabilities including CGI, cookies, SSL and active content.
The candidate will understand how permissions are applied in the Windows NT File System, Shared Folders, Printers, Registry Keys, and Active Directory, and how Privileges are applied
The candidate will be introduced to the techniques and technologies used to audit Windows hosts.
The candidate will identify the differences between types of Windows OSes and how Windows manages groups and accounts, locally and with Active Directory and Group Policy
The candidate will understand how to manage service packs and hotfixes for a network of Windows hosts and understand best practices for backups and restoration of a Windows host
The candidate will have a basic understanding of the misconceptions and risks of wireless networks and how to secure them.
Note: The GSEC and GIAC marks are the property of GIAC, TSTC is not affiliated with nor endorsed by SANS or GIAC
Train smarter, not harder. TSTC’s unique method ensures you actually master the skills—and pass with confidence.
Learn more about TSTC