[O’REILLY] GIAC Security Essentials (GSEC)

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 2.9 GB
  • Uploaded By CourseClub
  • Downloads 231
  • Last checked 1 week ago
  • Date uploaded 4 years ago
  • Seeders 7
  • Leechers 1

Infohash : 3D437BCE71040C627E0F9F69806CF3C27CF61390



[O’REILLY] GIAC Security Essentials (GSEC)

GIAC Security Essentials (GSEC) Complete Video Course will provide the learner with everything they need to know for exam success, including all required key security concepts and terminologies, and effective techniques to detect and prevent all known attacks.

For More Courses Visit: https://Courseclub.me
For More Udemy Courses Visit: https://gigacourse.com

Files:

[CourseClub.Me] O`REILLY - GIAC Security Essentials (GSEC) 0. Websites you may like
  • [CourseClub.ME].url (0.1 KB)
  • [GigaCourse.Com].url (0.0 KB)
[0] Introduction
  • [0] GIAC Security Essentials (GSEC)_ Introduction.mp4 (9.4 MB)
[10] Lesson 8_ Defense in Depth and Defensible Network Architecture
  • [38] Learning objectives.mp4 (2.3 MB)
  • [39] 8.1 Defense in Depth Overview and Strategies.mp4 (21.2 MB)
  • [40] 8.2 Core Security Strategies.mp4 (6.5 MB)
  • [41] 8.3 Defensible Network Architectures.mp4 (14.7 MB)
[11] Lesson 9_ Active Defense
  • [42] Learning objectives.mp4 (1.9 MB)
  • [43] 9.1 Overview of Active Defense.mp4 (19.1 MB)
  • [44] 9.2 Active Defense Techniques.mp4 (18.6 MB)
  • [45] 9.3 Active Defense Tools.mp4 (37.0 MB)
[12] Lesson 10_ Endpoint Security
  • [46] Learning objectives.mp4 (2.6 MB)
  • [47] 10.1 Overview of Endpoint Security.mp4 (24.0 MB)
  • [48] 10.2 Host-based Intrusion Detection.mp4 (11.9 MB)
  • [49] 10.3 Host-based Intrusion Prevention.mp4 (14.0 MB)
  • [50] 10.4 Next-generation Endpoint Security Solutions.mp4 (15.7 MB)
[13] Module 3_ Threat Management
  • [51] Module introduction.mp4 (2.6 MB)
[14] Lesson 11_ Log Management & SIEM
  • [52] Learning objectives.mp4 (2.2 MB)
  • [53] 11.1 Overview of Logging.mp4 (30.2 MB)
  • [54] 11.2 Logging System Setup and Configuration.mp4 (15.6 MB)
  • [55] 11.3 Logging Analysis Fundamentals.mp4 (18.8 MB)
  • [56] 11.4 Core SIEM Activities.mp4 (21.7 MB)
  • [CourseClub.Me].url (0.1 KB)
  • [GigaCourse.Com].url (0.0 KB)
[15] Lesson 12_ Vulnerability Scanning and Penetration Testing
  • [57] Learning objectives.mp4 (2.6 MB)
  • [58] 12.1 Overview of Vulnerability Management.mp4 (36.4 MB)
  • [59] 12.2 Network Scanning.mp4 (42.1 MB)
  • [60] 12.3 Using Xenmap and Yersinia.mp4 (34.7 MB)
  • [61] 12.4 Penetration Testing.mp4 (55.4 MB)
[16] Lesson 13_ Virtualization and Cloud Security
  • [62] Learning objectives.mp4 (3.1 MB)
  • [63] 13.1 Overview of Virtualization and VM Security.mp4 (27.2 MB)
  • [64] 13.2 Cloud Models and Value Proposition.mp4 (75.6 MB)
  • [65] 13.3 Common Attacks Against Cloud Services.mp4 (32.9 MB)
  • [66] 13.4 Introduction to Microsoft Azure IAM.mp4 (46.6 MB)
[17] Module 4_ Cryptography, Risk Management, and Response
  • [67] Module introduction.mp4 (4.7 MB)
[18] Lesson 14_ Cryptography Concepts and Algorithms
  • [68] Learning objectives.mp4 (2.5 MB)
  • [69] 14.1 Overview of Cryptology and Cryptosystems.mp4 (27.3 MB)
  • [70] 14.2 Cryptographic Hashing.mp4 (27.0 MB)
  • [71] 14.3 Symmetric Key Cryptography.mp4 (18.4 MB)
  • [72] 14.4 Asymmetric Key Cryptography.mp4 (11.2 MB)
[19] Lesson 15_ Applied Cryptography
  • [73] Learning objectives.mp4 (2.2 MB)
  • [74] 15.1 Digital Signatures.mp4 (14.3 MB)
  • [75] 15.2 IPsec.mp4 (45.0 MB)
  • [76] 15.3 SSLTLS.mp4 (15.7 MB)
  • [77] 15.4 Public Key Infrastructure.mp4 (45.3 MB)
[1] Module 1_ Network Security Essentials
  • [1] Module introduction.mp4 (4.7 MB)
[20] Lesson 16_ Security Policy
  • [78] Learning objectives.mp4 (2.8 MB)
  • [79] 16.1 The Importance of Written Security Policies.mp4 (18.4 MB)
  • [80] 16.2 Standards, Guidelines, and Procedures.mp4 (16.8 MB)
  • [81] 16.3 Acceptable Use Policies.mp4 (9.0 MB)
  • [82] 16.4 Survey of Sample Policies.mp4 (46.1 MB)
[21] Lesson 17_ IT Risk Management
  • [83] Learning objectives.mp4 (2.2 MB)
  • [84] 17.1 Overview of Risk Management.mp4 (32.2 MB)
  • [85] 17.2 Risk Management Best Practices.mp4 (32.4 MB)
  • [86] 17.3 Threat Assessment, Analysis, and Reporting.mp4 (55.7 MB)
[22] Lesson 18_ Incident Handling and Response
  • [87] Learning objectives.mp4 (2.3 MB)
  • [88] 18.1 Fundamentals of Incident Handling.mp4 (15.0 MB)
  • [89] 18.2 Six Step Incident Response Process.mp4 (32.4 MB)
  • [90] 18.3 Conducting a Forensic Investigation.mp4 (39.7 MB)
[23] Lesson 19_ Contingency Plans
  • [91] Learning objectives.mp4 (2.4 MB)
  • [92] 19.1 Business Continuity Planning (BCP).mp4 (27.8 MB)
  • [93] 19.2 Business Impact Analysis (BIA).mp4 (10.9 MB)
  • [94] 19.3 Backups and Restoration.mp4 (21.7 MB)
  • [95] 19.4 Disaster Recovery Planning (DRP).mp4 (40.0 MB)
[24] Module 5_ Windows Security Essentials
  • [96] Module introduction.mp4 (3.1 MB)
  • [CourseClub.Me].url (0.1 KB)
  • [GigaCourse.Com].url (0.0 KB)
[25] Lesson 20_ Windows Security Infrastructure
  • [100] 20.3 Windows-as-a-Service.mp4 (21.9 MB)
  • [97] Learning objectives.mp4 (2.2 MB)
  • [98] 20.1 Operating Systems and Services.mp4 (13.9 MB)
  • [99] 20.2 Windows Workgroups vs. Domains.mp4 (26.8 MB)
[26] Lesson 21_ Windows Access Controls
  • [101] Learning objectives.mp4 (2.4 MB)
  • [102] 21.1 NTFS and Shared Folder Permissions.mp4 (15.2 MB)
  • [103] 21.2 Registry Keys and REGEDIT.EXE.mp4 (12.4 MB)
  • [104] 21.3 Windows Privileges.mp4 (18.7 MB)
  • [105] 21.4 Overview of BitLocker Drive Encryption.mp4 (18.5 MB)
[27] Lesson 22_ Enforcing Windows Security Policy
  • [106] Learning objectives.mp4 (2.4 MB)
  • [107] 22.1 Security Templates and SCA Snap-in.mp4 (16.9 MB)
  • [108] 22.2 Understanding Group Policy Objects.mp4 (13.4 MB)
  • [109] 22.3 Administrative Users, AppLocker, and User Account Control.mp4 (15.1 MB)
[28] Lesson 23_ Windows Network Services and Cloud Computing
  • [110] Learning objectives.mp4 (2.4 MB)
  • [111] 23.1 Azure and High Availability.mp4 (29.5 MB)
  • [112] 23.2 Configuring Azure VM Attributes.mp4 (25.3 MB)
  • [113] 23.3 Microsoft Azure Active Directory (MAAD).mp4 (35.4 MB)
[29] Lesson 24_ Windows Automation, Auditing, and Forensics
  • [114] Learning objectives.mp4 (2.0 MB)
  • [115] 24.1 Windows PowerShell.mp4 (46.9 MB)
  • [116] 24.2 Administrative Tools and Utilities.mp4 (47.1 MB)
  • [117] 24.3 Windows Auditing and Forensics.mp4 (25.5 MB)
[2] Lesson 1_ TCP IP Essentials
  • [2] Learning objectives.mp4 (3.0 MB)
  • [3] 1.1 Network Protocols and Reference Models.mp4 (30.5 MB)
  • [4] 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4 (54.0 MB)
  • [5] 1.3 Layer 4 Protocols.mp4 (54.6 MB)
  • [6] 1.4 Setting up a Lab Environment.mp4 (40.8 MB)
  • [7] 1.5 Using tcpdump and Wireshark.mp4 (26.9 MB)
[30] Module 6_ Linux Security Essentials
  • [118] Module introduction.mp4 (3.1 MB)
[31] Lesson 25_ Linux Security_ Structure, Permissions and Access
  • [119] Learning objectives.mp4 (2.7 MB)
  • [120] 25.1 Comparing Linux Operating Systems.mp4 (28.1 MB)
  • [121] 25.2 Mobile Device Security.mp4 (12.5 MB)
  • [122] 25.3 Linux Shells and Kernels.mp4 (18.8 MB)
  • [123] 25.4 Linux Permissions.mp4 (29.3 MB)
  • [124] 25.5 Linux User Accounts.mp4 (26.2 MB)
[32] Lesson 26_ Linux Services_ Hardening and Securing
  • [125] Learning objectives.mp4 (2.5 MB)
  • [126] 26.1 Starting Services at Boot Time.mp4 (32.9 MB)
  • [127] 26.2 Configuration Management Tools.mp4 (17.7 MB)
  • [128] 26.3 Linux Kernel Security.mp4 (28.1 MB)
  • [129] 26.4 Linux System Enhancers.mp4 (22.6 MB)
[33] Lesson 27_ Linux_ Monitoring and Attack Detection
  • [130] Learning objectives.mp4 (2.3 MB)
  • [131] 27.1 Configuring and Monitoring Logs.mp4 (23.5 MB)
  • [132] 27.2 Leveraging the Auditd tool.mp4 (14.1 MB)
  • [133] 27.3 Linux Security Utilities.mp4 (20.3 MB)
  • [CourseClub.Me].url (0.1 KB)
  • [GigaCourse.Com].url (0.0 KB)
[34] Summary
  • [134] GIAC Security Essentials (GSEC)_ Summary.mp4 (6.7 MB)
[3] Lesson 2_ Critical Controls
  • [10] 2.2 Categories and Types of Controls.mp4 (25.8 MB)
  • [11] 2.3 Understanding the Enterprise Architecture.mp4 (5.9 MB)
  • [12] 2.4 Introduction to Threat Enumeration.mp4 (11.1 MB)
  • [8] Learning objectives.mp4 (2.6 MB)
  • [9] 2.1 CIA Triad and Parkerian Hexad.mp4 (10.8 MB)
[4] Lesson 3_ Access Control & Password Management
  • [13] Learning objectives.mp4 (1.9 MB)
  • [14] 3.1 Access Control Concepts.mp4 (85.3 MB)
  • [15] 3.2 Password Management.mp4 (33.6 MB)
  • [16] 3.3 Introduction to Password Cracking.mp4 (40.5 MB)
[5] Lesson 4_ Network Security Devices and Device Security
  • [17] Learning objectives.mp4 (3.7 MB)
  • [18] 4.1 Network Topologies and Zones.mp4 (29.5 MB)
  • [19] 4.2 Overview of Network Devices and Hardening.mp4 (60.0 MB)
  • [20] 4.3 Survey of Security Devices and Wireshark.mp4 (60.2 MB)
  • [21] 4.4 Configuring Firewalls at Amazon Web Services.mp4 (33.2 MB)
  • [22] 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4 (30.0 MB)
  • [23] 4.6 Examining a Classic IPS Sensor Device.mp4 (25.4 MB)
  • [CourseClub.Me].url (0.1 KB)
  • [GigaCourse.Com].url (0.0 KB)
[6] Lesson 5_ Web Communication Security
  • [24] Learning objectives.mp4 (2.1 MB)
  • [25] 5.1 Introducing the Center for Internet Security (CIS).mp4 (19.8 MB)
  • [26] 5.2 Overview of CIS Controls.mp4 (28.2 MB)
  • [27] 5.3 Samples and Case Studies.mp4 (26.0 MB)
[7] Lesson 6_ Wireless Network Security
  • [28] Learning objectives.mp4 (2.6 MB)
  • [29] 6.1 The Evolution of IEEE 802.11 Security.mp4 (62.5 MB)
  • [30] 6.2 WPA3 Security.mp4 (13.9 MB)
  • [31] 6.3 PAN, NFC, and 5G Concepts.mp4 (15.2 MB)
  • [32] 6.4 The Internet of Things (IoT).mp4 (20.0 MB)
[8] Module 2_ Defense in Depth and Attacks
  • [33] Module introduction.mp4 (3.3 MB)
[9] Lesson 7_ Malicious Code & Exploit Mitigation
  • [34] Learning objectives.mp4 (2.1 MB)
  • [35] 7.1 Common Attack Types.mp4 (71.7 MB)
  • [36] 7.2 CryptoMalware.mp4 (33.1 MB)
  • [37] 7.3 Defensive Strategies.mp4 (25.0 MB)
  • [CourseClub.Me].url (0.1 KB)
  • [GigaCourse.Com].url (0.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.tiny-vps.com:6969/announce
  • udp://fasttracker.foreverpirates.co:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://explodie.org:6969/announce
  • udp://open.stealth.si:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://tracker.dler.org:6969/announce
  • udp://9.rarbg.to:2710/announce
  • udp://discord.heihachi.pw:6969/announce
  • udp://fe.dealclub.de:6969/announce
  • udp://mail.realliferpg.de:6969/announce
  • udp://tracker.zerobytes.xyz:1337/announce
  • udp://code2chicken.nl:6969/announce
CACHE ❓ RP-FALLBACK 📄 torrent 🕐 08 Feb 2026, 03:34:38 am IST ⏰ 05 Mar 2026, 03:34:38 am IST ✅ Valid for 24d 23h 🔄 Wait 10m