FileMood

Download GIAC Security Essentials GSEC

GIAC Security Essentials GSEC

Name

GIAC Security Essentials GSEC

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

3.1 GB

Total Files

406

Last Seen

2025-07-18 23:58

Hash

3FF013357E50B8640405C0FFAC5AE61463F346E4

/.../Lesson 3 Access Control & Password Management/

002. 3.1 Access Control Concepts.mp4

88.5 MB

002. 3.1 Access Control Concepts en.srt

26.3 KB

001. Learning objectives en.srt

0.3 KB

004. 3.3 Introduction to Password Cracking en.srt

14.2 KB

003. 3.2 Password Management en.srt

10.4 KB

004. 3.3 Introduction to Password Cracking.mp4

39.5 MB

003. 3.2 Password Management.mp4

34.7 MB

001. Learning objectives.mp4

2.0 MB

/

TutsNode.net.txt

0.1 KB

[TGx]Downloaded from torrentgalaxy.to .txt

0.6 KB

/Introduction/

001. GIAC Security Essentials (GSEC) Introduction en.srt

1.9 KB

001. GIAC Security Essentials (GSEC) Introduction.mp4

9.7 MB

/.../Lesson 1 TCPIP Essentials/

001. Learning objectives en.srt

0.5 KB

004. 1.3 Layer 4 Protocols en.srt

20.0 KB

003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6 en.srt

17.9 KB

005. 1.4 Setting up a Lab Environment en.srt

16.3 KB

006. 1.5 Using tcpdump and Wireshark en.srt

10.7 KB

002. 1.1 Network Protocols and Reference Models en.srt

8.4 KB

004. 1.3 Layer 4 Protocols.mp4

56.6 MB

003. 1.2 IPv4 vs. IPv6 and ICMP vs. ICMPv6.mp4

56.0 MB

005. 1.4 Setting up a Lab Environment.mp4

38.6 MB

002. 1.1 Network Protocols and Reference Models.mp4

31.2 MB

006. 1.5 Using tcpdump and Wireshark.mp4

27.1 MB

001. Learning objectives.mp4

3.1 MB

/.../Lesson 7 Malicious Code & Exploit Mitigation/

002. 7.1 Common Attack Types en.srt

25.9 KB

004. 7.3 Defensive Strategies en.srt

14.0 KB

003. 7.2 CryptoMalware en.srt

13.2 KB

001. Learning objectives en.srt

0.4 KB

002. 7.1 Common Attack Types.mp4

74.5 MB

003. 7.2 CryptoMalware.mp4

33.9 MB

004. 7.3 Defensive Strategies.mp4

25.9 MB

001. Learning objectives.mp4

2.2 MB

/.../Lesson 13 Virtualization and Cloud Security/

003. 13.2 Cloud Models and Value Proposition en.srt

23.9 KB

005. 13.4 Introduction to Microsoft Azure IAM en.srt

17.4 KB

003. 13.2 Cloud Models and Value Proposition.mp4

77.8 MB

004. 13.3 Common Attacks Against Cloud Services en.srt

10.0 KB

002. 13.1 Overview of Virtualization and VM Security en.srt

8.2 KB

001. Learning objectives en.srt

0.6 KB

005. 13.4 Introduction to Microsoft Azure IAM.mp4

44.4 MB

004. 13.3 Common Attacks Against Cloud Services.mp4

34.4 MB

002. 13.1 Overview of Virtualization and VM Security.mp4

28.3 MB

001. Learning objectives.mp4

3.2 MB

/.../Lesson 4 Network Security Devices and Device Security/

003. 4.2 Overview of Network Devices and Hardening en.srt

23.0 KB

004. 4.3 Survey of Security Devices and Wireshark en.srt

22.1 KB

005. 4.4 Configuring Firewalls at Amazon Web Services en.srt

19.8 KB

006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall en.srt

17.9 KB

001. Learning objectives en.srt

0.7 KB

002. 4.1 Network Topologies and Zones en.srt

13.3 KB

007. 4.6 Examining a Classic IPS Sensor Device en.srt

10.5 KB

003. 4.2 Overview of Network Devices and Hardening.mp4

62.1 MB

004. 4.3 Survey of Security Devices and Wireshark.mp4

60.9 MB

005. 4.4 Configuring Firewalls at Amazon Web Services.mp4

33.7 MB

006. 4.5 Exploring a Palo Alto Networks Next-Generation Firewall.mp4

30.6 MB

002. 4.1 Network Topologies and Zones.mp4

30.6 MB

007. 4.6 Examining a Classic IPS Sensor Device.mp4

25.2 MB

001. Learning objectives.mp4

3.8 MB

/.../Lesson 12 Vulnerability Scanning and Penetration Testing/

005. 12.4 Penetration Testing en.srt

21.2 KB

004. 12.3 Using Xenmap and Yersinia en.srt

20.1 KB

003. 12.2 Network Scanning en.srt

13.1 KB

002. 12.1 Overview of Vulnerability Management en.srt

9.4 KB

001. Learning objectives en.srt

0.5 KB

005. 12.4 Penetration Testing.mp4

57.6 MB

003. 12.2 Network Scanning.mp4

42.7 MB

002. 12.1 Overview of Vulnerability Management.mp4

37.5 MB

004. 12.3 Using Xenmap and Yersinia.mp4

35.2 MB

001. Learning objectives.mp4

2.7 MB

/.../Lesson 23 Windows Network Services and Cloud Computing/

004. 23.3 Microsoft Azure Active Directory (MAAD) en.srt

20.3 KB

002. 23.1 Azure and High Availability en.srt

16.5 KB

003. 23.2 Configuring Azure VM Attributes en.srt

13.5 KB

001. Learning objectives en.srt

0.4 KB

004. 23.3 Microsoft Azure Active Directory (MAAD).mp4

35.7 MB

002. 23.1 Azure and High Availability.mp4

30.1 MB

003. 23.2 Configuring Azure VM Attributes.mp4

26.1 MB

001. Learning objectives.mp4

2.5 MB

/.../Lesson 18 Incident Handling and Response/

004. 18.3 Conducting a Forensic Investigation en.srt

18.7 KB

003. 18.2 Six Step Incident Response Process en.srt

8.8 KB

002. 18.1 Fundamentals of Incident Handling en.srt

4.5 KB

001. Learning objectives en.srt

0.4 KB

004. 18.3 Conducting a Forensic Investigation.mp4

39.4 MB

003. 18.2 Six Step Incident Response Process.mp4

33.6 MB

002. 18.1 Fundamentals of Incident Handling.mp4

15.5 MB

001. Learning objectives.mp4

2.4 MB

/.../Lesson 15 Applied Cryptography/

003. 15.2 IPsec en.srt

18.3 KB

005. 15.4 Public Key Infrastructure en.srt

16.9 KB

002. 15.1 Digital Signatures en.srt

6.4 KB

004. 15.3 SSLTLS en.srt

4.0 KB

001. Learning objectives en.srt

0.3 KB

005. 15.4 Public Key Infrastructure.mp4

46.4 MB

003. 15.2 IPsec.mp4

46.1 MB

004. 15.3 SSLTLS.mp4

15.9 MB

002. 15.1 Digital Signatures.mp4

14.8 MB

001. Learning objectives.mp4

2.3 MB

/.../Lesson 2 Critical Controls/

001. Learning objectives en.srt

0.5 KB

004. 2.3 Understanding the Enterprise Architecture en.srt

2.5 KB

003. 2.2 Categories and Types of Controls en.srt

6.7 KB

005. 2.4 Introduction to Threat Enumeration en.srt

4.3 KB

002. 2.1 CIA Triad and Parkerian Hexad en.srt

4.2 KB

003. 2.2 Categories and Types of Controls.mp4

26.4 MB

005. 2.4 Introduction to Threat Enumeration.mp4

11.5 MB

002. 2.1 CIA Triad and Parkerian Hexad.mp4

11.1 MB

004. 2.3 Understanding the Enterprise Architecture.mp4

6.1 MB

001. Learning objectives.mp4

2.7 MB

/.../Lesson 17 IT Risk Management/

004. 17.3 Threat Assessment, Analysis, and Reporting en.srt

18.2 KB

003. 17.2 Risk Management Best Practices en.srt

10.7 KB

002. 17.1 Overview of Risk Management en.srt

8.9 KB

001. Learning objectives en.srt

0.4 KB

004. 17.3 Threat Assessment, Analysis, and Reporting.mp4

55.0 MB

003. 17.2 Risk Management Best Practices.mp4

33.6 MB

002. 17.1 Overview of Risk Management.mp4

33.4 MB

001. Learning objectives.mp4

2.2 MB

/.../Lesson 6 Wireless Network Security/

002. 6.1 The Evolution of IEEE 802.11 Security en.srt

16.7 KB

001. Learning objectives en.srt

0.4 KB

005. 6.4 The Internet of Things (IoT) en.srt

7.7 KB

004. 6.3 PAN, NFC, and 5G Concepts en.srt

5.7 KB

003. 6.2 WPA3 Security en.srt

4.9 KB

002. 6.1 The Evolution of IEEE 802.11 Security.mp4

63.5 MB

005. 6.4 The Internet of Things (IoT).mp4

20.5 MB

004. 6.3 PAN, NFC, and 5G Concepts.mp4

15.9 MB

003. 6.2 WPA3 Security.mp4

14.4 MB

001. Learning objectives.mp4

2.7 MB

/.../Lesson 20 Windows Security Infrastructure/

003. 20.2 Windows Workgroups vs. Domains en.srt

15.7 KB

004. 20.3 Windows-as-a-Service en.srt

6.7 KB

002. 20.1 Operating Systems and Services en.srt

6.6 KB

001. Learning objectives en.srt

0.4 KB

003. 20.2 Windows Workgroups vs. Domains.mp4

26.8 MB

004. 20.3 Windows-as-a-Service.mp4

21.0 MB

002. 20.1 Operating Systems and Services.mp4

14.0 MB

001. Learning objectives.mp4

2.3 MB

/.../Lesson 25 Linux Security Structure, Permissions and Access/

005. 25.4 Linux Permissions en.srt

14.3 KB

006. 25.5 Linux User Accounts en.srt

11.3 KB

002. 25.1 Comparing Linux Operating Systems en.srt

10.1 KB

004. 25.3 Linux Shells and Kernels en.srt

9.3 KB

003. 25.2 Mobile Device Security en.srt

6.6 KB

001. Learning objectives en.srt

0.5 KB

002. 25.1 Comparing Linux Operating Systems.mp4

28.0 MB

005. 25.4 Linux Permissions.mp4

27.3 MB

006. 25.5 Linux User Accounts.mp4

25.3 MB

004. 25.3 Linux Shells and Kernels.mp4

18.5 MB

003. 25.2 Mobile Device Security.mp4

12.5 MB

001. Learning objectives.mp4

2.8 MB

/.../Lesson 24 Windows Automation, Auditing, and Forensics/

002. 24.1 Windows PowerShell en.srt

13.8 KB

003. 24.2 Administrative Tools and Utilities en.srt

13.2 KB

004. 24.3 Windows Auditing and Forensics en.srt

11.6 KB

001. Learning objectives en.srt

0.4 KB

003. 24.2 Administrative Tools and Utilities.mp4

45.3 MB

002. 24.1 Windows PowerShell.mp4

39.4 MB

004. 24.3 Windows Auditing and Forensics.mp4

25.0 MB

001. Learning objectives.mp4

2.1 MB

/.../Lesson 16 Security Policy/

005. 16.4 Survey of Sample Policies en.srt

13.7 KB

002. 16.1 The Importance of Written Security Policies en.srt

4.8 KB

003. 16.2 Standards, Guidelines, and Procedures en.srt

4.4 KB

004. 16.3 Acceptable Use Policies en.srt

2.0 KB

001. Learning objectives en.srt

0.6 KB

005. 16.4 Survey of Sample Policies.mp4

42.9 MB

002. 16.1 The Importance of Written Security Policies.mp4

19.1 MB

003. 16.2 Standards, Guidelines, and Procedures.mp4

17.4 MB

004. 16.3 Acceptable Use Policies.mp4

9.3 MB

001. Learning objectives.mp4

2.9 MB

/.../Lesson 9 Active Defense/

004. 9.3 Active Defense Tools en.srt

12.9 KB

002. 9.1 Overview of Active Defense en.srt

8.0 KB

001. Learning objectives en.srt

0.3 KB

003. 9.2 Active Defense Techniques en.srt

4.9 KB

004. 9.3 Active Defense Tools.mp4

36.4 MB

002. 9.1 Overview of Active Defense.mp4

19.9 MB

003. 9.2 Active Defense Techniques.mp4

19.4 MB

001. Learning objectives.mp4

2.0 MB

/.../Lesson 11 Log Management & SIEM/

002. 11.1 Overview of Logging en.srt

12.3 KB

005. 11.4 Core SIEM Activities en.srt

7.5 KB

004. 11.3 Logging Analysis Fundamentals en.srt

7.3 KB

001. Learning objectives en.srt

0.4 KB

003. 11.2 Logging System Setup and Configuration en.srt

4.8 KB

002. 11.1 Overview of Logging.mp4

31.5 MB

005. 11.4 Core SIEM Activities.mp4

22.0 MB

004. 11.3 Logging Analysis Fundamentals.mp4

19.6 MB

003. 11.2 Logging System Setup and Configuration.mp4

16.4 MB

001. Learning objectives.mp4

2.2 MB

/.../Lesson 26 Linux Services Hardening and Securing/

002. 26.1 Starting Services at Boot Time en.srt

11.4 KB

004. 26.3 Linux Kernel Security en.srt

9.7 KB

003. 26.2 Configuration Management Tools en.srt

8.2 KB

005. 26.4 Linux System Enhancers en.srt

7.3 KB

001. Learning objectives en.srt

0.4 KB

002. 26.1 Starting Services at Boot Time.mp4

29.8 MB

004. 26.3 Linux Kernel Security.mp4

27.2 MB

005. 26.4 Linux System Enhancers.mp4

22.0 MB

003. 26.2 Configuration Management Tools.mp4

17.3 MB

001. Learning objectives.mp4

2.6 MB

/.../Lesson 19 Contingency Plans/

005. 19.4 Disaster Recovery Planning (DRP) en.srt

11.3 KB

002. 19.1 Business Continuity Planning (BCP) en.srt

7.8 KB

004. 19.3 Backups and Restoration en.srt

4.4 KB

003. 19.2 Business Impact Analysis (BIA) en.srt

3.7 KB

001. Learning objectives en.srt

0.4 KB

005. 19.4 Disaster Recovery Planning (DRP).mp4

41.4 MB

002. 19.1 Business Continuity Planning (BCP).mp4

27.0 MB

004. 19.3 Backups and Restoration.mp4

21.7 MB

003. 19.2 Business Impact Analysis (BIA).mp4

11.3 MB

001. Learning objectives.mp4

2.5 MB

/.../Module 4 Cryptography, Risk Management, and Response/

001. Module introduction en.srt

1.0 KB

001. Module introduction.mp4

4.8 MB

/.../Lesson 5 Web Communication Security/

001. Learning objectives en.srt

0.4 KB

003. 5.2 Overview of CIS Controls en.srt

9.2 KB

004. 5.3 Samples and Case Studies en.srt

8.1 KB

002. 5.1 Introducing the Center for Internet Security (CIS) en.srt

4.9 KB

003. 5.2 Overview of CIS Controls.mp4

27.4 MB

004. 5.3 Samples and Case Studies.mp4

27.0 MB

002. 5.1 Introducing the Center for Internet Security (CIS).mp4

20.5 MB

001. Learning objectives.mp4

2.2 MB

/.pad/

0

0.2 KB

1

407.4 KB

2

1.0 MB

3

433.4 KB

4

781.2 KB

5

957.7 KB

6

26.4 KB

7

1.0 MB

8

575.4 KB

9

525.6 KB

10

813.3 KB

11

1.0 MB

12

854.4 KB

13

655.0 KB

14

125.0 KB

15

320.7 KB

16

548.7 KB

17

356.1 KB

18

427.8 KB

19

450.9 KB

20

202.5 KB

21

215.9 KB

22

311.2 KB

23

1.0 MB

24

465.7 KB

25

956.4 KB

26

229.3 KB

27

684.6 KB

28

882.1 KB

29

1.0 MB

30

1.0 MB

31

197.5 KB

32

1.0 MB

33

263.6 KB

34

884.9 KB

35

903.7 KB

36

330.7 KB

37

585.4 KB

38

11.1 KB

39

196.9 KB

40

310.6 KB

41

918.1 KB

42

989.9 KB

43

70.3 KB

44

192.9 KB

45

224.8 KB

46

290.0 KB

47

438.4 KB

48

464.7 KB

49

860.0 KB

50

131.4 KB

51

315.2 KB

52

920.0 KB

53

1.0 MB

54

124.4 KB

55

341.4 KB

56

700.7 KB

57

1.0 MB

58

19.1 KB

59

39.2 KB

60

311.8 KB

61

1.0 MB

62

429.3 KB

63

451.2 KB

64

1.0 MB

65

337.3 KB

66

551.9 KB

67

802.3 KB

68

815.7 KB

69

38.2 KB

70

260.2 KB

71

352.3 KB

72

682.5 KB

73

403.5 KB

74

504.6 KB

75

163.2 KB

76

414.2 KB

77

448.5 KB

78

844.6 KB

79

848.1 KB

80

198.9 KB

81

410.4 KB

82

640.5 KB

83

924.6 KB

84

50.4 KB

85

263.5 KB

86

279.9 KB

87

622.2 KB

88

635.9 KB

89

981.0 KB

90

39.1 KB

91

69.8 KB

92

192.3 KB

93

918.5 KB

94

3.1 KB

95

247.1 KB

96

425.3 KB

97

832.3 KB

98

174.9 KB

99

466.5 KB

100

694.8 KB

101

182.1 KB

102

364.3 KB

103

431.4 KB

104

384.8 KB

105

736.6 KB

106

994.1 KB

107

1.0 MB

108

1.0 MB

109

2.7 KB

110

257.7 KB

111

306.5 KB

112

418.2 KB

113

441.6 KB

114

457.8 KB

115

473.1 KB

116

475.7 KB

117

526.7 KB

118

542.4 KB

119

619.1 KB

120

640.5 KB

121

643.6 KB

122

655.4 KB

123

742.9 KB

124

748.8 KB

125

809.1 KB

126

829.3 KB

127

885.4 KB

128

904.6 KB

129

911.6 KB

130

970.6 KB

131

988.3 KB

132

1.0 MB

133

129.2 KB

/.../Lesson 14 Cryptography Concepts and Algorithms/

003. 14.2 Cryptographic Hashing en.srt

9.6 KB

002. 14.1 Overview of Cryptology and Cryptosystems en.srt

7.7 KB

004. 14.3 Symmetric Key Cryptography en.srt

4.8 KB

005. 14.4 Asymmetric Key Cryptography en.srt

3.9 KB

001. Learning objectives en.srt

0.5 KB

002. 14.1 Overview of Cryptology and Cryptosystems.mp4

28.1 MB

003. 14.2 Cryptographic Hashing.mp4

26.8 MB

004. 14.3 Symmetric Key Cryptography.mp4

18.8 MB

005. 14.4 Asymmetric Key Cryptography.mp4

11.7 MB

001. Learning objectives.mp4

2.6 MB

/.../Lesson 22 Enforcing Windows Security Policy/

002. 22.1 Security Templates and SCA Snap-in en.srt

9.0 KB

003. 22.2 Understanding Group Policy Objects en.srt

8.4 KB

004. 22.3 Administrative Users, AppLocker, and User Account Control en.srt

7.2 KB

001. Learning objectives en.srt

0.5 KB

002. 22.1 Security Templates and SCA Snap-in.mp4

16.6 MB

004. 22.3 Administrative Users, AppLocker, and User Account Control.mp4

14.4 MB

003. 22.2 Understanding Group Policy Objects.mp4

13.7 MB

001. Learning objectives.mp4

2.5 MB

/.../Lesson 27 Linux Monitoring and Attack Detection/

002. 27.1 Configuring and Monitoring Logs en.srt

9.0 KB

004. 27.3 Linux Security Utilities en.srt

8.9 KB

003. 27.2 Leveraging the Auditd tool en.srt

4.9 KB

001. Learning objectives en.srt

0.4 KB

002. 27.1 Configuring and Monitoring Logs.mp4

22.4 MB

004. 27.3 Linux Security Utilities.mp4

19.1 MB

003. 27.2 Leveraging the Auditd tool.mp4

14.1 MB

001. Learning objectives.mp4

2.4 MB

/.../Lesson 21 Windows Access Controls/

005. 21.4 Overview of BitLocker Drive Encryption en.srt

8.8 KB

002. 21.1 NTFS and Shared Folder Permissions en.srt

7.7 KB

003. 21.2 Registry Keys and REGEDIT.EXE en.srt

6.3 KB

004. 21.3 Windows Privileges en.srt

6.2 KB

001. Learning objectives en.srt

0.4 KB

005. 21.4 Overview of BitLocker Drive Encryption.mp4

18.6 MB

004. 21.3 Windows Privileges.mp4

18.2 MB

002. 21.1 NTFS and Shared Folder Permissions.mp4

15.1 MB

003. 21.2 Registry Keys and REGEDIT.EXE.mp4

12.5 MB

001. Learning objectives.mp4

2.5 MB

/.../Lesson 8 Defense in Depth and Defensible Network Architecture/

001. Learning objectives en.srt

0.4 KB

002. 8.1 Defense in Depth Overview and Strategies en.srt

7.1 KB

003. 8.2 Core Security Strategies en.srt

4.6 KB

004. 8.3 Defensible Network Architectures en.srt

4.3 KB

002. 8.1 Defense in Depth Overview and Strategies.mp4

22.0 MB

004. 8.3 Defensible Network Architectures.mp4

15.3 MB

003. 8.2 Core Security Strategies.mp4

6.6 MB

001. Learning objectives.mp4

2.3 MB

/.../Lesson 10 Endpoint Security/

001. Learning objectives en.srt

0.5 KB

002. 10.1 Overview of Endpoint Security en.srt

6.5 KB

003. 10.2 Host-based Intrusion Detection en.srt

2.9 KB

005. 10.4 Next-generation Endpoint Security Solutions en.srt

4.2 KB

004. 10.3 Host-based Intrusion Prevention en.srt

3.8 KB

002. 10.1 Overview of Endpoint Security.mp4

24.8 MB

005. 10.4 Next-generation Endpoint Security Solutions.mp4

16.3 MB

004. 10.3 Host-based Intrusion Prevention.mp4

14.6 MB

003. 10.2 Host-based Intrusion Detection.mp4

12.4 MB

001. Learning objectives.mp4

2.7 MB

/Summary/

001. GIAC Security Essentials (GSEC) Summary en.srt

1.6 KB

001. GIAC Security Essentials (GSEC) Summary.mp4

6.9 MB

/.../Module 1 Network Security Essentials/

001. Module introduction en.srt

1.0 KB

001. Module introduction.mp4

4.9 MB

/.../Module 6 Linux Security Essentials/

001. Module introduction en.srt

0.7 KB

001. Module introduction.mp4

3.2 MB

/.../Module 2 Defense in Depth and Attacks/

001. Module introduction en.srt

0.6 KB

001. Module introduction.mp4

3.5 MB

/.../Module 5 Windows Security Essentials/

001. Module introduction en.srt

0.6 KB

001. Module introduction.mp4

3.2 MB

/.../Module 3 Threat Management/

001. Module introduction en.srt

0.6 KB

001. Module introduction.mp4

2.7 MB

 

Total files 406


Copyright © 2025 FileMood.com