Certification

Certification

GIAC Security Essentials (GSEC)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

GSEC Exam Certification Objectives
Network Protocol The candidate will demonstrate an understanding of the properties and functions of network protocols and network protocol stacks.
IP Packets The candidate will demonstrate a fundamental understanding of how the IP protocol works.
Network Addressing The candidate will demonstrate an understanding of the essentials of IP addressing, subnets, CIDR and netmasks.
IPv6 The candidate will demonstrate a high-level understanding of the IPv6 protocol.
DNS The candidate will demonstrate a high-level understanding of the Domain Name System architecture.
UDP The candidate will demonstrate an understanding of the structure and purpose of UDP, as well as the fields in a UDP datagram header.
TCP The candidate will demonstrate an understanding of the structure and purpose of TCP, as well as the fields in a TCP datagram header.
ICMP The candidate will demonstrate an understanding of the structure and purpose of ICMP, as well as the fields in a ICMP datagram header.
Reading Packets The candidate will demonstrate an understanding of how to decode a packet from hexadecimal output.
Defense-in-Depth The candidate will demonstrate an introductory understanding of the terminology and concepts of Risk and Defense-in-Depth, including threats and vulnerabilities.
Viruses and Malicious Code The candidate will demonstrate an understanding of what malicious code is, how it propagates and why it is such an expensive problem. Additionally, the candidate will demonstrate an understanding of the attack vectors leveraged by recent malicious code attacks.
Policy Framework The candidate will demonstrate an understanding of the purpose and components of policy.
Contingency Planning The candidate will demonstrate an understanding of the critical aspect of contingency planning with a Business Continuity Plan (BCP) and Disaster Recover Plan (DRP).
Access Control Theory The candidate will demonstrate an understanding of the fundamental theory of access control.
Authentication and Password Management The candidate will demonstrate understanding of the role of authentication controls, how they are managed, and the methods used to control access to systems.
Incident Handling Fundamentals The candidate will demonstrate an understanding of the concepts of incident handling and the six-step incident handling process.
Legal Aspects of Incident Handling The candidate will demonstrate an understanding of the basic legal issues in incident and evidence handling.
Information Warfare The candidate will demonstrate an understanding of information warfare methods and defense.
Web Application Security The candidate will demonstrate an understanding of web application security and common vulnerabilities including CGI, cookies, SSL and active content.
Mitnick-Shimomura The candidate will demonstrate an understanding of the details of the famous Mitnick-Shimomura attack, as well as what we can learn from this attack to appropriately protect our networks today against these vulnerabilities. The candidate will also demonstrate an understanding of the strategies that would have prevented the Mitnick attack.
Common Types of Attacks The candidate will demonstrate the ability to identify the most common attack methods, as well as the basic strategies used to mitigate those threats.
Firewalls The candidate will demonstrate a fundamental understanding of firewalling technologies and techniques.
Honeypots The candidate will demonstrate understanding of basic honeypot techniques and common tools used to set up honeypots.
Vulnerability Management Overview The candidate will demonstrate the ability to perform reconnaissance and resource protection to manage vulnerabilities, and address threats and vectors.
Network Mapping and Scanning The candidate will demonstrate a fundamental understanding of the common tools attackers use to scan systems and the techniques used to create a network map.
Vulnerability Scanning The candidate will demonstrate an understanding of how data generated from a port scanner like nmap, and vulnerability assessment tools like nessus can be used to examine systems, ports and applications in more depth to secure an environment.
Alternate Network Mapping Techniques The candidate will demonstrate a fundamental understanding of network mapping techniques an attacker might use to examine wireless networks, and public switched telephony networks. The candidate will also demonstrate an understanding of how to identify the basic penetration techniques at a high level.
IPS Overview The candidate will demonstrate a high-level understanding of how IPS systems operate.
Risk Management The candidate will demonstrate an understanding of the terminology and basic approaches to Risk Management.
Crypto Fundamentals The candidate will demonstrate an understanding of the core concepts of cryptography and the three main algorithms.
Crypto Concepts The candidate will demonstrate a high-level understanding of the mathematical concepts which contribute to modern cryptography.
Virtual Private Networks VPNs The candidate will demonstrate a high-level understanding of VPNs and be able to identify IPSec and non-IPSec protocols used for VPN communications.
Protecting Data at Rest The candidate will demonstrate an understanding of the functionality of PGP cryptosystems and how they operate.
Public Key Infrastructure PKI The candidate will demonstrate an understanding of how PKI works and the key components for managing keys.
Steganography Overview The candidate will demonstrate an understanding of the different methods of steganography, as well as some of the common tools used to hide data with steganography.
Wireless Overview The candidate will demonstrate a fundamental understanding of wireless technologies including Bluetooth and Zigbee.
802.11 attacks & countermeasures The candidate will demonstrate an understanding of the different 802.11 protocols, as well as an understanding of common wireless attacks and how to prevent them.
Windows Workgroups, Active Directory and Group Policy Overview The candidate will demonstrate an understanding of the basic security infrastructure of local accounts, workgroups, Active Directory and Group Policy.
Windows Permissions & User Rights The candidate will demonstrate an understanding of how permissions are applied in the Windows NT File System, Shared Folder, Encrypting File System, Printer, Registry Key, Active Directory, and how User Rights are applied.
Windows Security Templates & Group Policy The candidate will demonstrate a high-level understanding of the features and functionality of Group Policy and best practices for locking down systems.
Windows Service Packs, Hotfixes and Backups The candidate will demonstrate an understanding of how to manage Windows Service Packs and Hotfixes, as well as backups and restoration for a network of Windows hosts.
Windows Network Security Overview The candidate will demonstrate an understanding of the basic measures in securing a Windows host, including managing services and VPNs.
Securing Windows Server Services The candidate will demonstrate an understanding of the basic measures in securing Windows IIS, SQL, and Terminal Servers.
Windows Automation and Configuration The candidate will demonstrate an understanding of the techniques and technologies used to automate configuration.
Linux/Unix Patch Management The candidate will demonstrate an understanding of the process of patch management, best practices, and common patch management tools and techniques for Linux/Unix systems.
Linux/Unix Process and Service Management The candidate will demonstrate an understanding of how to manage Linux/Unix processes, run levels, and services, and best practices for common processes and services.
Linux/Unix Logging and Log Management The candidate will demonstrate an understanding of the various logging capabilities and log file locations common to Linux operating systems.
Linux/Unix Overview The candidate will demonstrate familiarity with the different variants of Linux/Unix, the Linux file system, and important commands.
Linux/Unix Configuration Fundamentals The candidate will demonstrate an understanding of Linux/Unix fundamental configuration settings, including file permissions, user accounts, groups, and passwords, and commands used to display information and run backups.
Linux/Unix OS Security Tools and Utilities The candidate will demonstrate an understanding of how to use key security utilities and tools that are available for Linux/Unix systems, including file integrity, host firewalls, and applications such as SELinux.
Windows Auditing The candidate will demonstrate an understanding of the techniques and technologies used to audit Windows hosts.
Critical Security Controls The candidate will be familiar with the background, history and purpose of the Critical Security Controls.
Network Fundamentals The candidate will demonstrate an understanding of basic network hardware, topologies, architectures.
Intrusion Detection Overview The candidate will demonstrate an understanding of the overall concepts of Intrusion Detection.