SEC401: Security Essentials - Network, Endpoint, and Cloud
SEC401: Security Essentials - Network, Endpoint, and Cloud Training (GSEC)
Whether you are new to information security or a seasoned practitioner with a specialized focus, SEC401 will provide the essential information security skills and techniques you need to protect and secure your critical information and technology assets, whether on-premise or in the cloud.
Training at a glance
Level
Beginner
Duration
6 Days
Experience
2 years: IT & Security
Average Salary
$104,616
Labs
Yes
Level
Beginner
Duration
6 Days
Experience
2 years: IT & Security
Average Salary
$104,616
Labs
Yes
Training Details
Organizations are continually targeted and as such they must be prepared for eventual compromise. Today, more than ever before, TIMELY detection and TIMELY response is critical. The longer an adversary is present in your environment, the more devastating and damaging the impact becomes. It could well be that the most important question in information security is: "How quickly can we detect, respond, and REMEDIATE an adversary?"
Information security is all about making sure you focus on the right areas of defense, especially as applied to the uniqueness of YOUR organization. In SEC401, you will learn the language and underlying workings of computer and information security, and how best to apply them to your unique needs. You will gain the essential and effective security knowledge you will need if you are given the responsibility to secure systems or organizations.
SEC401 will teach you the most effective steps to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. You will learn tips and tricks designed to help you win the battle against the wide range of cyber adversaries that want to harm your environment.
New and Enhanced Labs Overview
Unlock the essential skills for defending systems and networks with our revamped SEC401 course, now featuring a comprehensive suite of 20 cutting-edge labs. These labs have been meticulously designed to provide hands-on experience and practical skills crucial for modern cybersecurity challenges.
New Lab Highlights:
- Network Analysis: Dive deep into network traffic with labs on Tcpdump and Wireshark, and explore AWS VPC Flow Logs to understand cloud-based network operations.
- Advanced Threat Detection: Develop skills in SIEM Log Analysis, and employ tools like Snort3 and Zeek for robust Intrusion Detection and Network Security Monitoring.
- System Security: Sharpen your skills in Linux Logging and Auditing, Windows Process Exploration, and Windows Filesystem Permissions, ensuring comprehensive system oversight.
- Audit and Compliance: Master Password Auditing, Binary File Analysis, and Data Loss Prevention to safeguard sensitive data against emerging threats.
- Cryptography and Recovery: Get hands-on with Hashing and Cryptographic Validation, Encryption and Decryption, and Mobile Device Backup Recovery to secure and recover data.
- Windows and Linux Security: Apply Windows System Security Policies, manage Linux Permissions, and explore Linux Containers for enhanced security posture.
- Automation and Discovery: Utilize PowerShell for Speed and Scale and conduct Network Discovery to efficiently manage security tasks.
- Exploitation and Protection: Learn to identify and exploit vulnerabilities in Web App Exploitation, and apply security best practices.
Lesson 1: Network Security and Cloud Essentials
Lesson 2: Defense in Depth
Lesson 3: Vulnerability Management and Response
Lesson 4: Data Security Technologies
Lesson 5: Windows and Azure Security
Lesson 6: Linux, AWS, and Mac Security
Hands-On Cybersecurity Training
- Section 1: Tcpdump; Wireshark; AWS VPC Flow Logs
- Section 2: Password Auditing; Data Loss Prevention; Mobile Device Backup Recovery
- Section 3: Network Discovery; Binary File Analysis and Characterization; Web App Exploitation; SIEM Log Analysis
- Section 4: Hashing and Cryptographic Validation; Encryption and Decryption; Intrusion Detection and Network Security Monitoring with Snort3 and Zeek
- Section 5: Windows Process Exploration; Windows Filesystem Permissions; Applying Windows System Security Policies; Using PowerShell for Speed and Scale
- Section 6: Linux Permissions; Linux Containers; Linux Logging and Auditing
- Security professionals who want to fill the gaps in their understanding of technical information security
- Managers who want to understand information security beyond simple terminology and concepts
- Operations personnel who do not have security as their primary job function but need an understanding of security to be effective
- IT engineers and supervisors who need to know how to build a defensible network against attacks
- Administrators responsible for building and maintaining systems that are being targeted by attackers
- Forensic specialists, penetration testers, and auditors who need a solid foundation of security principles to be as effective as possible at their jobs
- Anyone new to information security with some background in information systems and networking
NICE Framework Work Roles
- Security Control Assessor (OPM 612)
- Database Administrator (OPM 421)
- Data Analyst (OPM 422)
- Technical Support Specialist (OPM 411)
- Network Operations Specialist (OPM 441)
- System Administrator (OPM 451)
- Systems Security Analyst (OPM 461)
- Cyber Instructional Curriculum Developer (OPM 711)
- IT Investment/Portfolio Manager (OPM 804)
- Cyber Defense Analyst (OPM 511)
- Cyber Defense Infrastructure Support Specialist (OPM 521)
SEC401 covers all of the core areas of security and assumes a basic understanding of technology, networks, and security. For those who are new to the field and have no background knowledge, SEC275: Foundations - Computers, Technology and Security or SEC301: Introduction to Cyber Security would be the recommended starting point. While these courses are not a prerequisite for SEC401, they do provide the introductory knowledge to help maximize the experience with SEC401.
Depending on your current role or future plans, one of these courses is a great next step in your cybersecurity journey:
Security Operations Center (SOC) Analyst
- SEC450: Blue Team Fundamentals: Security Operations and Analysis
- SEC511: Cybersecurity Engineering: Advanced Threat Detection and Monitoring
Incident Handler:
- SEC504: Hacker Tools, Techniques, and Incident Handling
Cloud Security Architect:
- SEC510: Cloud Security Controls and Migration
- SEC540: Cloud Security and DevSecOps Automation
Upcoming Classes
We Offer More Than Just SANS Training
Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.
Strategic Planning & Project Management
From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
IT & Cybersecurity
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Leadership & Management
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.