SANS

SEC401: Security Essentials - Network, Endpoint, and Cloud

GIAC Security Essentials (GSEC)
GSEC

SEC401: Security Essentials - Network, Endpoint, and Cloud Training (GSEC)

Whether you are new to information security or a seasoned practitioner with a specialized focus, SEC401 will provide the essential information security skills and techniques you need to protect and secure your critical information and technology assets, whether on-premise or in the cloud.

Training at a glance

Level

Beginner

Duration

6 Days

Experience

2 years: IT & Security

Average Salary

$104,616

Labs

Yes

Level

Beginner

Duration

6 Days

Experience

2 years: IT & Security

Average Salary

$104,616

Labs

Yes

Training Details

Organizations are continually targeted and as such they must be prepared for eventual compromise. Today, more than ever before, TIMELY detection and TIMELY response is critical. The longer an adversary is present in your environment, the more devastating and damaging the impact becomes. It could well be that the most important question in information security is: "How quickly can we detect, respond, and REMEDIATE an adversary?"

Information security is all about making sure you focus on the right areas of defense, especially as applied to the uniqueness of YOUR organization. In SEC401, you will learn the language and underlying workings of computer and information security, and how best to apply them to your unique needs. You will gain the essential and effective security knowledge you will need if you are given the responsibility to secure systems or organizations.

SEC401 will teach you the most effective steps to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. You will learn tips and tricks designed to help you win the battle against the wide range of cyber adversaries that want to harm your environment.

New and Enhanced Labs Overview

Unlock the essential skills for defending systems and networks with our revamped SEC401 course, now featuring a comprehensive suite of 20 cutting-edge labs. These labs have been meticulously designed to provide hands-on experience and practical skills crucial for modern cybersecurity challenges.

New Lab Highlights:

  • Network Analysis: Dive deep into network traffic with labs on Tcpdump and Wireshark, and explore AWS VPC Flow Logs to understand cloud-based network operations.
  • Advanced Threat Detection: Develop skills in SIEM Log Analysis, and employ tools like Snort3 and Zeek for robust Intrusion Detection and Network Security Monitoring.
  • System Security: Sharpen your skills in Linux Logging and Auditing, Windows Process Exploration, and Windows Filesystem Permissions, ensuring comprehensive system oversight.
  • Audit and Compliance: Master Password Auditing, Binary File Analysis, and Data Loss Prevention to safeguard sensitive data against emerging threats.
  • Cryptography and Recovery: Get hands-on with Hashing and Cryptographic Validation, Encryption and Decryption, and Mobile Device Backup Recovery to secure and recover data.
  • Windows and Linux Security: Apply Windows System Security Policies, manage Linux Permissions, and explore Linux Containers for enhanced security posture.
  • Automation and Discovery: Utilize PowerShell for Speed and Scale and conduct Network Discovery to efficiently manage security tasks.
  • Exploitation and Protection: Learn to identify and exploit vulnerabilities in Web App Exploitation, and apply security best practices.

Lesson 1: Network Security and Cloud Essentials

Lesson 2: Defense in Depth

Lesson 3: Vulnerability Management and Response

Lesson 4: Data Security Technologies

Lesson 5: Windows and Azure Security

Lesson 6: Linux, AWS, and Mac Security

 

Hands-On Cybersecurity Training

  • Section 1: Tcpdump; Wireshark; AWS VPC Flow Logs
  • Section 2: Password Auditing; Data Loss Prevention; Mobile Device Backup Recovery
  • Section 3: Network Discovery; Binary File Analysis and Characterization; Web App Exploitation; SIEM Log Analysis
  • Section 4: Hashing and Cryptographic Validation; Encryption and Decryption; Intrusion Detection and Network Security Monitoring with Snort3 and Zeek
  • Section 5: Windows Process Exploration; Windows Filesystem Permissions; Applying Windows System Security Policies; Using PowerShell for Speed and Scale
  • Section 6: Linux Permissions; Linux Containers; Linux Logging and Auditing
  • Security professionals who want to fill the gaps in their understanding of technical information security
  • Managers who want to understand information security beyond simple terminology and concepts
  • Operations personnel who do not have security as their primary job function but need an understanding of security to be effective
  • IT engineers and supervisors who need to know how to build a defensible network against attacks
  • Administrators responsible for building and maintaining systems that are being targeted by attackers
  • Forensic specialists, penetration testers, and auditors who need a solid foundation of security principles to be as effective as possible at their jobs
  • Anyone new to information security with some background in information systems and networking

 

NICE Framework Work Roles

  • Security Control Assessor (OPM 612)
  • Database Administrator (OPM 421)
  • Data Analyst (OPM 422)
  • Technical Support Specialist (OPM 411)
  • Network Operations Specialist (OPM 441)
  • System Administrator (OPM 451)
  • Systems Security Analyst (OPM 461)
  • Cyber Instructional Curriculum Developer (OPM 711)
  • IT Investment/Portfolio Manager (OPM 804)
  • Cyber Defense Analyst (OPM 511)
  • Cyber Defense Infrastructure Support Specialist (OPM 521)

SEC401 covers all of the core areas of security and assumes a basic understanding of technology, networks, and security. For those who are new to the field and have no background knowledge, SEC275: Foundations - Computers, Technology and Security or SEC301: Introduction to Cyber Security would be the recommended starting point. While these courses are not a prerequisite for SEC401, they do provide the introductory knowledge to help maximize the experience with SEC401.

Depending on your current role or future plans, one of these courses is a great next step in your cybersecurity journey:

Security Operations Center (SOC) Analyst

  • SEC450: Blue Team Fundamentals: Security Operations and Analysis
  • SEC511: Cybersecurity Engineering: Advanced Threat Detection and Monitoring

Incident Handler:

  • SEC504: Hacker Tools, Techniques, and Incident Handling

Cloud Security Architect:

  • SEC510: Cloud Security Controls and Migration
  • SEC540: Cloud Security and DevSecOps Automation

Upcoming Classes

We Offer More Than Just SANS Training

Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.