Skip to main content
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition

ISBN10: 1260453200 | ISBN13: 9781260453201

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition
ISBN10: 1260453200
ISBN13: 9781260453201
By Ric Messier

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.



Fully updated coverage of every topic on the current version of the GSEC exam



Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.

Covers all exam topics, including:
Networking fundamentals
Network design
Cloud computing
Authentication and access control
Unix/Linux
Windows
Encryption
Risk management
Virtual machines
Vulnerability control
Malware
Incident response
Wireless technologies
Log Management
IoT and embedded devices

Online content features:
Two practice exams
Test engine that provides full-length practice exams and customizable quizzes 
Author videos




Chapter 1: Information Security and the GIAC Security Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Cloud Computing
Chapter 6: Unix/Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Incident Response
Chapter 14: Wireless Technologies
Chapter 15: Log Management
Chapter 16: IoT and Embedded Devices

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top