SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
Need Help? Email [email protected]
  • LOGIN

E-SPIN Group

CONTACT US / GET A QUOTE
  • No products in cart.
  • HOME
  • PROFILE
    • Corporate Profile
    • About us
    • Customer Overview
    • Investor Relations
    • Procurement
  • GLOBAL THEMES
    • Artificial Intelligence (AI)
    • Big Data
    • Blockchain
    • Cloud Computing
    • Cognitive Computing
    • Cyber Security
    • DevSecOps
    • Digital Transformation (DT)
    • Modern Workplace
    • Internet of Things (IoT)
    • Quantum Computing
  • SOLUTIONS
    • Application Security
    • DevSecOps
    • Digital Forensics
    • IT Operations Management (ITOM)
    • Malware Analysis and Reverse Engineering
    • Network Management System (NMS)
    • Network Operation (NetOps)
    • Network Performance Monitoring and Diagnostics (NPMD)
    • Penetration Testing
    • Secure Development
    • Security Information & Event Management (SIEM)
  • INDUSTRIES
    • Aerospace & Defense
    • Automotive
    • Banking & Financial Markets
    • Chemical & Petroleum
    • Commercial and Professional Services
    • Construction & Real Estate
    • Consumer Products
    • Education
    • Electronics
    • Energy & Utilities
    • Food & Beverage
    • Information Technology
    • Insurance
    • Healthcare
    • Goverment
    • Telecommunications
    • Transportation
    • Travel
    • Manufacturing
    • Media & Entertainment
    • Mining & Natural Resources
    • Life Sciences
    • Retail
  • PRODUCTS
    • Brand Overview
      • Acunetix
      • E-Lock
      • Hex-Rays
      • Immunity
      • Progress | Ipswitch
      • Metageek
      • Qualys
      • Parasoft
      • Tenable
      • Titania
      • Veracode
    • Rest of Brands
      • Adobe
      • BeyondTrust
      • Core Security
      • DefenseCode
      • HCL
      • ImmuniWeb
      • LiveAction
      • McAfee
      • Micro Focus
      • Microsoft
        • Microsoft Surface
      • Netsparker
      • Nutanix
      • Paessler
      • PECB
      • Portswigger
      • Red Hat
      • Riverbed
      • RSA
      • Solarwinds
      • TamoSoft
      • Trend Micro
      • TSFactory
      • Trustwave
      • VMware
      • VanDyke
      • Visiwave
    • Services Overview
    • Line Card
  • e-STORE
    • e-STORE
    • eSTORE Guide
    • SUPPORT
  • CAREERS
    • Careers
    • Culture, Values and CSR
    • How We Hire
    • Job Openings
  • BLOG / NEWS
    • Blogs and News
    • Resources Library
    • Calendar of Events
  • CONTACT
  • Home
  • Solution
  • GIAC Certified Enterprise Defender (GCED)
Global Information Assurance Certification (GIAC)
0
E-SPIN
Thursday, 19 July 2012 / Published in Solution

GIAC Certified Enterprise Defender (GCED)

GIAC Certified Enterprise Defender (GCED)

Type: Certification

Course: No Specific training is required for any GIAC certification. If candidates need help in mastering the objectives for this certification, there are many sources of information available. Practical experience is one option; there are also numerous books on the market covering Computer Information Security. Another option is SANS training, or any relevant courses from other training providers.

Target: The GCED builds on the security skills measured by the GSEC (no overlap). It assesses more advanced, technical skills that are needed to defend the enterprise environment and protect an organization as a whole. Knowledge, skills and abilities assessed are taken from the areas of Defensive Network Infrastructure, Packet Analysis, Penetration Testing, Incident Handling, and Malware Removal.

Requirements: 1 proctored exam – 150 questions – 4-hour time limit – 68.7% (103 of 150 questions) minimum passing score

Renewal: Every 4 years

Delivery: Exams are delivered online through a standard web browser. For exams purchased with SANS training, access to the exam will be available 7-10 days following the end of the conference. Standalone challenge exams are issued within 24 hours upon receipt of payment. You will receive an email from GIAC when your exam has been issued to your portal account. You have 120 days to complete the exam from the time we send notice that it is available. The exams are proctored and should be scheduled using our.

Advanced Security Essentials – Enterprise Defender, Security 501

Course overview

Cyber Security Survival Course – Security Enterprise Defender

Cyber security continues to be a critical area for organizations and will continue to increase in importance as attacks become stealthier, have a greater financial impact on an organization, and cause reputational damage. While Security Essentials lays a solid foundation for the security practitioner, there is only so much that can be packed into a six-day course. Security 501 is a follow up to SEC401: SANS Security Essentials (with no overlap) and continues to focus on more technical areas that are needed to protect an organization. The core focus of the course is on:

  • Prevention – configuring a system or network correctly
  • Detection – identifying that a breach has occurred at the system or network level
  • Reaction – responding to an incident and moving to evidence collection/forensics

A key theme is that prevention is ideal, but detection is a must. We need to be able to ensure that we constantly improve our security to prevent as many attacks as possible. This prevention/protection occurs on two fronts – externally and internally. Attacks will continue to pose a threat to an organization as data becomes more portable and networks continue to be porous. Therefore a key focus needs to be on data protection, securing our critical information no matter whether it resides on a server, in a robust network architecture, or on a portable device.

Despite an organization’s best effort at preventing attacks and protecting their critical data, some attacks will still be successful. Therefore we need to be able to detect attacks in a timely fashion. This is accomplished by understanding the traffic that is flowing on your networks and looking for indication of an attack. It also includes performing penetration testing and vulnerability analysis against an organization to identify problems and issues before a compromise occurs.

Finally, once an attack is detected we must react to it in a timely fashion and perform forensics. By understanding how the attacker broke in, this can be fed back into more effective and robust preventive and detective measures, completing the security lifecycle.

Defensive Network Infrastructure, Security 501- Day 1

Prevention

Protecting a network from attack starts with designing, building, and implementing a robust network infrastructure. There are many aspects to implementing a defense-in-depth network that are often overlooked since companies focus too often only on functionality. Achieving the proper balance between business drivers and core protection of information is very difficult, and an organization must build a network that is mission resilient to a variety of attacks that might occur.

On the first day students will learn not only how to design and build a network that can both prevent attacks and recover after compromise, but also how to retrofit an existing network to achieve the level of protection that is required. Building a network is easy, but integrating all of the components so the network can withstand a variety of attacks and support the mission of the organization takes a special skill. Students will learn how to design and implement a functionality-rich, secure network and also how to maintain and update it as the threat landscape evolves.Topics Covered:

Introducing Network Infrastructure as Targets for Attack

  • Impact of compromised routers and switches
  • Escalating privileges at layers 2 and 3
  • Weaknesses in Cisco router and switch architecture
  • Integrating and understanding existing and network devices to defend against attacks

Implementing the Cisco Gold Standard to Improve Security

  • CISecurity Level 1 and 2 Benchmarks for Routers
  • SANS Gold Standard switch configuration
  • Implementing security on an existing network and rolling out new devices

Advanced Layer 2 and 3 Controls

  • Routing protocol authentication
  • Filtering with access control lists
  • DHCP, ARP snooping, and Port Security
  • Introduction to Network Admission Control and 802.1x

Packet Analysis, security 501- Day 2

Detection

Prevention is ideal, but detection is a must – this is a critical motto of security professionals. While organizations always like to prevent as many attacks as possible, some will still sneak into the network. In cases where an attack can not be prevented, security professionals must understand the indications and warnings that are indicative of attack and detect them before they cause significant harm. Packet analysis and intrusion detection is at the core of timely detection. Not only should attacks be detected, but organizations should react to make sure that these attacks can be prevented in the future.

Based on the changing landscape of attacks, detecting attacks is becoming more difficult because attacks are now more stealthy and difficult to find. Only by understanding the core principles of traffic analysis can one become a skilled analyst and be able to differ between normal traffic and attack traffic. In addition, new attacks are coming out all the time. So security professionals must be able to write rules that detect new, advanced zero-day attacks before they compromise a network.

In the past, traffic analysis and intrusion detection was treated as a separate discipline within many organizations. Today, prevention, detection, and reaction must all be closely knit so that once an attack is detected, defensive measures can be adapted, proactive forensics can be implemented, and the organization can to continue to operate.Topics Covered:

Architecture Design and Preparing Filters

  • Building intrusion detection capability into a network
  • Understanding the components currently in place

Detection Techniques and Measures

  • Understanding various types of traffic occurring on a network
  • Knowing how normal traffic works
  • Differentiating between attacks and normal users on a network

Advanced IP Packet Analysis

  • Performing deep packet inspection and understanding usage of key fields
  • Event correlation and analysis
  • Analyzing an entire network instead of a single device
  • Building advanced snort rules

Intrusion Detection Tools

  • Installing and using analysis software
  • Wireshark
  • Building custom filters

Pentest, Security 501- Day 3

Detection

Security is all about understanding, mitigating, and controlling risk to an organization’s critical assets. Therefore an organization must understand what the changing threat landscape is and compare that against its own vulnerabilities that could be used to compromise a network. While this was never an easy task, it is becoming much more difficult since the threats are evolving very rapidly and organizations are so complex. On day three students will understand the variety of tests that can be run against an organization and how to perform penetration testing in an effective manner.

Finding basic vulnerabilities is easy, but it is not very effective if these are not the vulnerabilities that attackers will use to break into a system. Advanced penetration testing involves understanding the variety of systems and applications on a network and how they can be compromised by an attacker. Students will learn about both external and internal penetration testing and the methods of black, gray, and white box testing.

Penetration testing is critical to identify an organization’s exposure points, but students will also learn how to prioritize and fix these vulnerabilities to increase the overall security of an organization.

First Responder, Security 501-Day 4

Reaction

Any organizations that are connected to the Internet or that have employees are going to have attacks launched against them. Even with a keen focus on robust network design, preventive security, and finding vulnerabilities through penetration testing, some attacks will still occur. In these cases identifying, analyzing, and responding is critical.

Security professionals need to understand how to perform incident response, analyze what is occurring, and restore their organization back to a normal state as soon as possible. Day four will equip students with a proven six-step process to follow in response to an attack – prepare, identify, contain, eradicate, recover and learn from previous incidents. Cyber incidents are a lot like a fire. The sooner you detect them, the easier they are to deal with and the less damage they cause. Therefore prompt incident response is a key follow-on to intrusion analysis.

Another key aspect of incident response is forensic analysis and discovery. Students will learn how to perform forensic investigation and find indication of an attack. This information will be fed into the incident response process and ensure the attack is prevented from occurring again in the future.

Malware, Security 501- Day 5

Reaction

As security professionals continue to build more proactive security measures, attackers methods will continue to evolve. A common way for attackers to target, control, and break into as many systems as possible is through the use of malware. Therefore it is critical that students understand what type of malware is currently available to attackers and future trends and methods of exploiting systems. With this knowledge students can then learn how to analyze, defend, and detect malware on systems and minimize the impact to the organization.

Data Loss Prevention, Security 501-Day 6

Prevention

Cyber security is all about managing, controlling, and mitigating risk to your critical assets. In almost every organization, your critical assets are composed of data or information. Whether it is a customer list, research plans, intellectual property, classified information, or a marketing plan, this data represents the life line of your organization and must be properly protected. Perimeters are still important and critical, but we are moving away from a fortress model and moving towards a focus on data. This is based primarily on the fact that our networks are becoming more porous, and our data is more portable.

Information no longer solely resides on your servers where properly configured access controls list can limit access and protect our information. The same intellectual property that is protected on a server behind a strong perimeter can now be copied to laptops (i.e. portable servers) and be plugged into networks (i.e. hotels, airports and coffee shops) that have no firewalls or security devices in place. This means the data must be able to be protected no matter where it resides, since a compromise of sensitive data will have an impact to the company, no matter how it was stolen.

Building a strong perimeter defense is a critical first step, but focusing in on protecting and controlling critical data from loss is another key step in building a strong preventive measure. Proactive security must be put in place to make sure critical information is properly protected and exposure is minimized.

Tagged under: Certification, Class, espin, espincorp, GIAC Certified Enterprise Defender (GCED), Solution, Training

What you can read next

Whatsup Gold Application Performance Management (APM) Insights
Whatsup Gold Application Performance Management (APM) Insights
FREE Book- E-SPIN Professional Reading on Unified Security Monitoring (USM) : Unified Real-Time Vulnerability, Event and Compliance Monitoring for Vulnerability Management, Compliance Management and Security Information & Event Management (SIEM)
FREE Book- E-SPIN Professional Reading on Unified Security Monitoring (USM) : Unified Real-Time Vulnerability, Event and Compliance Monitoring for Vulnerability Management, Compliance Management and Security Information & Event Management (SIEM)
iKey USB 4000

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • DefenseCode Webstrike DAST and Thunderscan SAST Technology Update Training

    For existing and new customers and partners, it...
  • Unlearning is important for adult professional development

    World is changing at the speed of light, at bli...
  • 5 huge benefit of digital transformation

    In search for digital service excellence

    In the 1980s, Tom Peter was published In search...
  • Why paper planner, notebook and journal still one of modern productivity tool

    Paper planner is symbol of dated work practice?...
  • The future of work after COVID-19

    Let’s get real, despite the vaccine rolli...

Recent Comments

  • Dorai M on 5 Common ML Challenges Data Scientists Face

Archives

  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • March 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • January 2015
  • December 2014
  • October 2014
  • September 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • February 2012
  • July 2011
  • June 2011
  • February 2009
  • July 2008

Categories

  • Acunetix
  • Adobe
  • Aerospace and Defence
  • AppSec Labs
  • Automotive
  • Banking and Financial Markets
  • BeyondTrust
  • Brand
  • Chemical and petroleum
  • Codified Security
  • Commercial and Professional Services
  • Construction and Real Estate
  • Consumer products
  • Contact Us
  • Core Impact
  • Core Security
  • DefenseCode
  • E-Lock
  • Education
  • Electronics
  • Energy and utilities
  • FAQ
  • Food and Beverage (F&B)
  • GFI
  • Global Themes and Feature Topics
  • Government
  • HCL
  • Healthcare
  • Hex-Rays
  • IBM
  • Immunity
  • ImmuniWeb
  • Industries
  • Information Technology
  • Insurance
  • Ipswitch
  • Job
  • Life Science
  • LiveAction
  • Logpoint
  • Manufacturing
  • McAfee
  • Media and Entertainment
  • Metageek
  • Micro Focus
  • Microsoft
  • Mining and Natural Resources
  • Nessus
  • Netsparker
  • News
  • Nutanix
  • Paessler
  • Parasoft
  • PECB
  • PortSwigger
  • Pradeo
  • Product
  • Qualys
  • Rapid7
  • RedHat
  • Retail
  • Retina
  • Riverbed
  • RSA
  • Security Innovation
  • Security Roots
  • Services
  • SILICA
  • Smart City
  • Soft Activity
  • SolarWinds
  • Solution
  • Symantec
  • TamoSoft
  • Telecommunications
  • Tenable
  • Titania
  • Transportation
  • Travel
  • Trend Micro
  • Trustwave
  • TSFactory
  • Uncategorized
  • Vandyke
  • Veracode
  • Videos
  • VisiWave
  • VMware
  • Webinar Archive

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

CORPORATE

  • Profile
  • About us
  • Careers
  • Investor Relations
  • Procurement

SOLUTIONS & PRODUCTS

  • Industries
  • Solutions
  • Products
  • Brand Overview
  • Services

STORE & SUPPORT

  • Shop
  • Cart
  • Checkout
  • My Account
  • Support

PRODUCTS & SERVICES

  • Industries
  • Solutions
  • Products
  • Brand Overview
  • Services

FOLLOW US

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn
  • YouTube
  • WordPress Blog
© 2005 - 2021 E-SPIN Group of Companies | All rights reserved.
  • Contact
  • Privacy
  • Terms of use
TOP