SEC401 - GSEC hands on?
I have a newer coworker in security, blue team, low level analyst now. The company will pay for his SANS GSEC course / cert but were asking what sort of hands on skills he might pick up from that. I suggested something more towards the GCIH/A range but they wanted him to get a more general overview first.
Checking the SANS course info page I'm not sure what parts of the course are hands on or what the labs consist of. Any ideas?
Thanks.
Checking the SANS course info page I'm not sure what parts of the course are hands on or what the labs consist of. Any ideas?
Thanks.
Comments
2020: GCIP | GCIA
2021: GRID | GDSA | Pentest+
2022: GMON | GDAT
2023: GREM | GSE | GCFA
WGU BS IT-NA | SANS Grad Cert: PT&EH | SANS Grad Cert: ICS Security | SANS Grad Cert: Cyber Defense Ops | SANS Grad Cert: Incident Response
SEC505: Securing Windows and PowerShell Automation
https://www.sans.org/course/securing-windows-with-powershell
GCWN
https://www.giac.org/certification/certified-windows-security-administrator-gcwn
this assumes you're a predominantly Windows environment and don't already have a mature endpoint posture
2020: GCIP | GCIA
2021: GRID | GDSA | Pentest+
2022: GMON | GDAT
2023: GREM | GSE | GCFA
WGU BS IT-NA | SANS Grad Cert: PT&EH | SANS Grad Cert: ICS Security | SANS Grad Cert: Cyber Defense Ops | SANS Grad Cert: Incident Response
The powershell course looks interesting, he already knows some powershell and isn't really in the position to be dealing with server security and such yet. So far he's mostly responding to SOC/SIEM alert emails, AV/malware cleanup, reaching out to users with security related issues, etc. I'd like him to get into network traffic analysis and more of a deep level of understanding of what malware actually does vs just getting alerts and putting in requests to wipe laptops.
I think my director made a mistake in trying to get him to focus by suggesting things like "what interests you, maybe hacking and doing pen tests?" Of course his eyes lit up with that but he really doesn't have the background or understanding of networking to even consider something like that yet so I'm trying to get his foundation solid before he tries to specialize just because he thinks the idea of hacking sounds cool.
Since I'm doing the graduate certificate, I really wish I had opted for the Pen Testing route, starting with the GCIH, only because I already had the Sec+ cert. But since I'm not in a pen testing position, and likely won't be for a long time, the GSEC was a good pick.
If he worked for me, I would demand he pass the Security+ certification before spending serious training $ on him. I have a co-worker who attended three SANS courses and didn't get any certifications. I seriously wonder how much he really benefited from the courses.
That's because Hacking is considered Cool. I think if your really interested in Cyber Security, incident response is where the money is. Sure it's helpful to have a little pentest background, but company's are really interested in how to protect themselves from break-ins, minimizing damage and recovering when they occur. The attack surface is so large, obviously your going to need more guards on the walls then attackers to climb over one small section of the walls. In time the over supply of penetration testers will force wages down, incident response can get boring, making keeping qualified staff more difficult, thus keeping wages high.