GSEC difficulty?
I have a good index and did all of the on-demand training. What do you think my chances are?
Comments
-
quogue66 Member Posts: 193 ■■■■□□□□□□Read the books and do all the labs three times and you will definitely pass.
-
johndoee Member Posts: 152 ■■■□□□□□□□I have a good index and did all of the on-demand training. What do you think my chances are?
You did everything everyone else does to pass....So, you have about the same risk of reward or failure as everyone else. Some people go through the material two and three times. Whatever works for you. I personally didn't do any of the labs with the course. But, do whatever works for you.
Good Luck -
MalwareMike Member Posts: 147 ■■■□□□□□□□How did you do on the practice exams? If you're in the 80s and your index has helped you locate info rather quickly, you are good to go.Current: GSEC, GCIH, GCIA, GWAPT, GYPC, RHCSA, WCNA
2019 Goals: CISSP, Splunk certifications (Certified Core, Power User, Admin, and Architect)
Twitter: https://twitter.com/Malware_Mike
Website: https://www.malwaremike.com -
futurehendrix Member Posts: 28 ■□□□□□□□□□Read the books and do all the labs three times and you will definitely pass.
how would you compare the difficulty of the GCIA and GSEC? I'm currently an analyst and would like to eventually be an engineer, architect and eventually a manger role.
Seems like GSEC would be a nice overview of the entire security landscape as oppose to just intrusion detection. -
Donklander Member Posts: 47 ■■■□□□□□□□futurehendrix wrote: »how would you compare the difficulty of the GCIA and GSEC? I'm currently an analyst and would like to eventually be an engineer, architect and eventually a manger role.
Seems like GSEC would be a nice overview of the entire security landscape as oppose to just intrusion detection.
GCIA is definitely harder in the sense that it is much more focused.
GSEC is comparable to a technical oriented CISSP. (Long test, very broad in scope but not overly deep)
GCIA lives and dies in understanding protocol headers and Snort/Wireshark/Bro and similar tools, so the purpose of the course is to understand what xxx NID alarm means.
One thing I enjoy about SANS testing is, they don't try to trick you with questions. You either know the material or you don't. -
sb97 Member Posts: 109Donklander wrote: »GCIA is definitely harder in the sense that it is much more focused.
GSEC is comparable to a technical oriented CISSP. (Long test, very broad in scope but not overly deep)
GCIA lives and dies in understanding protocol headers and Snort/Wireshark/Bro and similar tools, so the purpose of the course is to understand what xxx NID alarm means.
One thing I enjoy about SANS testing is, they don't try to trick you with questions. You either know the material or you don't. -
Blucodex Member Posts: 430 ■■■■□□□□□□Donklander wrote: »GCIA is definitely harder in the sense that it is much more focused.
GSEC is comparable to a technical oriented CISSP. (Long test, very broad in scope but not overly deep)
GCIA lives and dies in understanding protocol headers and Snort/Wireshark/Bro and similar tools, so the purpose of the course is to understand what xxx NID alarm means.
One thing I enjoy about SANS testing is, they don't try to trick you with questions. You either know the material or you don't.
I just took a GSEC practice exam yesterday. I felt it was more technically relevant than a CISSP because it has operating system specific questions, network traffic questions, and incident response questions. I'm sure there are more examples--then again, I took my CISSP in 2011 I believe.
I feel like the GSEC is a much more in-depth version of the combination of Security+, CEH, and CHFI. -
josh.armentrout1 Member Posts: 36 ■■■□□□□□□□GSEC, like others have said, is a very broad subject exam. I'd consider it a hard exam due to that. The other GIAC exams are far more focused on a specific subject and that allows you to concentrate on a specific item when studying.
Have a well defined index, use the practice exams to tune your index, and pass an exam. I try to make my indexes overkill such that I don't have to look inside the other books. If I need to look in the books, it's to get specific items or a diagram from the page. The last ditch effort is to use their printed "index" which is basically a concordance of keywords. This will get you into a lot of headaches. Try not to go there. -
beads Member Posts: 1,533 ■■■■■■■■■□If your most comfortable with Windows bone up a bit on the directory structure and syntax of LINUX, etc. Other than that it was a long but quite doable exam.
- b/eads -
krucial85 Member Posts: 84 ■■■□□□□□□□I've taken several SANS courses and I've found that if you really read ALL of the material, watch the on-demand videos ( if you have them) and make a good index, the GSEC course is very doable. This is the key for most of the courses."The way to succeed is never quit. That's it. But be really humble about it."
-
futurehendrix Member Posts: 28 ■□□□□□□□□□Donklander wrote: »GCIA is definitely harder in the sense that it is much more focused.
GSEC is comparable to a technical oriented CISSP. (Long test, very broad in scope but not overly deep)
GCIA lives and dies in understanding protocol headers and Snort/Wireshark/Bro and similar tools, so the purpose of the course is to understand what xxx NID alarm means.
One thing I enjoy about SANS testing is, they don't try to trick you with questions. You either know the material or you don't.
I am still a few years away from management (this is my first year as a security analyst) so does the GSEC make sense right now? -
LionelTeo Member Posts: 526 ■■■■■■■□□□GSEC covers Linux, Windows and Policies from the security perspective. It is actually a pretty good course. I generally felt that the content is written to be more useful for security administrators managing Active Directory and Windows/Linux servers in mind. While it is certainly useful for those who are managing ADs and servers on a daily basis, it is a good to know for those who wanted to learn more about them.