Chapter 1: Information Security and the GIAC Security Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Cloud Computing
Chapter 6: Unix/Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Incident Response
Chapter 14: Wireless Technologies
Chapter 15: Log Management
Chapter 16: IoT and Embedded Devices