Learn advanced tactics for penetration testing!
Learn Linux commands, create objects, and establish network connections!
Establish and secure networks from scratch!
Leverage packets to characterize networks, devices, and people!
An hands-on introduction to penetration testing!
Learn CSXP concepts and applications!
Learn how to gain access and maintain access to a system!
A comprehensive package containing CPAC, CLAC, and CNAC!
Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.
Learn how to detect odd DNS activity and isolate samples of the traffic.
Filter and parse packets to detect if the corporate intellectual property is being smuggled from their organization.
Leverage Nmap to understand what services their computers are running.
The first step in computer forensics is obtaining a copy of the computers hard drive in question.
Identify nodes and services on an internal network.
Identify what happened to a corporate webserver which was severely damaged during an attack.
Uunderstand how to archive and hash non-compromised data and back it up to a safe location.
In these labs, students will get more practice with MBSA, as well as be introduced to the Linux Tiger IDS.
Add rules to protect your specific network devices from potential threats.
Learn how to ensure no backdoors or additional compromises exist on a system after an attack.
Students will interact with a username and password leak from a web app.
Investigate a possible data breach in your company.
Students taking this course will learn how to detect when a potential MitM attack is occurring.
Mobile forensics is similar to computer forensics but there are a few nuances to the task.
Analyze a flood script built with Scapy
Learn how to spot and mitigate the Spectre and Meltdown!
Implement typical network diagnostic tools to determine the type of issue an end user is having.
Students will experience a situation where a former employee poses a serious threat to the company network.
In this course, students learn how to change firewall rules to block unacceptable traffic.
Perform a phishing attack and illustrate the importance of cybersecurity awareness when browsing the internet.
Students will experience the different components of a distributed denial of service attack.
Firewall routers will help protect your network from external and internal threats.
Gain an understanding of how to conduct malware analysis.
Students will learn how to restore important, unaltered information by leveraging secure copy.
Students will identify web application cookies, interact with Burp, and a MITM attack.
Students will be exposed to SQL injection attacks and learn how to implement the elements of prevention.
Conduct testing against newly developed web applications to ensure they do not pose a risk