Products

ISACA members get discounts in the store! Include your ISACA ID in your Nexus profile to take advantage of your membership benefits. If you're not yet a member, click here.
Additional Firewall Setup

Add rules to protect your specific network devices from potential threats.

intermediate

Protect

Chrome Extension Testing

Test Chrome extensions for security flaws!

intermediate

Detect

Cleaning Up After an Attack

Learn how to ensure no backdoors or additional compromises exist on a system after an attack.

intermediate

Recover

Data Leakage

Students will interact with a username and password leak from a web app.

intermediate

Identify

Generating and Analyzing Logs

Generate nefarious logs and use tools to analyze.

intermediate

Respond

Implementing Database Management

Learn to manage and create SQL databases.

intermediate

Identify

Initializing Honeypots

Learn about honeypot implementation.

intermediate

Detect

Introduction to Forensics Recovery

Investigate a possible data breach in your company.

intermediate

Recover

Intrusion Detection System Implementation and Testing

Get familiar with Security Onion and its functions!

intermediate

Detect

Linux Baseline with Lynis

Conduct audits of Linux systems!

intermediate

Identify

Man-in-the-Middle Detection

Students taking this course will learn how to detect when a potential MitM attack is occurring.

intermediate

Detect

Mobile Forensics

Mobile forensics is similar to computer forensics but there are a few nuances to the task.

intermediate

Recover

Packet Construction and Kernel Hardening

Analyze a flood script built with Scapy

intermediate

Protect

Passive Computer Forensics

Identify critical data using passive computer forensic techniques!

intermediate

All domains

Script Construction and Execution

Gain an understanding of bash scripting and batch file execution!

intermediate

Identify

Spectre and Meltdown Mitigation

Learn how to spot and mitigate the Spectre and Meltdown!

intermediate

Detect

Testing Intrusion Detection Systems

This lab will teach students how to create Snort rules for web-based attacks and how to manage alerts in Sguil.

intermediate

Protect

Threat Detection

Implement typical network diagnostic tools to determine the type of issue an end user is having.

intermediate

Detect

Threat Identification and Detection

Students will experience a situation where a former employee poses a serious threat to the company network.

intermediate

Detect

Triaging Incidents

Categorize network security incidents!

intermediate

Respond

Updating Firewall Rules

In this course, students learn how to change firewall rules to block unacceptable traffic.

intermediate

Protect