Learn advanced tactics for penetration testing!
Learn CSX-P concepts and applications!
Learn basic forensics and documentation skills.
Learn Linux commands, create objects, and establish network connections!
Establish and secure networks from scratch!
Leverage packets to characterize networks, devices, and people!
An hands-on introduction to penetration testing!
A comprehensive package containing CPAC, CLAC, and CNAC!
A full year of continuous, hands-on cybersecurity training.
Learn how to gain access and maintain access to a system!
Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.
Learn how to detect odd DNS activity and isolate samples of the traffic.
Filter and parse packets to detect if the corporate intellectual property is being smuggled from their organization.
Leverage Nmap to understand what services their computers are running.
The first step in computer forensics is obtaining a copy of the computers hard drive in question.
Identify nodes and services on an internal network.
Identify what happened to a corporate webserver which was severely damaged during an attack.
Learn to Secure Web Browsers!
Uunderstand how to archive and hash non-compromised data and back it up to a safe location.
In these labs, students will get more practice with MBSA, as well as be introduced to the Linux Tiger IDS.
Add rules to protect your specific network devices from potential threats.
Test Chrome extensions for security flaws!
Learn how to ensure no backdoors or additional compromises exist on a system after an attack.
Test your red team and blue team skills in this capture-the-flag style challenge.
Students will interact with a username and password leak from a web app.
Generate nefarious logs and use tools to analyze.
Learn to manage and create SQL databases.
Learn about honeypot implementation.
Investigate a possible data breach in your company.
Get familiar with Security Onion and its functions!
Conduct audits of Linux systems!
Students taking this course will learn how to detect when a potential MitM attack is occurring.
Mobile forensics is similar to computer forensics but there are a few nuances to the task.
Analyze a flood script built with Scapy
Identify critical data using passive computer forensic techniques!
Gain an understanding of bash scripting and batch file execution!
Learn how to spot and mitigate the Spectre and Meltdown!
This lab will teach students how to create Snort rules for web-based attacks and how to manage alerts in Sguil.
Implement typical network diagnostic tools to determine the type of issue an end user is having.
Students will experience a situation where a former employee poses a serious threat to the company network.
Categorize network security incidents!
In this course, students learn how to change firewall rules to block unacceptable traffic.
Perform a phishing attack and illustrate the importance of cybersecurity awareness when browsing the internet.
Students will experience the different components of a distributed denial of service attack.
Learn how home automation coupled with AI algorithms are becoming a part of everyday life!
Use tools to identify and detect Cryptojacking malware.
Firewall routers will help protect your network from external and internal threats.
Gain an understanding of how home devices impact the field of cybersecurity!
Gain an understanding of how to conduct malware analysis.
Identify and detect VPNFilter malware.
Students will learn how to restore important, unaltered information by leveraging secure copy.
Students will identify web application cookies, interact with Burp, and a MITM attack.
Students will be exposed to SQL injection attacks and learn how to implement the elements of prevention.
Conduct testing against newly developed web applications to ensure they do not pose a risk