CSX Cybersecurity Hands-On Basics Labs

Apply fundamental cybersecurity concepts in a live environment.

Difficulty: Intermediate CSF Domain: All domains

$200.00

Price represents the non member rate.

Buy Now
or pay later by invoice

CSX Cybersecurity Hands-On Basics Labs

A collection of 12 hands-on instructional labs that walk learners through the basic technical concepts of cybersecurity including: digital forensics, DoS, file hashing and permissions, firewall rules, Windows permissions, SQL injection, SSH, ACL, and more.

Within the state-of-the-art Cybersecurity Nexus (CSX) training platform, these labs will help you:
  • Understand some of the basics tasks involved in cybersecurity.
  • Create foundational, hands-on cyber skills.
  • Practice in an immersive live network environment.
  • Six-month access to train and test on your schedule, 24/7.

*Please note that this is a LAB ONLY course that requires previous technical experience. Instructional SCORMs are not included.

Continuing Professional Education (CPE) Credit Count: 24

This course includes:

Eleven lessons with hands-on labs that focus on the basics of cybersecurity, plus one bonus “challenge” lab that tests your new skills.


LabDigital Forensics

DOMAIN: Detect

In Forensics, pictures are an important factor in evidence. All files, pictures included, contain metadata, which is data about the data. In this lab we will deep dive into conducting basic forensics on specific files.


LabDoS

DOMAIN: Detect

Denial of Service attacks are utilized by attackers to impede service availability. In this lab students will experience the different components of a distributed denial of service attack.


LabFile Hashing

DOMAIN: Protect

Hashing is a cryptologic function that is used to ensure file integrity. In this lab we go through the basic process of hashing files for data integrity.


LabWindows and Linux File Permissions

DOMAIN: Protect

File permissions ensure that specific users or groups of users have the resources they need to do their jobs while prohibiting unnecessary access to sensitive data. In this lab we will explore both Linux and Windows filesystems permission controls.


LabScanning Ports and Utilizing SSH

DOMAIN: Identify

Servers and workstations usually provide services to other devices on the network. What services are running on what device and how do we utilize them? In this lab we’ll go through remote network service discovery as well as using an SSH service.


LabWindows and Linux OS Firewall

DOMAIN: Protect

Firewalls prevent or allow the use of specific services on a workstation or server. Most modern operating systems provide built in functionality for firewalls. In this lab, we will look at both Windows and Linux OS level firewall configuration.


LabIDS/IPS

DOMAIN: Protect

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are a foundation aspect of any digital information security architecture. In this lab we will go through a very basic setup for these appliances.


LabPacket Analysis

DOMAIN: Detect

On a TCP/IP network every communication is in packet form. Conducting packet analysis is an important skill for any member of the IT community to have. This lab will guide you through some basic packet analysis.


LabSQL Injection

DOMAIN: Detect/Respond

SQL Injection is a common technique used by hackers and red teams to infiltrate database systems via the Web UI. In this lab, we will give student hands-on experience with this type of attack.


LabUnauthorized Network Activity

DOMAIN: Respond

Cybersecurity practitioners understand the importance of Domain Name System (DNS) packets and how they enable the flow of data across the internet. Therefore, practitioners also understand that the subversion of DNS services on a network is a common attack seen in cybersecurity. In this lab, students will learn how to detect odd DNS activity and isolate samples of the traffic.


LabWindows ACL/Windows Account Permissions

DOMAIN: Protect

Access Control Lists (ACLs) and account permissions are fundamental aspects to digital information security. In this lab, we’ll explore the built-in capabilities of the Windows OS to implement these protections.


CHALLENGE LABChallenge Lab: CSX Basics Challenge

DOMAIN: Various

In this challenge lab, you will need to use the skills learned in previous labs to complete the challenge.

Need training for a team? Contact us for group pricing.