A collection of 12 hands-on instructional labs that walk learners through the basic technical concepts of cybersecurity including: digital forensics, DoS, file hashing and permissions, firewall rules, Windows permissions, SQL injection, SSH, ACL, and more.Within the state-of-the-art Cybersecurity Nexus (CSX) training platform, these labs will help you:
Eleven lessons with hands-on labs that focus on the basics of cybersecurity, plus one bonus “challenge” lab that tests your new skills.
In Forensics, pictures are an important factor in evidence. All files, pictures included, contain metadata, which is data about the data. In this lab we will deep dive into conducting basic forensics on specific files.
Denial of Service attacks are utilized by attackers to impede service availability. In this lab students will experience the different components of a distributed denial of service attack.
Hashing is a cryptologic function that is used to ensure file integrity. In this lab we go through the basic process of hashing files for data integrity.
File permissions ensure that specific users or groups of users have the resources they need to do their jobs while prohibiting unnecessary access to sensitive data. In this lab we will explore both Linux and Windows filesystems permission controls.
Servers and workstations usually provide services to other devices on the network. What services are running on what device and how do we utilize them? In this lab we’ll go through remote network service discovery as well as using an SSH service.
Firewalls prevent or allow the use of specific services on a workstation or server. Most modern operating systems provide built in functionality for firewalls. In this lab, we will look at both Windows and Linux OS level firewall configuration.
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are a foundation aspect of any digital information security architecture. In this lab we will go through a very basic setup for these appliances.
On a TCP/IP network every communication is in packet form. Conducting packet analysis is an important skill for any member of the IT community to have. This lab will guide you through some basic packet analysis.
SQL Injection is a common technique used by hackers and red teams to infiltrate database systems via the Web UI. In this lab, we will give student hands-on experience with this type of attack.
Cybersecurity practitioners understand the importance of Domain Name System (DNS) packets and how they enable the flow of data across the internet. Therefore, practitioners also understand that the subversion of DNS services on a network is a common attack seen in cybersecurity. In this lab, students will learn how to detect odd DNS activity and isolate samples of the traffic.
Access Control Lists (ACLs) and account permissions are fundamental aspects to digital information security. In this lab, we’ll explore the built-in capabilities of the Windows OS to implement these protections.
In this challenge lab, you will need to use the skills learned in previous labs to complete the challenge.