Building on the recently launched CDPSE (Certified Data Privacy Engineer) program, this collection of labs will help CDPSE holders and aspirants gain real-world experience dealing with data security and privacy implementation.
*Please note that this is a LAB ONLY course that requires previous technical experience. Instructional SCORMs are not included.Continuing Professional Education (CPE) Credit Count: 24
Event Viewer is a Windows logging program that shows Administrators and users detailed event logs for their local or remotely managed machines. A single machine can generate thousands of events per day, so learning how to efficiently manage these logs is critical for any cybersecurity professional. Following recommendations from Microsoft and the NSA, we will create two custom security logs that filter for events often associated with cybersecurity-related incidents. By the end of this lab you will have all the necessary skills to create the rest of the recommended custom logs and aggregate all Windows security logs in a single place.
Students will leverage network scanning tools to identify nodes and services on an internal network. The end goal is to create an up to date network map of their company's internal network for troubleshooting, analysis, and future reference.
As a proficient Windows administrator, it will be your responsibility to successfully install Active Directory in order to create a domain controller. It will be your responsibility to utilize Windows domain controller functionalities in order to create and manage assets.
Students will leverage Nmap to conduct a network scan of a system to identify the current state and baseline adherence of business assets. Upon identification of a system which does not adhere, they implement the change management plan and patch the identified system.
After being exploited due to vulnerable software and lacking system security, you are now tasked with recovering from the attack by fixing the system security issues and updating vulnerable software on the Windows machine.
In early 2018 security researchers discovered several nefarious Chrome Extensions that were making unwanted calls to ad servers. This resulted in the removal of these chrome extensions from the Google Extension Store and a heightened awareness to the possible effects of Chrome Extensions on Business Networks.
As IOT devices become more common, it is important to understand how much these devices can reveal about your daily habits. These devices were built to interact with us inside our homes, making it easy to correlate device usage with someone being home.
Home Automation coupled with AI algorithms are becoming a part of everyday life. From Google Assistant to Siri, these services connect to devices in our home and learn about our individual habits. What kind of data are these devices sending across the internet? What kinds of lifestyle patterns may be inadvertently leaked by these algorithms? Let's take a look!
As a cybersecurity professional, it is your responsibility to understand the fundamentals of blockchain technology. In this lab, it will be your job to comprehend and implement cryptographic hash functions as well as creating and self-signing digital certificates.
In order to capture and analyze data flow, it is important to understand how to use Wireshark and Tshark, two critical tools in the packet analysis field. This lab uses these tools to map endpoints on the network.
In this lab, students will be identifying packets with Wireshark. Due to the fact that data loss is a prevalent aspect of technology, we will need to recover the packet identification data using the tool Foremost.
Maintaining copies of non-compromised data and files are paramount to the incident response and disaster recovery process. This lab ensures that students understand how to archive and hash non-compromised data and back it up to a safe location.