Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views1 page

Labs Available

The document lists a variety of labs available for training in network security and incident response. It includes both assisted and applied labs covering topics such as network reconnaissance, vulnerability scanning, access management, secure network design, and incident response. Each lab focuses on practical skills and tools essential for managing and securing network environments.

Uploaded by

AGBOOLA OLADIPO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views1 page

Labs Available

The document lists a variety of labs available for training in network security and incident response. It includes both assisted and applied labs covering topics such as network reconnaissance, vulnerability scanning, access management, secure network design, and incident response. Each lab focuses on practical skills and tools essential for managing and securing network environments.

Uploaded by

AGBOOLA OLADIPO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Labs Available:

Assisted Lab: Exploring the Lab Environment

Assisted Lab: Scanning and Identifying Network Nodes

Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools

Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan

Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor

APPLIED LAB: Performing Network Reconnaissance and Vulnerability Scanning

Assisted Lab: Managing the Lifecycle of a Certificate

Assisted Lab: Managing Certificates with OpenSSL

Assisted Lab: Auditing Passwords with a Password Cracking Utility

Assisted Lab: Managing Centralized Authentication

Assisted Lab: Managing Access Controls in Windows Server

Assisted Lab: Configuring a System for Auditing Policies

Assisted Lab: Managing Access Controls in Linux

APPLIED LAB: Configuring Identity and Access Management Controls

Assisted Lab: Implementing a Secure Network Design

Assisted Lab: Configuring a Firewall

Assisted Lab: Configuring an Intrusion Detection System

Assisted Lab: Implementing Secure Network Addressing Services

Assisted Lab: Implementing a Virtual Private Network

Assisted Lab: Implementing a Secure SSH Server

Assisted Lab: Implementing Endpoint Protection

APPLIED LAB: Securing the Network Infrastructure

Assisted Lab: Identifying Application Attack Indicators

Assisted Lab: Identifying a Browser Attack

Assisted Lab: Implementing PowerShell Security

Assisted Lab: Identifying Malicious Code

APPLIED LAB: Identifying Application Attacks

Assisted Lab: Managing Data Sources for Incident Response

Assisted Lab: Configuring Mitigation Controls

Assisted Lab: Acquiring Digital Forensics Evidence

Assisted Lab: Backing Up and Restoring Data in Windows and Linux

APPLIED LAB: Managing Incident Response, Mitigation and Recovery

You might also like