CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security



Similar documents
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Penetration Testing with Kali Linux

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Pen Test Tips 2. Shell vs. Terminal

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

SCP - Strategic Infrastructure Security

INFORMATION SECURITY TRAINING CATALOG (2015)

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Virtual Learning Tools in Cyber Security Education

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

2016 TÜBİTAK BİLGEM Cyber Security Institute

Vulnerability Assessment and Penetration Testing

INFORMATION SECURITY TRAINING CATALOG (2016)

Securing Data on Microsoft SQL Server 2012

IT Networking and Security

Principles of Information Assurance Syllabus

Build Your Own Security Lab

MS-55096: Securing Data on Microsoft SQL Server 2012

1. LAB SNIFFING LAB ID: 10

Medical Networks and Operating Systems

Introduction to Cyber Security / Information Security

RMAR Technologies Pvt. Ltd.

Discovering passwords in the memory

Topics in Network Security

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Cyber Exercises, Small and Large

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Linux Network Security

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Specialized Programme on Internetworking Design and LAN WAN Administration

IT Networking and Security

Vulnerability Assessment Lab

information security and its Describe what drives the need for information security.

Certified Ethical Hacker (CEH)

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Lab 1: Network Devices and Technologies - Capturing Network Traffic

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Certified Secure Computer User

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Lab 2: Secure Network Administration Principles - Log Analysis

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Course Title: Course Description: Course Key Objective: Fee & Duration:

Device Log Export ENGLISH

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Table of Contents. Introduction. Audience. At Course Completion

Exam Questions SY0-401

Information Security. Training

Audience. Pre-Requisites

Learning and Playing: Integrating Competition Experiences Into Formal Curriculum CS Palos Hills, IL

The Value of Physical Memory for Incident Response

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Security Awareness. Wireless Network Security

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Introduction Open Source Security Tools for Information Technology Professionals

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Introduction on Low level Network tools

How To Protect Your School From A Breach Of Security

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Lab Configuring Access Policies and DMZ Settings

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Lab Objectives & Turn In

1B1 SECURITY RESPONSIBILITY

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Network Attacks and Defenses

File Transfer Examples. Running commands on other computers and transferring files between computers

Ethical Hacking Course Layout

EC-Council Certified Security Analyst (ECSA)

NETWORK SECURITY WITH OPENSOURCE FIREWALL

A Systems Engineering Approach to Developing Cyber Security Professionals

Lab 3: Recon and Firewalls

Security + Certification (ITSY 1076) Syllabus

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

Spikes Security Isla Browser Isolation System. Prepared for Spikes Security

Secure Remote Control Security Features for Enterprise Remote Access and Control

Directory and File Transfer Services. Chapter 7

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Learn Ethical Hacking, Become a Pentester

IDS and Penetration Testing Lab II

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

NETWORK SECURITY (W/LAB) Course Syllabus

Exploiting Transparent User Identification Systems

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Transcription:

Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles - Log Analysis Using Grep Using Gawk Log Analysis in Windows Using Find 3 Network Ports - Transferring Data Using TCP/IP Using Hyper Text Transfer Protocol (HTTP) to Transfer Files Using Fire Transfer Protocol (FTP) to Transfer Files Transferring Files Securely Using SCP 4 Network Ports - Connecting to a Remote System Connecting to a Windows system Through the Command Line Connecting to a Linux System Through the Command Line Analyzing Remote Connections in Network 5 Secure Implementation of Wireless Networking Examining Plain Text WEP

WPA 6 Incident Response Procedures Compliance and Operational Security Using db_autopwn to Collecting Volatile Data Viewing Network Logs 7 Types of Malware Using Netcat to Send a Using Ncat to Send a Sending a Bash Shell to a Windows Machine using NetCat 8 Types of Attacks Using Window Commands Viewing Network Resources Using PSEXEC to Connect to a Remote System Stopping, Starting, and Removing Services 9 Types of Application Attacks for Exploitation Attacking a Remote System Utilizing Armitage Post Exploitation of the Remote System 10 Techniques - Anti Forensic The Windows Event Viewer Enabling Auditing Clearing the Event Logs 11 Techniques - Password Cracking Cracking Linux

with Cain 12 Discovering Security Threats and Using Nessus for Exploration 13 Data Theft Using Metasploit to Stealing Data using FTP and HTTP Stealing Data using Meterpreter 14 Securing Data Using Encryption Software Installing TrueCrypt Creating a TrueCrypt Opening and Viewing Data within a TrueCrypt 15 Authentication, Authorization and Access Control Access Control and Identity Management Adding Users, Groups, and Symbolic Permissions Absolute Permissions 16 General Cryptography Concepts Cryptography Hiding a Picture within a Picture Using S-Tools Hiding a Media File within a Picture Using S- Tools Revealing Hidden Data Using S-Tools

Security+ Supported Labs - v2 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles - Log Analysis Using Grep Using Gawk Log Analysis in Windows Using Find 3 Network Ports - Transferring Data Using TCP/IP Using Hyper Text Transfer Protocol (HTTP) to Transfer Files Using Fire Transfer Protocol (FTP) to Transfer Files Transferring Files Securely Using SCP 4 Network Ports - Connecting to a Remote System Connecting to a Windows system Through the Command Line Connecting to a Linux System Through the Command Line Analyzing Remote Connections in Network 5 Secure Implementation of Wireless Networking Examining Plain Text WEP

WPA 6 Incident Response Procedures Compliance and Operational Security Using db_autopwn to Collecting Volatile Data Viewing Network Logs 7 Configuring the pfsense Firewall - NEW Configuring ICMP on the Firewall Redirecting to Internal Hosts on the Network Setting up a Virtual Private Network 8 Configuring Backups - NEW Compliance and Operational Security Backing Up Files to a Network Drive Backing Up Files to an FTP Server Backing Up Files using SCP 9 Types of Malware Using Netcat to Send a Using Ncat to Send a Sending a Bash Shell to a Windows Machine using NetCat 10 Types of Attacks Using Window Commands Viewing Network Resources Using PSEXEC to Connect to a Remote System Stopping, Starting, and Removing Services 11 Types of Application Attacks

for Exploitation Attacking a Remote System Utilizing Armitage Post Exploitation of the Remote System 12 Techniques - Anti Forensic The Windows Event Viewer Enabling Auditing Clearing the Event Logs 13 Techniques - Password Cracking Cracking Linux with Cain 14 Discovering Security Threats and Using Nessus for Exploration 15 Data Theft Using Metasploit to Stealing Data using FTP and HTTP Stealing Data using Meterpreter 16 Securing Data Using Encryption Software Installing TrueCrypt Creating a TrueCrypt Opening and Viewing Data within a TrueCrypt

17 Authentication, Authorization and Access Control Access Control and Identity Management Adding Users, Groups, and Symbolic Permissions Absolute Permissions 18 Access Controls - NEW Access Control and Identity Management Configuring ICMP on the Firewall Configuring Auditing for Object Access Viewing the Security Log to Determine Security Incidents 19 General Cryptography Concepts Cryptography Hiding a Picture within a Picture Using S-Tools Hiding a Media File within a Picture Using S- Tools Revealing Hidden Data Using S-Tools 20 Cryptography - NEW Cryptography Encryption with the Encrypted File System Backing up Encrypted File System Keys Encrypted File System File Recovery