Learn the tools of trade
Our lab environment closely mirrors the real-world business environment where students get to play the role of a cyber security professional.
Overview
This intensive and practitioner-focused training is designed to help you gain the knowledge, skills, abilities, and confidence required to protect and defend organizational information systems against cyber adversaries.
Lab description
A cyber defense analyst uses data collected from a variety of cyber defense tools (e.g. web application firewall (WAF), file integrity monitor (FIM), IDS, network firewalls, vulnerability scanner, etc.) and information systems to analyze events that occur within his/her environment for the purposes of thwarting cyber adversaries.
Prerequisite
Basic knowledge of how computers and the Internet work
Who can purchase this lab?
- Cyber Enthusiasts
- IT Professionals
- Students & Graduates
- Cybersecurity Internship Seekers
This Lab includes
- Over 18 hours of lab exercises
Key Learning Objectives
At the end of the Lab exercise, learners will be able to:
- Master all learning objectives from the cyber defense associate course
Lab Scenarios
- Scenario 1 - External Attack Against A Webserver
- Scenario 2 - Unauthorized Changes
- Scenario 3 - Suspected Unauthorized Access to Web Server
- Scenario 4 - Suspected Unauthorized Access to Web Server
- Scenario 5 - DDOS SYN Flood Attack
- Scenario 6 - Webshell Attack Detection and Analysis
- Scenario 7 - Client Side Attack - Drive by Download
- Scenario 8 - Suspicious Email Received From an Unknown Party
- Scenario 9 - Detection and Analysis of Reverse Shell Traffic
- Scenario 10 - Data Breach Notification
- Scenario 11 - Malicious Command Execution
- Scenario 12 - Internal Reconnaissance Activities Observed
- Scenario 13 - Detect & Analyze Suspected Data Exfiltration
- Scenario 14 - Anomaly Detection and Investigation
- Scenario 15 - Lost or Stolen Laptop
- Scenario 17 - Investigating Usage of Hacking Tools
- Scenario 16 - Suspicious URL Access by External IP
- Scenario 18 - Detecting and Responding to a Ransomware Attack
- Scenario 19 - Malware Detection and Response
- Scenario 20 - Researching Suspicious Historical Events
20 Unique Cyber Security Challenges!
Solve real world cyber security challenges by following structured incident response steps