Comp-Sec-Fund-Labs : Computer Security Fundamentals Labs

Computer Security Fundamentals Labs
Includes:
43+ Labs
Rating :
(16)
Gain hands-on expertise in Computer Security with the Computer Security Fundamentals performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The Computer Security labs provide real world experiences and will help you in identifying the cyber threats and removing them. The labs come with step-by-step instructions on how to use some password cracking utilities and network-scanning utilities.

Here's what you will get

Lab
Performance based lab
43+
Video tutorials
41+
Minutes
46+

Here's what you will learn

Hands on Activities (Labs)

  • Creating a DoS attack scenario
  • Installing Trojan virus
  • Installing Cain & Abel
  • Using Cain & Abel
  • Encrypting and decrypting using CrypTool
  • Using AES encryption and decryption
  • Using data encryption recovery agent
  • Running and installing HashCalc
  • Installing and using MD5 calculator
  • Updating Windows Defender
  • Using anti-malware scanner
  • Configuring antivirus server application
  • Creating an inbound rule
  • Verifying Windows Firewall and examining inbound rules
  • Configuring Windows firewall settings
  • Installing an intrusion detection tool
  • Running snort tool
  • Rerunning Snort tool
  • Editing snort configuration file
  • Creating folder and rules file in snort folder
  • Requesting user certificates
  • Managing SSL settings
  • Configuring IPSec
  • Configuring connection security rules
  • Creating policy for guest account
  • Configuring password policy
  • Configuring Local Security Policy
  • Analyzing OWASP ZAP
  • Scanning the PC for unsigned device drivers
  • Scanning the URI using Vega
  • Running Windows security related commands
  • Adding counters
  • Running the MBSA tool
  • Examining Computer Management
  • Using netcat to verify network service
  • Creating account in Shodan
  • Managing cases using OSForensics
  • Configuring and scanning recent activity
  • Creating a drive image
  • Creating Index
  • Recovering deleted files
  • Managing services
  • Running the Windows commands