Practice Lab CS0-001: CompTIA Cybersecurity Analyst+

$169.00
$204.49 incl. vat

duration: 25 hours |

access duration: 180 days |

In Onbeperkt Leren

Through this LiveLab, focussed on CompTIA exam CS0-001, you will receive hands-on experience regarding Cyber Security. By performing tasks in a real network environment, you will improve your practical knowledge and skills on the various exam subjects.

You will perform practical exercises regarding detection tools, peform data analysis, secure and protect organisation systems and far more.

Result

After completing this practice lab you have the practical knowledge to prevent, detect and combat cyber security threats.

Prerequisites

You have successfully finished a training course for the certification exam this lab helps you to prepare for.

Target audience

Security Specialist

Practice Lab CS0-001: CompTIA Cybersecurity Analyst+

25 hours

IPv4 and IPv6 Access Lists for Traffic Filtering

  • Introduction
  • Exercise 1 - Configuring Standard and Extended Access Lists using IPv4
  • Exercise 2 - Configuring Named Access Lists Using IPv4
  • Exercise 3 - Creating Access-Lists in IPv6
  • Summary

Social Engineering Reconnaissance

  • Introduction
  • Exercise 1- Social Engineering Reconnaissance
  • Summary

Packet Sniffing

  • Introduction
  • Exercise 1 - Packet Sniffing for Passwords
  • Exercise 2 - Packet Sniffing for Image Capture and Extraction
  • Summary

Forensics - E-mail and Social Media Investigations

  • Introduction
  • Exercise 1 - Using OSForensics to Recover E-mail
  • Exercise 2 - Email Examination Example
  • Exercise 3 - Image Examination Example
  • Exercise 4 - FaceBook Forensics
  • Summary

Implement SSL VPN using ASA Device Manager

  • Introduction
  • Exercise 1 - Implement a Clientless SSL VPN using the Cisco ASA Device Manager
  • Exercise 2 - Implement AnyConnect using the Cisco ASA Device Manager
  • Summary

Implement IOS Features to Mitigate Threats

  • Introduction
  • Exercise 1 - Implementing ACLs using the CLI to Mitigate Address Spoofing
  • Exercise 2 - Implementing ACLs using the CLI to Mitigate Against ICMP Reconnaissance Attacks
  • Exercise 3 - Using TCP Intercept to Help Prevent DOS Attacks
  • Exercise 4 - Configure and Verify VACLs
  • Summary

Topology Discovery Part 1

  • Introduction
  • Exercise 1 - Basic Scanning
  • Exercise 2 - Discovering Network Topologies
  • Exercise 3 - Topology Discovery against Firewalls
  • Summary

Configure Verify and Troubleshoot Port Security

  • Introduction
  • Exercise 1 - Static and Dynamic Port Security
  • Exercise 2 - Additional Port Security Configuration Settings
  • Exercise 3 - Configuring Err-disable Recovery
  • Summary

Encryption and Hashing

  • Introduction
  • Exercise 1 - Cryptographic Basics
  • Exercise 2 - Hash Algorithms Compared
  • Exercise 3 - Comparing Hash Values
  • Summary

Implement the Cisco Adaptive Security Appliance

  • Introduction
  • Exercise 1 - Configuring Core ASA Features
  • Exercise 2 - Configuring NAT
  • Exercise 3 - Configuring a Security Policy
  • Exercise 4 - Modular Policy Framework
  • Summary

Vulnerability Scanner Nessus

  • Introduction
  • Exercise 1 - Downloading and Installing Nessus
  • Exercise 2 - Configuring Nessus
  • Exercise 3 - Scanning with Nessus
  • Exercise 4 - Reviewing a Nessus Scan
  • Exercise 5 - Saving Nessus Reports
  • Summary

Topology Discovery Part 2

  • Introduction
  • Exercise 1 - OS Fingerprinting
  • Exercise 2 - Output Logs
  • Exercise 3 - Zenmap the Nmap GUI
  • Summary

Vulnerability Scanner MBSA

  • Introduction
  • Exercise 1 - Introduction to Microsoft Baseline Security Analyser
  • Exercise 2 - Implementing Recommendations
  • Exercise 3 - Saving Microsoft Security Baseline Analyzer Reports
  • Exercise 4 - Reviewing Configuration Changes
  • Summary

Forensics – Understanding the Digital Forensics Profession and Investigations

  • Introduction
  • Exercise 1 - Acquiring an Image of Evidence Media
  • Exercise 2 - Analyzing Your Digital Evidence
  • Exercise 3 - Analysis Example
  • Exercise 4 - Report Example
  • Exercise 5 - Keyword Search Example
  • Summary

Alienvault Monitoring - Threats Vulnerabilities and Reporting

  • Introduction
  • Exercise 1 - Adding AlienVault Users
  • Exercise 2 - Vulnerability Scanning for Threats Through AlienVault
  • Exercise 3 - Viewing the Threat Results
  • Exercise 4 - File Reporting
  • Exercise 5 - Dashboard Events and SIEM Analysis
  • Summary

DVWA - Manual SQL Injection and Password Cracking

  • Introduction
  • Exercise 1 - DVWA Usage
  • Exercise 2 - Performing an SQL Injection Attack
  • Exercise 3 - Password Cracking with John
  • Summary

Configure Verify and Troubleshoot GRE Tunnel Connectivity

  • Introduction
  • Exercise 1 - Configuring a GRE Tunnel
  • Summary

DNS Harvesting

  • Introduction
  • Exercise 1 - DNS Harvesting with Application Software
  • Exercise 2 - DNS Harvesting Online
  • Exercise 3 - ICANN Website
  • Summary

Windows Command Line Tools

  • Introduction
  • Exercise 1 - IPconfig
  • Exercise 2 - Netstat
  • Exercise 3 - Ping
  • Exercise 4 - Tracert and Route
  • Exercise 5 - ARP and Whoami
  • Summary

Monitoring Servers

  • Introduction
  • Exercise 1 - Data Collector Sets
  • Exercise 2 - Configuring Alerts for Data Collector Sets
  • Exercise 3 - Configure Event Subscription
  • Summary

Introduction to Syslog

  • Introduction
  • Exercise 1 - Syslog Forwarder
  • Exercise 2 - Syslog Collector
  • Exercise 3 - Syslog Analysis
  • Summary

Alienvault Monitoring - SIEM and Netflow

  • Introduction
  • Exercise 1 - AlienVault Exploration and Configuration
  • Exercise 2 - Netflow Monitoring
  • Exercise 3 - Traffic Capture with AlienVault
  • Exercise 4 - NMAP vs AlienVault
  • Exercise 5 - AlienVault SIEM Analysis and Tickets
  • Summary

Compliance Patching

  • Introduction
  • Exercise 1 - Install and Configure WSUS
  • Exercise 2 - WSUS Server Certificates Security
  • Exercise 3 - Create Computer Groups for WSUS
  • Exercise 4 - Configure GPO Policy for WSUS
  • Summary

Securing the Management Plane on Cisco Routers

  • Introduction
  • Exercise 1 - Securing In-Band Remote Access using SSH
  • Exercise 2 - Configuring Custom Privilege Levels and Views
  • Exercise 3 - Cisco IOS and Key Network Services
  • Summary

Passive Topology Discovery

  • Introduction
  • Exercise 1 - Packet Capture with Wireshark
  • Exercise 2 - Output Logs
  • Exercise 3 - Packet Analysis Part 1
  • Exercise 4 - Packet Analysis Part 2
  • Summary

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

frequently asked quesions

What is included?

Certificate of participation No
Monitor Progress No
Mobile ready No
Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact