CSX Cybersecurity Hands-On Basics Labs

Provided by

Enquire about this course

About the course

CSX Cybersecurity Hands-On Basics Labs
Apply fundamental cybersecurity concepts in a live environment.

Difficulty: Beginner
CSF Domain: All domains
$300.00 Price represents the non member rate. Or pay later by invoice.
 
CSX Cybersecurity Hands-On Basics Labs
A collection of 12 hands-on instructional labs that walk learners through the basic technical concepts of cybersecurity including: digital forensics, DoS, file hashing and permissions, firewall rules, Windows permissions, SQL injection, SSH, ACL, and more.

Within the state-of-the-art Cybersecurity Nexus (CSX) training platform, these labs will help you:

  • Understand some of the basics tasks involved in cybersecurity.
  • Create foundational, hands-on cyber skills.
  • Practice in an immersive live network environment.
  • Six-month access to train and test on your schedule, 24/7.
  • Continuing Professional Education (CPE) Credit Count: 24

This course includes:
Eleven lessons with hands-on labs that focus on the basics of cybersecurity, plus one bonus “challenge” lab that tests your new skills.


Lesson and Lab  Digital Forensics
DOMAIN: Detect

In Forensics, pictures are an important factor in evidence. All files, pictures included, contain metadata, which is data about the data. In this lab we will deep dive into conducting basic forensics on specific files.


Lesson and Lab DoS
DOMAIN: Detect

Denial of Service attacks are utilized by attackers to impede service availability. In this lab students will experience the different components of a distributed denial of service attack.


Lesson and Lab File Hashing
DOMAIN: Protect

Hashing is a cryptologic function that is used to ensure file integrity. In this lab we go through the basic process of hashing files for data integrity.


Lesson and Lab: Windows and Linux File Permissions
DOMAIN: Protect

File permissions ensure that specific users or groups of users have the resources they need to do their jobs while prohibiting unnecessary access to sensitive data. In this lab we will explore both Linux and Windows filesystems permission controls.


Lesson and LabScanning Ports and Utilizing SSH
DOMAIN: Identify

Servers and workstations usually provide services to other devices on the network. What services are running on what device and how do we utilize them? In this lab we’ll go through remote network service discovery as well as using an SSH service.


Lesson and LabWindows and Linux OS Firewall
DOMAIN: Protect

Firewalls prevent or allow the use of specific services on a workstation or server. Most modern operating systems provide built in functionality for firewalls. In this lab, we will look at both Windows and Linux OS level firewall configuration.


Lesson and Lab IDS/IPS
DOMAIN: Protect

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are a foundation aspect of any digital information security architecture. In this lab we will go through a very basic setup for these appliances.


Lesson and LabPacket Analysis
DOMAIN: Detect

On a TCP/IP network every communication is in packet form. Conducting packet analysis is an important skill for any member of the IT community to have. This lab will guide you through some basic packet analysis.


Lesson and Lab SQL Injection
DOMAIN: Detect/Respond

SQL Injection is a common technique used by hackers and red teams to infiltrate database systems via the Web UI. In this lab, we will give student hands-on experience with this type of attack.


Lesson and LabUnauthorized Network Activity
DOMAIN: Respond

Cybersecurity practitioners understand the importance of Domain Name System (DNS) packets and how they enable the flow of data across the internet. Therefore, practitioners also understand that the subversion of DNS services on a network is a common attack seen in cybersecurity. In this lab, students will learn how to detect odd DNS activity and isolate samples of the traffic.


Lesson and LabWindows ACL/Windows Account Permissions
DOMAIN: Protect

Access Control Lists (ACLs) and account permissions are fundamental aspects to digital information security. In this lab, we’ll explore the built-in capabilities of the Windows OS to implement these protections.


CHALLENGE LABChallenge Lab: CSX Basics Challenge
DOMAIN: Various

In this challenge lab, you will need to use the skills learned in previous labs to complete the challenge.

Enquire

Start date Location / delivery
No fixed date Online Book now

Related article

A cyber security apprenticeship is a great way to start your career in this exciting, fast-moving sector. An apprenticeship course will teach you e...