Modules
1 -
Security Concept Fundamentals
#
Lesson
Type
1.
Exercise 1 - Configure RAID 1

2.
Exercise 2 - Configure and Test File Integrity Monitoring

2 -
Cryptographic Solutions
#
Lesson
Type
1.
Exercise 1 - Create and Verify a Digital Signature

2.
Exercise 2 - Create and Approve a Certificate Signing Request

3 -
Threat Vectors and Attack Surfaces
#
Lesson
Type
1.
Exercise 1 - Open Service Ports

2.
Exercise 2 - Default Credentials

3.
Exercise 3 - Vulnerable Applications

4 -
Identifying Security Vulnerabilities
#
Lesson
Type
1.
Exercise 1 - Identify LM Hash Vulnerabilities

2.
Exercise 2 - Identify DNS Transfer Vulnerabilities

5 -
Analyze Malicious Activity
#
Lesson
Type
1.
Exercise 1 - Observe Indications of a Brute Force Attack

2.
Exercise 2 - Conduct Command Injection and Observe Indications

3.
Exercise 3 - Observe Indications of a SYN Flood Attack

6 -
Mitigation Techniques
#
Lesson
Type
1.
Exercise 1 - Configure Router Access

2.
Exercise 2 - Harden Router Access

3.
Exercise 3 - Configure Router Logging

7 -
Security Architecture Models
#
Lesson
Type
1.
Exercise 1 - Create a VM

2.
Exercise 2 - Use Containers

3.
Exercise 3 - Complete VM Deployment

8 -
Securing Enterprise Infrastructures
#
Lesson
Type
1.
Exercise 1 - Install and Configure a VPN Server

2.
Exercise 2 - Create a VPN User and Client

3.
Exercise 3 - Configure a L2TP/IPsec VPN

9 -
Data Protection Strategies
#
Lesson
Type
1.
Exercise 1 - Encryption

2.
Exercise 2 - Hashing

3.
Exercise 3 - Obfuscation

10 -
Resilience in Security Architecture
#
Lesson
Type
1.
Exercise 1 - Prepare WIN11 and Install EaseUS Todo Backup

2.
Exercise 2 - Conduct and Restore from Incremental Backups

3.
Exercise 3 - Conduct Differential Backups and Examine all Backup Files

4.
Exercise 4 - Investigate the Archive Bit

11 -
Securing Computing Resources
#
Lesson
Type
1.
Exercise 1 - Establish a Baseline

2.
Exercise 2 - Input Validation

3.
Exercise 3 - Sandboxing

12 -
Asset Management Techniques
#
Lesson
Type
1.
Exercise 1 - Deploy an Asset and License

2.
Exercise 2 - Secure Data Sanitization

13 -
Vulnerability Management
#
Lesson
Type
1.
Exercise 1 - Detect Web Application Vulnerabilities

2.
Exercise 2 - Monitor Devices for Vulnerabilities

14 -
Monitoring Computing Resources
#
Lesson
Type
1.
Exercise 1 - Monitoring Device Resource Utilization

15 -
Enhancing Enterprise Security
#
Lesson
Type
1.
Exercise 1 - Linux Server Hardening Techniques

2.
Exercise 2 - Windows Server Hardening Techniques

16 -
Implement Identity & Access Management
#
Lesson
Type
1.
Exercise 1 - Provisioning User Accounts on a Microsoft Server

2.
Exercise 2 - Provisioning User Accounts on a Linux Server

17 -
Implementation of Automation & Orchestration for Security Operations
#
Lesson
Type
1.
Exercise 1 - Creating Automation Scripts

18 -
Investigative Data Sources
#
Lesson
Type
1.
Exercise 1 - Log File Analysis
