Cybersecurity Bootcamp

(ITP-CYBSEC.AA1)
Lab
Get A Free Trial

Skills You’ll Get

1

Access Control Models

  • Viewing the Windows File Registry
2

Fundamentals of Cryptography and PKI

  • Applying Symmetric Key Encryption
  • Configuring a Switch to Learn its IP Address with DHCP
3

Introduction to Virtual Private Networks (VPNs)

  • Generating a Symmetric Key
  • Using dig for Passive Reconnaissance
  • Using Social Engineering Techniques to Plan an Attack
  • Attacking a Website Using XSS Injection
  • Configuring Clientless SSL VPNs on ASDM
4

Endpoint Security Technologies

  • Using Uncomplicated Firewall (UFW)
5

Types of Attacks and Vulnerabilities

  • Configuring a BPDU Guard and Implementing Port Security
6

Threat Analysis

  • Using the theHarvester Tool
7

Introduction to Security Management

  • Configuring Inbound Rules for a Firewall
  • Installing and Using Nfdump
  • Performing Active Reconnaissance
8

Windows, Linux, and MAC OS X Based Analysis

  • Viewing and Changing File Permissions
  • Viewing Processes in Linux (Background+ Foreground)
  • Enabling and Disabling VLANs on a Switch
9

Network and Host Telemetry

  • Performing Reconnaissance on a Network
10

Introduction to NetFlow and IPFIX

  • Implementing IPsec VPNs through CLI
  • Configuring NetFlow and NetFlow Data Export
11

NetFlow Commercial and Open Source Monitoring and Analysis Software Packages

  • Using OpenSSL to Create a Public/Private Key Pair
  • Generating an Asymmetric Key
  • Installing Logstash and Kibana
12

Introduction to Incident Response

  • Using Burpsuite
13

Network and Host Profiling

  • Using Kismet
14

Data and Event Analysis

  • Footprinting a Website
  • Exploiting a Website Using SQL Injection
15

The Incident Handling Process

  • Grabbing a Screenshot of a Target Machine Using Metasploit
16

Overview of Ethical Hacking and Penetration Testing

  • Observing an SHA-Generated Hash Value
  • Configuring DHCP Snooping
17

Passive Reconnaissance

  • Enabling a Keylogger in a Target Machine
  • Managing NTFS Permissions
18

Active Reconnaissance

  • Simulating a DoS Attack
19

Hacking Web Applications

  • Configuring Site-to-Site IPsec VPN Topology
  • Getting the TCP Settings and Information about the TCP Port
20

Hacking Networking Devices

  • Using the traceroute Command
21

Hacking User Credentials

  • Configuring VLANs
  • Simulating an Eavesdropping Attack Using Wireshark
  • Finding the Physical Address of a LAN Adapter
  • Using Python for Penetration Testing
  • Detecting Rootkits
22

Social Engineering

  • Creating a Demilitarized Zone
  • Using Nikto
23

Writing Penetration Testing Reports

  • Using Netcraft
  • Capturing and Exporting Data from Network Traffic Captured Using Wireshark
  • Performing ARP Spoofing
  • Using OWASP ZAP
  • Making Syslog Entries Readable
24

Wireless Client Attacks

  • Obtaining Information about UDP Settings, Configurations, and Ports
  • Creating a Personal Linux Firewall Using Iptables
25

Aircrack-ng

  • Configuring an SSL Cisco AnyConnect Secure Mobility Client VPN
  • Installing Antivirus Software
26

Cracking WEP

  • Cracking a Linux Password Using John the Ripper
  • Using Nmap for Network Enumeration
27

Hacking WPA

  • Configuring Static Routing
28

Performing Wireless Reconnaissance

  • Getting Information about DNS
  • Using nslookup for Passive Reconnaissance
29

Evil Twins and Rogue Access Points

  • Using the show ip route Command
30

Mobile Device Security

  • Testing Connectivity Using the Ping Command
31

Hacking Android Devices

  • Performing an Intense Scan in Zenmap
32

Attacking NFC

  • Using ProDiscover Basic

Related Courses

All Courses
scroll to top