CW81-testing

(cw81-testing)
Lab
Get A Free Trial

Skills You’ll Get

1

Demo chapter

  • Managing Files
  • Creating Azure Databricks
  • Using Data Pipelines
  • Network Mapping and Visualization with Zenmap
  • Forecasting Retail Electronics Sales Using Amazon SageMaker Canvas
  • Managing Linux Using Command-Line Tools
  • Creating an Invitation
  • Encrypting Files with EFS
  • Launch a Virtual Machine
  • Simulating a DDoS Attack
  • Creating File Hashes
  • Using AWS AI Services
  • Using the DynamoDB Database
  • Using AWS Glue
  • Creating MLOps Pipelines
  • Creating an Automated ML Job
  • Analyzing Data Using Azure Data Explorer
  • Deploying and Configuring AI Models
  • Running Pipelines
  • Training a Model with the Azure Machine Learning Designer
  • Pentest: Flag 1
  • Building Data Pipelines for GPT
  • Creating and Managing a Local User Account
  • Customizing Font Settings
  • Developing Wind Turbine Digital Twins with Azure ML
  • Footprinting a Website
  • Anomaly Detection in Practice
  • Azure IoT Ecosystem
  • Footprinting a Website
  • Hands-on with InfluxDB, Node-RED, and OPC UA
  • Enabling and Disabling VLANs on a Switch
  • Week 2 - Pizza Ordering Chatbot: Setting Up Your Development Environment
  • Building a Vision Transformer Model
  • Adding a Server to WAC
  • The Edge
  • Analyzing Malware
  • Implementing Non-linear Transformations of Predictors
  • Using Nikto
  • Exporting the Registry Keys
  • Using the fc command
  • Capturing and Classifying Background Traffic
  • Using openfiles and net sessions
  • Identifying Practical Aspects of IoT and Cloud integration
  • Viewing Windows Event Logs
  • Defending Against IP Spoofing
  • Installing Docker Desktop for Linux
  • Performing ARP Spoofing
  • Installing Docker Desktop for Windows
  • Enabling and Disabling GuardDuty
  • Google Colab
  • AWS Sandbox
  • Creating a Virtual Disk
  • Creating Charts
  • Performing Intrusion Detection Using Zeek
  • Sandbox Visible Analyst
  • Prince_testing_guid
  • Creating an Amazon DynamoDB Table
  • Creating a Snapshot
  • Using Basic Linux Commands
  • Creating a CI/CD Pipeline
  • Setting Up Development Environment for Python Web Development
  • Creating a Function App
  • Creating an Azure ExpressRoute
  • Creating CloudTrail
  • Creating a View
  • Sandbox - 1D0-671
  • Uploading Work
  • Configuring BGP
  • Using FTK Imager
  • Restoring Files
  • Capturing Packets Using Wireshark
  • Joining a DirectAccess Server to a Domain
  • CTF: Cryptography
  • Publishing Reports and Refreshing Data
  • Project 2: 4 Way Automatic Traffic Light Controller
  • Deploying a container instance
  • Creating a Virtual Machine in Azure
  • Project 1: Temperature and Humidity
  • Publishing a Console Application
  • Security+ sandbox
  • Configuring Azure Backup
  • Enabling and Disabling Amazon Inspector
  • Configuring Network Address Translation
  • Creating a VPC
  • Creating a Filestore Instance
  • Create a directory and file
  • Exploiting SAM Database
  • Getting a Persistence Session of Metasploit
  • Enabling Payload on a Target Machine Using Metasploit
  • Enabling a Keylogger in a Target Machine
  • Using Responder for Enumeration
  • Memory Analysis and Extraction
  • Exploiting SMB
  • Exploiting SNMP
  • Using the Metasploit RDP Post-Exploitation Module
  • Performing Different Enumeration
  • Introduction to Hashing and Checksums in Linux
  • Forensic Analysis of a Windows 10 System
  • Using PowerShell to Analyze a System
  • Creating Firewall Rules in Iptables
  • Performing Intrusion Detection
  • Analyze Malicious Activity in Memory Using Volatility
  • Fuzzing Using OWASP ZAP
  • Sharing a File
  • Encrypting Files with EFS
  • Preliminary Scanning
  • Using TCPdump
  • Performing Vulnerability Scanning
  • Performing SQL Injection with Kali Linux
  • Installing the Server Core
  • Adding Routes
  • Exploiting a Website Using SQL Injection
  • Performing Active Reconnaissance
  • Creating a Service in Cloud Run
  • Prabhat Testing
  • Using Word Count
  • Using Red Hat Package Management Tools
  • Downloading the Template for a VM
  • Adding and Editing a Contact in the Mail App
  • Composing and Sending an Email in the Mail App
  • Configuring an Email Account in the Mail App
  • Creating a Microsoft Account
  • Using an Asymmetric Encryption Algorithm
  • Configuring Network Address Translation
  • Kiosk Google Cloud
  • Configuring DHCP Failover
  • Configuring SSH in a Router
  • Using nmap for Network Enumeration
  • Simulating the DDoS Attack
  • Configuring OpenLDAP Utilities
  • Simulating the DDoS Attack
  • Using Nikto
  • Simulating the DoS Attack
  • Launching a DoS attack
  • Performing a web vulnerability scan
  • Using the telnet Library
  • Using the socket Library
  • Using the nmap Library
  • Network Scan 
  • Spoofing MAC Address
  • Part III: Command Line Tools
  • Creating Reverse and Bind Shells Using Netcat
  • Simulating a DoS Attack
  • Simulating the DDoS Attack
  • Using Nikto
  • Simulating a DoS Attack
  • Simulating a DoS Attack
  • Simulating a DoS Attack
  • Exploiting LDAP-Based Authentication
  • Simulating the DDoS Attack
  • Using Nikto
  • Simulating a DDoS Attack
  • Exploiting LDAP-Based Authentication
  • Scanning the Local Network
  • Using the hping Program
  • Simulating the DDoS Attack
  • Using Nikto
  • Scanning the Local Network
  • Exploiting LDAP-Based Authentication
  • Simulating a DoS Attack
  • surya testing
  • Performing DoS Attack using nmap
  • Cryptography: Steganography
  • Requesting a PKI Certificate
  • Cracking a Linux Password using John the Ripper
  • Scan for Vulnerabilities Using Nikto
  • Escalate Privileges in Linux
  • Performing Disk Encryption
  • Closing Security Holes
  • Open Source Password Cracking
  • Using MBSA
  • Configure Switch VLANs
  • Vulnerability Scan using Nessus
  • Configuring Network Address Translation
  • Joining Workgroups or Domains
  • Using Amazon Comprehend
  • Performing Basic Network Troubleshooting
  • Running the Disk Cleanup
  • Using the show Command
  • In this lab, you will learn to create a virtual ... switch with the name ucswitchClose all windows.
  • Enforcing password policies
  • Kiosk Google Cloud
  • Partitioning a disk
  • Using Basic Linux Commands
  • Mounting a Drive to a Folder
  • Conducting IP Spoofing
  • Using Networking Tools
  • Scanning the Network
  • AWS Kiosk
  • Simulating an eavesdropping attack
  • Creating a Storage Account
  • Discussing About Supplier Risk Assessment
  • Using the matrix() Function
  • Using the main() Method
  • JAVA 10
  • Creating a Load Balancer
  • Creating a Storage Account
  • Creating a Load Balancer
  • Setting Up a Boot Device Priority
  • Kiosk
  • Decision Trees in Power BI
  • Configuring and Displaying Speed, Duplex, and Description on a Switch
  • Removing Various Configuration Settings
  • Accessing the BIOS Setup in Windows 10
  • Enabling Hardware Virtualization
  • Enabling AAA Services and Working with Method Lists
  • Analyzing the TCP/IP Configuration with netstat
  • CTF: Capture the Flag
  • CTF: Capture the Flag
  • Linux Workstation
  • Office Workstation
  • Windows Workstation
  • Finding Files
  • Creating and Applying an ACL at the CLI Using Named Access List Configuration
  • Creating Views with Schema Binding
  • Examining Asymmetric Encryption
  • Configuring an Audit Group Policy
  • Establishing a VPN Connection
  • Configuring Port Security on an Access Port
  • Conducting Active Scanning Using Nsauditor
  • Converting a FAT32 Partition to NTFS
  • Opening a Network Monitor .cap File
  • Adding the HTTP Host Field as a Column
  • Creating, Saving, and Applying a DNS Capture Filter
  • Inspecting the Vulnerability in the Echo Server's Source Code
  • Configuring Snort
  • Gathering OSINT
  • Using Metasploit
  • Passing the hash
  • Performing XSS attacks
  • Performing injection attacks
  • Detecting virtualization
  • Examining malware
  • Cracking passwords
  • Viewing event logs
  • Managing PKI certificates
  • Finding vulnerable code
  • Examining phishing attacks
  • Exploring application vulnerabilities
  • Configuring a firewall
  • Using forensics tools
  • Optional: Footprinting a website
  • Launching a DoS attack
  • Examining Kerberos settings
  • Assigning NTFS permissions
  • Cracking passwords
  • Configuring a firewall
  • Requesting a PKI certificate
  • Delegating control in Active Directory
  • Creating a domain user
  • Creating a security template
  • Using anti-phishing tools
  • Scheduling a server backup
  • Configuring RAID
  • Verifying RAM Usage
  • Configuring a Class A IP Address
  • Part II: Command Line Tools
  • Creating an Encrypted EBS Volume
  • Creating an IAM User
  • Creating an IAM Group
  • Creating an IAM Role
  • Creating an Amazon Redshift Cluster
  • Creating a VPC and Subnets
  • Creating the AWS Lambda Function and Invoking It
  • Configuring an AWS Elastic Beanstalk Application
  • Creating an S3 Bucket and Enabling Versioning On It
  • Creating a DynamoDB Table and Adding an Item to It
  • Creating a Network ACL and Adding an Inbound Rule to It
  • Launching an EC2 Instance
  • Creating a Security Group
  • Creating Azure Container Instances
  • Creating an Azure Key Vault
  • Creating a Network Security Group and Adding a Rule to It
  • Creating an Azure Internet of Things Central Application
  • Creating and Configuring VNet Peering
  • Creating Internet of Things Hub and Adding a Device
  • Creating Azure Databricks
  • Creating an Azure Load Balancer
  • Working with Ranking Functions
  • gns1 test
  • p12j test
  • rhe2 est
  • Handling Java Exception 
  • Confirming the Spoofing Attack in Wireshark
  • Configuring VLANs
  • Conducting Vulnerability Scanning Using Nessus
  • Discussing Big Data Analytics
  • Configuring the SSL Cisco AnyConnect Secure Mobility Client VPN
  • Conducting Vulnerability Scanning Using Nessus
  • Performing Reconnaissance on a Network
  • Simulating DDoS Attack
  • Using the SET Tool
  • Understanding Terms Related to AWS OpsWorks Stacks
  • Connecting to a Database
  • Saving the SQL Buffer
  • Clearing the SQL Buffer
  • SandBox (Open-Ended Labs)
  • Listing the Status of the Interfaces in a Switch
  • Configuring Basic Passwords
  • Using the netsh Command
  • Testing the Existence of Other Hosts
  • Analyzing Network Paths with pathping
  • Getting the TCP Settings
  • Configuring DNS Information
  • Understanding the ipconfig Command
  • Displaying IP Addresses and MAC Addresses
  • Analyzing Domain Names with nslookup
  • Analyzing the TCP/IP Configuration with nbtstat
  • Adding an IPv6 Address
  • Disabling APIPA
  • Configuring a Class C IP Address
  • Configuring a Class B IP Address
  • Configuring a Class A IP Address
  • Obtaining the MAC Address of a Network Adpater
  • Obtaining the TCP Information
  • Caching using ARP
  • Establishing a Telnet Connection
  • Remove all duplicate elements
  • Create a set and add values to it
  • Multiply three integers
  • Write the code to complete the multiply($a,&... the code.Sample Input: 10 20 Sample Output: 200
  • Setting default values while creating tables
  • Understanding variables
  • Java : Swapping of two numbers
  • Understanding encapsulation
  • Using the map() Method
  • Performing Bitwise Operations
  • Drag the member variable or function from the bo...ay be associated with more than one description.
  • Understanding Abstract Data Types
  • Adding a Column to a Table
  • Instructions:Write the query in the Editable sec... characters)DOB (date)State (Char, 2 characters)
  • Using Lambda Functions
  • Using List Methods
  • Using Tuple Methods
  • Using the equals() method
  • Using the toString() Method
  • Using the hashCode() Method
  • Using the equals() Method
  • Using the if Statement
  • Using the if-else Statement
  • Checking the Status of the Web Request
  • Creating a Covariance Matrix
  • Creating a Histogram
  • Changing the Text Color
  • Testing
  • Saphonification Process Simulation
  • Perfoming Lockout/Tagout (LOTO) Procedure
  • Deploying a Container Instance in Azure Using the Azure Portal
  • Creating a Compute Instance
  • Exploring Developer Tools for Workspace Interaction
  • Creating a Training Script
  • Pentest: Flag 2
  • Changing Engine Oil
  • Fire Safety and Emergency Evacuation Simulation
  • Enabling Automatic Hyphenation-testing
  • Changing the Windows 11 Theme
  • Implementing Custom Question Answering
  • Monitoring a TeamViewer Session
  • Guacamole testing windows
  • Guacamole testing linux
  • Executing Basic Windows PowerShell Commands
  • Sandbox: Node-Red
  • Creating a Disk
  • If , what is the value of ?
  • Configuring a DHCP Server
  • Creating a Web App in Azure
  • Disabling a Device Driver
  • Creating a Subnet
  • Managing Users and Groups
  • Creating an App Service Plan
  • Observing the Control Panel Options from Different Views
  • Viewing the Aggregate Data
  • Transforming Data in Power BI
  • Configuring a Proxy Server
  • Using the Armitage Tool for Intrusion Detection

Related Courses

All Courses
scroll to top