Lab Details
The CyberOps Associate labs help prepare learners to earn the Cisco Certified Cyberops Associate Certification. Learners will gain hands-on practice in how to monitor, detect, and respond to cybersecurity threats. Topics include security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies procedures.
Features
Module List
Module 3: The Windows Operating System |
3.0.3 Lab - Identify Running Processes
|
3.2.11 Lab - Exploring Processes, Threads, Handles, and Windows Registry
|
3.3.10 Lab - Create User Accounts
|
3.3.11 Lab - Using Windows PowerShell
|
3.3.12 Lab - Windows Task Manager
|
3.3.13 Lab - Monitor and Manage System Resources in Windows
|
Module 4: Linux Overview |
4.2.6 Lab - Working with Text Files in the CLI
|
4.2.7 Lab - Getting Familiar with the Linux Shell
|
4.3.4 Lab - Linux Servers
|
4.4.4 Lab - Locating Log Files
|
4.5.4 Lab - Navigating the Linux Filesystem and Permission Settings
|
Module 5: Network Protocols |
5.1.5 Lab - Tracing a Route
|
5.3.7 Lab - Introduction to Wireshark
|
Module 8: Address Resolution Protocol |
8.2.8 Lab - Using Wireshark to Examine Ethernet Frames
|
Module 9: The Transport Layer |
9.2.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake
|
9.3.8 Lab - Exploring Nmap
|
Module 10: Network Services |
10.2.7 Lab - Using Wireshark to Examine a UDP DNS Capture
|
10.4.3 Lab - Using Wireshark to Examine TCP and UDP Captures
|
10.6.7 Lab - Using Wireshark to Examine HTTP and HTTPS Traffic
|
Module 17: Attacking What We Do |
17.1.7 Lab - Exploring DNS Traffic
|
17.2.6 Lab - Attacking a mySQL Database
|
17.2.7 Lab - Reading Server Logs
|
Module 21: Cryptography |
21.0.3 Lab - Creating Codes
|
21.1.6 Lab - Hashing Things Out
|
21.2.10 Lab - Encrypting and Decrypting Data Using OpenSSL
|
21.2.11 Lab - Encrypting and Decrypting Data Using a Hacker Tool
|
21.2.12 Lab - Examining Telnet and SSH in Wireshark
|
21.4.7 Lab - Certificate Authority Stores
|
Module 26: Evaluating Alerts |
26.1.7 Lab - Snort and Firewall Rules
|
Module 27: Working with Network Security Data |
27.1.5 Lab - Convert Data into a Universal Format
|
27.2.9 Lab - Regular Expression Tutorial
|
27.2.10 Lab - Extract an Executable from a PCAP
|
27.2.12 Lab - Interpret HTTP and DNS Data to Isolate Threat Actor
|
27.2.14 Lab - Isolate Compromised Host Using 5-Tuple
|
27.2.15 Lab - Investigating a Malware Exploit
|
27.2.16 Lab - Investigating an Attack on a Windows Host
|
Cyber Range |
No Lab: Launch Cyber Range
|
Support Information
NDG Online provides technical support specifically related to the functionality of the lab environment only. Any questions or concerns regarding the learning material or lab content must be directed to your instructor. Self-paced learners who find they require additional support are encouraged to seek out a course at a local academic institution.
Support Center