Preferred method of contact:

Network Essentials Labs

PDF Add to WishList

Confidently design, configure, manage, troubleshoot, and analyze traffic of any wired and wireless networks. CYBRScore Network Essentials, which includes 16 hands-on labs focused on security that will prepare you to work with a variety of hardware, software and networks, making you a more well-rounded IT professional.

This Lab Bundle is designed to align to CompTIA’s Network+ certification — Course 2032, Certified Network Defender (CND) Certification Training.

You Will Learn How To:

  • Practice the objectives presented in CompTIA’s Network+ certification
  • Confidently design, configure, manage, troubleshoot, and analyze traffic of any wired and wireless networks
  • Work with a variety of hardware, software, and networks

Important Course Information

What course does this lab bundle align to?

What is a CYBRScore Lab Bundle?

  • CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience.

How long will each lab take to complete?

  • Each lab consists of multiple tasks that take anywhere from 30 minutes to 2 hours to complete.

Are there any system requirements?

  • All you need is an HTML5 compatible browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge.

How long do I have access to the labs for?

  • CYBRScore Labs are available use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.

How do I access my purchased labs?

  • Once your purchase is complete, Learning Tree will contact you with the URL and login credentials you will use to access your lab bundle.

Course Outline

  • Additional Scanning Options

Students will leverage Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • Applying Filters to TCPDump and Wireshark

This lab exercise is designed to allow the trainee to become familiar with applying a capture filter to TCPDump and Wireshark using Berkley Packet Filter (BPF) syntax.

  • Denial of Service PCAP Analysis

The student will act as attacker and defender in this scenario. They will receive experience using a popular DoS tool, the Low Orbit Ion Cannon (LOIC), and then will switch over to the defensive side. On defense they will need to detect the activity, design firewall rules to block the DoS, implement the rules and then check their effectiveness.

  • Firewall Setup and Configuration

In this lab you will perform the steps necessary to set up a pfSense firewall from the basic command line interface and then configure the firewall using the web configuration GUI on a Windows machine. This lab will provide an understanding how network interfaces are configured to allow network connectivity. You will also view and create a firewall rule which enforces your understanding of how network traffic can be managed at different levels – (IP-based, Protocol-based, Machine-based, etc).

  • Gap Analysis of Firewall Rules

Students will log into an organization's firewall, document existing firewall rules, analyze these rules and making recommendations based on this analysis. Students will then make make the necessary changes.

  • IDS Setup

Network and host based Intrusion Detection Systems (IDS) analyze traffic and provide log and alert data for detected events and activity. Security Onion provides multiple IDS options including Host IDS and Network IDS. In this lab you will setup Security Onion to function as a network based IDS and Snorby, the GUI web interface for Snort.

  • Monitoring Network Traffic

In this lab we will replicate potentially malicious scans from the Internet against a corporate asset. Scans from the Internet are very common. An analyst should know how to identify this activity by artifacts that are present in the IDS as well as entries in the web logs.

  • Network Segmentation (FW/DMZ/WAN/LAN)

In this lab we will take the concept of zones and create three zones and route traffic accordingly. We will have the trusted zones ZONE - LAN which will be the internal Local Area Network. ZONE – DMZ which will be the demilitarized zone. ZONE - WAN - which will be the Wide area network. We will set up a firewall (PFSENSE) to allow internal traffic from the LAN to the WAN. We will allow traffic WAN to DMZ and DMZ to WAN. Internal traffic WILL NOT BE ALLOWED TO ENTER THE DMZ UNLESS IT COMES through the WAN interface. This will prevent/deter hackers who if possibly compromised a DMZ asset will not be able to access the internal LAN segment. We'll also show trainees how a contractor would likely VPN into a retail network and how to appropriately restrict their access.

  • Open Source Collection

The Open Source Collection lab is designed to familiarize students with the advanced functionality of Google, default webpages used for web-servers, and the specifics of Google Hacking database. This allows the students to understand how open source information can be used for exploitation purposes.

  • Preliminary Scanning

Students will utilize Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Using the tool, students will identify other devices on the laboratory network, to include computers and network infrastructure devices, such as routers.

  • Scanning from Windows

Students will leverage Scalnline, a windows network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • Setting Up Zones in a Firewall

Students will configure a pfSense Firewall to create/isolate various network segments.

  • Specialized Linux Port Scans

Students will leverage Hping3 to assess ports of various devices on the assigned network. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • System Hardening

A number of technologies exist that work together to protect systems and networks. The real value of your networks and systems rests in the data that networks carry and reside in systems. In this lab you will focus on some ways you can safeguard the data that resides on systems and when data is sent across the network. Securing an operating system, also known as hardening, strives to reduce vulnerabilities in order to protect a system against threats and attacks.

  • TCPDump

This lab exercise is designed to allow the trainee become familiar with the basic command arguments and usage of TCPDump.

  • Using Snort and Wireshark to Analyze Traffic

In this lab we will replicate the need for Analysts to be able to analyze network traffic and detect suspicious activity. Tools like Wireshark and Snort can be utilized to read, capture, and analyze traffic.

Show complete outline
Show Less

On Demand
Tuition — $99

Practice your skills in a virtual network environment. Learn by doing wherever you are on your own time at your own pace.

  • CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience.
  • CYBRScore Labs are available use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.
  • System Requirements: All you need is an HTML5 compatible browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge
  • Once your purchase is complete, Learning Tree will contact you with the URL and login credentials you will use to access your lab bundle.

For enrolling multiple subscribers at the same time, contact us »

This event has been added to your cart.

- ,

Prev
Next
Chat Now

Please Choose a Language

Canada - English

Canada - Français