Security Essentials Labs

Level: Foundation

Learn the security techniques used by the Internet’s most skilled professionals. This Security Essentials lab bundle, which includes 19 distinct, hands-on labs, will prepare you with the essential principles of network security and risk management.

This lab bundle is designed to align to the learning objectives found in CompTIA’s Security+ certification — Course 446, CompTIA Security+ Certification Training.

Key Features of this Training:

  • 6-month access to CYBRScore Security Essentials Labs
  • Content aligned to CompTIA’s Security+ certification

You Will Learn How To:

  • Practice the objectives presented in the CompTIA’s Security+ certification
  • Analyze, update, and perform a gap analysis on a sample BCP/BIA/DRP
  • Perform a backup in a server environment
  • Facilitate open source collection by using intimate network discovery techniques

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


On Demand

6-Month Access to:

  • Pre-configured labs with lab guides
  • Gain hands-on skills in topic areas aligned to CompTIA’s Security+ certification
View Course Details

Standard $99

Government $99



Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

On Demand

Important Course Information

  • CYBRScore Labs Description

    Practice your skills in a virtual network environment. Learn by doing wherever you are on your own time at your own pace. CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience. CYBRScore Labs are available for use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.

Security Essentials Lab Content

  • BCP DRP and Test Planning

    Students will become familiar with the Business Continuity Plan (BCP), Business Impact Assessment (BIA) and Disaster Recovery Plan (DRP). During the course of the lab, students will perform a gap analysis on the provided BCP, BIAs and DRP, and make the necessary fixes to those documents. After revising the previous documents the students will create a test for the covered assets, procedures and personnel.

  • BitLocker Setup

    This lab shows the student how to setup BitLocker on a Windows 8.1 Professional system.

  • Block Incoming Traffic on Known Port

    In this lab, the student will respond to an incident by blocking incoming traffic on a known port from a specific IP.

  • Comparing Controls

    Students will evaluate policies in place on a domain and apply those policies in accordance to organizational standards.

  • Creating a List of Installed Programs, Services and User Accounts from a WIN2K12 Server

    Students will create a list of installed programs, services, and accounts in a Windows 2012 server environment using various tools and methods.

  • Creation of BCP and DRP

    Students will be required to create two documents: a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP). Both documents deal with worst case scenarios concerning how to keep business going despite the occurrence of a natural disaster, catastrophic accident or serious man-made incident.

  • Data Backup to Prep for Recovery

    In this lab we will simulate the recovery phase where we must perform a backup in a server environment.

  • Event Log Collection

    In this lab you will use Splunk Enterprise to ingest logs from a local host for analysis

  • Host Data Integrity Baselining

    This lab takes the trainee into basic concepts regarding establishing baselines of files and directories with Kali Linux and Windows 7. In the first part of the lab, the trainee will establish a baseline of the passwd file within Kali Linux, and in the second part the trainee will establish a baseline of the C:\> drive within Windows 7.

  • Installing Patches and Testing Software

    Students will identify if a vulnerability is present in the systems and remediate the vulnerability if necessary.

  • Network Discovery

    The Network Discovery lab is designed to help students facilitate open source collection by teaching them how to use more intimate network discovery techniques.

  • Network Segmentation (FW/DMZ/WAN/LAN)

    In this lab we will take the concept of zones and create three zones and route traffic accordingly. We will have the trusted zones ZONE - LAN which will be the internal Local Area Network. ZONE - DMZwhich will be the demilitarized zone. ZONE - WAN - which will be the Wide area network. We will set up a firewall (PFSENSE) to allow internal traffic from the LAN to the WAN. We will allow traffic WAN to DMZ and DMZ to WAN. Internal traffic WILL NOT BE ALLOWED TO ENTER THE DMZ UNLESS IT COMES through the WAN interface. This will prevent/deter hackers who if possibly compromised a DMZ asset will not be able to access the internal LAN segment. We'll also show trainees how a contractor would likely VPN into a retail network and how to appropriately restrict their access.

  • Network Topology Generation

    Students will utilize Zenmap to generate a visual network topology.

  • Open Source Collection

    The Open Source Collection lab is designed to familiarize students with the advanced functionality of Google, default webpages used for web-servers, and the specifics of Google Hacking database. This allows the students to understand how open source information can be used for exploitation purposes.

  • Open Source Password Cracking

    Students will use John the Ripper and Cain and Abel to crack password protected files

  • Performing Incident Response in a Windows Environment

    This next lab walks students through identifying a security incident, as well as handling and then responding to the incident.

  • Scanning from Windows

    Students will leverage Scalnline, a windows network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • Windows Event Log Manipulation via Windows Event Viewer

    In this lab you will use Windows Event Viewer to view and filter the security event log on a Windows 7 client computer specifically for account logons.

  • Wireshark

    This lab exercise is designed to allow the trainee become familiar with the use of Wireshark.


  • What does it mean that this offering aligns to a course?

  • What is a CYBRScore Lab Bundle?

    • CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience.
  • How long will each lab take to complete?

    • Each lab consists of multiple tasks that take anywhere from 30 minutes to 2 hours to complete.
  • Are there any system requirements?

    • All you need is an HTML5 compatible browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge.
  • How long do I have access to the labs for?

    • CYBRScore Labs are available for use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.
  • How do I access my purchased labs?

    • Once your purchase is complete, Learning Tree will contact you with the URL and login credentials you will use to access your lab bundle.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français