(Answers) 2.1.2.10 Lab – Exploring Processes, Threads, Handles, and Windows Registry (Instructor…
Objectives
In this lab, you will explore the processes, threads, and handles using Process Explorer in the SysInternals Suite. You will also use the Windows Registry to change a…
(Answers) 1.2.2.5 Lab – Becoming a Defender (Instructor Version)
Objectives
Research and analyze what it takes to become a network defender
Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets…
(Answers) 1.1.3.4 Lab – Visualizing the Black Hats (Instructor Version)
Objectives
Research and analyze cyber security incidents
Background / Scenario
In 2016, it was estimated that businesses lost $400 million dollars annually to cyber criminals.…
(Answers) 1.1.2.6 Lab – Learning the Details of Attacks (Instructor Version)
Objectives
Research and analyze IoT application vulnerabilities
Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting every…
(Answers) 1.1.1.5 Lab – Cybersecurity Case Studies (Instructor Version)
Objectives
Research and analyze cyber security incidents
Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and…
(Answers) 1.1.1.4 Lab – Installing the CyberOps Workstation Virtual Machine (Instructor Version)
Objectives
Part 1: Prepare a Personal Computer for Virtualization
Part 2: Import a Virtual Machine into VirtualBox Inventory
Background / Scenario
Computing power and…
CyberOps Associate (Version 1.0) – Modules 26 – 28: Analyzing Security Data Group Exam
CyberOps Associate (Version 1.0) - Modules 26 - 28: Analyzing Security Data Group Exam
1. When real-time reporting of security events from multiple sources is being received,…
CyberOps Associate (Version 1.0) – Modules 24 – 25: Protocols and Log Files Group Exam
CyberOps Associate (Version 1.0) - Modules 24 - 25: Protocols and Log Files Group Exam
1. What is a feature of the tcpdump tool?
It provides real-time reporting and long-term…
CyberOps Associate (Version 1.0) – Modules 21 – 23: Cryptography and Endpoint Protection…
CyberOps Associate (Version 1.0) - Modules 21 - 23: Cryptography and Endpoint Protection Group Exam
1. Which technology might increase the security challenge to the…