(Answers) 1.1.6 Lab – Cybersecurity Case Studies (Answers)
1.1.6 Lab - Cybersecurity Case Studies (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives…
(Answers) 1.1.5 Lab – Installing the Virtual Machines (Answers)
1.1.5 Lab - Installing the Virtual Machines (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.…
(Answers) 1.0.6 Class Activity – Top Hacker Shows Us How It is Done (Answers)
1.0.6 Class Activity - Top Hacker Shows Us How It is Done (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy…
(Answers) 1.2.3 Lab – Learning the Details of Attacks
1.2.3 Lab - Learning the Details of Attacks (Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.…
(Answers) 13.2.2.13 Lab – Incident Handling
Objectives
Apply your knowledge of security incident handling procedures to formulate questions about given incident scenarios.
Background / Scenario
Computer security incident…
(Answers) 12.4.1.2 Lab – Isolate Compromised Host Using 5-Tuple
Topology
Objectives
In this lab, you will review logs during an exploitation of a documented vulnerability to determine the compromised hosts and file.
Part 1: Prepare the…
(Answers) 12.4.1.1 Lab – Interpret HTTP and DNS Data to Isolate Threat Actor (Instructor Version)
Topology
Objectives
In this lab, you will review logs during an exploitation of documented HTTP and DNS vulnerabilities.
Part 1: Prepare the Virtual Environment
Part 2:…
(Answers) 12.2.2.10 Lab – Extract an Executable from a PCAP (Instructor Version)
Objectives
Part 1: Prepare the Virtual Environment
Part 2: Analyze Pre-Captured Logs and Traffic Captures
Background / Scenario
Looking at logs is very important but it is…
(Answers) 12.2.2.9 Lab – Regular Expression Tutorial (Instructor Version)
Objectives
In this lab, you will learn how to use regular expressions to search for desired strings of information.
Background / Scenario
A regular expression (regex) is a pattern…