(Answers) 12.2.1.5 Lab – Convert Data into a Universal Format (Instructor Version)
Objectives
Part 1: Normalize Timestamps in a Log File
Part 2: Normalize Timestamps in an Apache Log File
Part 3: Log File Preparation in Security Onion
Background /…
(Answers) 12.1.1.7 Lab – Snort and Firewall Rules (Instructor Version)
Topology
Objectives
Part 1: Preparing the Virtual Environment
Part 2: Firewall and IDS Logs
Part 3: Terminate and Clear Mininet Process
Background / Scenario
In a secure…
(Answers) 11.2.3.11 Packet Tracer – Logging from Multiple Sources
Topology
Objectives
Part 1: Use syslog to capture log files from multiple network devices
Part 2: Observe AAA user access logging
Part 3: Observe NetFlow information…
(Answers) 11.2.3.10 Packet Tracer – Explore a NetFlow Implementation
Topology
Objectives
Part 1: Observe NetFlow Flow Records - One Direction
Part 2: Observe NetFlow Records for a Session that Enters and Leaves the Collector
Background
In…
(Answers) 11.3.1.1 Lab – Setup a Multi-VM Environment (Instructor Version)
Topology
Objectives
In this lab, you will set up a virtual network environment by connecting multiple virtual machines in Virtualbox.
Background / Scenario
A virtual network…
(Answers) 9.2.2.7 Lab – Certificate Authority Stores (Instructor Version)
Objectives
Part 1: Certificates Trusted by Your Browser
Part 2: Checking for Man-In-Middle
Background / Scenario
As the web evolved, so did the need for security. HTTPS…
(Answers) 9.1.2.5 Lab – Hashing Things Out (Instructor Version)
Objectives
Part 1: Creating Hashes with OpenSSL
Part 2: Verifying Hashes
Background / Scenario
Hash functions are mathematical algorithms designed to take data as input and…
(Answers) 9.1.1.8 Lab – Examining Telnet and SSH in Wireshark (Instructor Version)
Objectives
Part 1: Examine a Telnet Session with Wireshark
Part 2: Examine an SSH Session with Wireshark
Background / Scenario
In this lab, you will configure a router to…
(Answers) 9.1.1.7 Lab – Encrypting and Decrypting Data Using a Hacker Tool (Instructor Version)
Objectives
Part 1: Create and Encrypt Files
Part 2: Recover Encrypted Zip File Passwords
Background / Scenario
What if you work for a large corporation that had a corporate…