CYBERSECURITY NEWS

MMSCYBER009: Setting Up a Cyber Test Lab (1 Day)

Course Description

This course is designed for an average user to obtain the skills needed for setting up a professional working test platform.

Using both free and commercial off the shelf software (COTS) to design and implement an accepted standard test-bed for both training and experimentation with emphasis on value for effort and dollar expended. Students will learn the fundamentals of operating virtual machines and its basic techniques. In addition, students will also have hands on experience with implementing various command line operations and tasks.

After completing this course students will have ability to create a lab environment in order to successfully set up ethical test labs. This includes but is not limited to:

  • Building a Hardware and Software Test Platform
  • Passive Information Gathering
  • Analyzing Network Traffic
  • Detecting Live Systems and Analyzing Results
  • Enumerating Systems
  • Automating Encryption and Tunneling Techniques
  • Automated Attack and Penetration Tools
  • Securing Wireless Systems
  • An Introduction to Malware
  • Detecting Intrusions and Analyzing Malware
  • Forensics Detection

 

Course Outline

Module One: Virtual machines

  1. Purpose / types
  2. Real world applications
  3. Techniques and methods
  4. Advantages and disadvantages (when you should use it? When you shouldn’t use it?)

Module Two: Minimum Requirements

  1. System/ System Network requirements
  2. Software requirements
  3. Basic installation process

Module Three: Fundamentals

  1. File Extensions 101
  2. Oracle VM VirtualBox 101
    • Networking
    • Setting up multiple virtual machines
    • External device manipulation
    • Snap shots
    • Creating/Editing hard drives, partitions, and other hardware

Module Four: Tools

  1. Kali Linux
    • Basic command line operations and tasks
    • Brief overview of the “swiss army knife” tools
  2. Windows 7 (for testing purposes)
  3. Windows XP (for testing purposes)
  4. Metasploitable 2 (for testing purposes)

Module Five: Hands on Labs

  1. Wireshark
  2. More Labs