We recommend that you use the latest version, NDG Security+ v3, when starting a new class.


NISGTC LOGO

NISGTC Security+

NISGTC Security+ - Developed in collaboration with the DOL NISGTC, these labs focus on the principles and best practices in network security. Students gain hands-on practice in the skills needed to secure a network and prepare for industry certification.

NISGTC Security+ labs are supported in NETLAB+ using the Security+ Pod.

These labs are also available as an NDG Online hosted lab offering.

CCBY

This work by the National Information Security and Geospatial Technologies Consortium (NISGTC), and except where otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License.

Development was funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48; The National Information Security, Geospatial Technologies Consortium (NISGTC) is an entity of Collin College of Texas, Bellevue College of Washington, Bunker Hill Community College of Massachusetts, Del Mar College of Texas, Moraine Valley Community College of Illinois, Rio Salado College of Arizona, and Salt Lake Community College of Utah.

This workforce solution was funded by a grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties or assurances of any kind, express or implied, with respect to such information, including any information on linked sites, and including, but not limited to accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership.

Security+ labs are supported in NETLAB+ using the Security+ (SECPLUS) Pod.

Enabling the Labs

To enable the Security+ labs, check the box for "NISGTC Security+" in the class settings. This must be done for each class requiring access to the labs.

SECPLUS

Using the Labs

Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.

Importance of Choosing the Correct Lab Exercise

Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.

NISGTC Security+ Supported Labs

Lab Title Objective(s)
1 Network Devices and Technologies - Capturing Network Traffic
  • 1.1: Implement security configuration parameters on network devices and other technologies
  • 1.4: Given a scenario, implement common protocols and services
2 Configuring the pfSense Firewall
  • 1.1: Implement security configuration parameters on network devices and other technologies
  • 1.2: Given a scenario, use secure network administration principles
3 Protocols and Default Network Ports - Connecting to a Remote System
  • 1.1: Implement security configuration parameters on network devices and other technologies
  • 1.4: Given a scenario, implement common protocols and services
4 Secure Implementation of Wireless Networking
  • 1.5: Given a scenario, troubleshoot security issues related to wireless networking
  • 2.8: Explain types of wireless attacks
5 Incident Response Procedures<
  • 2.3: Given a scenario, implement appropriate risk mitigation strategies
  • 2.4: Given a scenario, implement basic forensic procedures
6 Secure Network Administration Principles Log Analysis
  • 1.2: Given a scenario, use secure network administration principles
  • 3.2: Summarize various types of attacks
  • 3.6: Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
7 Analyze and Differentiate Types of Attacks and Mitigation Techniques
  • 3.2: Summarize various types of attacks
8 Mitigation and Deterrent Techniques – Password Cracking
  • 3.2: Summarize various types of attacks
  • 3.6: Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
9 Identifying & Analyzing Network/Host Intrusion Detection System (NIDS/HIDS) Alerts
  • 1.1: Implement security configuration parameters on network devices and other technologies
  • 2.1: Explain the importance of risk related concepts
  • 2.5: Summarize common incident response procedures
  • 3.6: Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
  • 3.7: Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
10 Analyze and Differentiate Types of Malware & Application Attacks
  • 3.1: Explain types of malware
  • 3.2: Summarize various types of attacks
  • 3.5: Explain types of application attacks
  • 3.7: Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
11 Discovering Security Threats and Vulnerabilities
  • 3.6: Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
  • 3.7: Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
  • 3.8: Explain the proper use of penetration testing versus vulnerability scanning
12 Importance of Data Security – Securing Data Using Encryption Software
  • 2.9: Given a scenario, select the appropriate control to meet the goals of security
  • 4.4: Implement the appropriate controls to ensure data security
13 Analyzing Types of Web Application Attacks
  • 3.5: Explain types of application attacks
  • 4.1: Explain the importance of application security controls and techniques
14 Authentication, Authorization and Access Control
  • 5.2: Given a scenario, select the appropriate authentication, authorization or access control
  • 5.3: Install and configure security controls when performing account management, based on best practices
15 Implementing Common Protocols and Services for Basic Security Practices
  • 1.1: Implement security configuration parameters on network devices and other technologies
  • 1.4: Given a scenario, implement common protocols and services
  • 6.1: Given a scenario, utilize general cryptography concepts
  • 6.2: Given a scenario, use appropriate cryptographic methods
  • 6.3: Given a scenario, use appropriate PKI, certificate management and associated components
16 General Cryptography Concepts
  • 2.9: Given a scenario, select the appropriate control to meet the goals of security
  • 6.1: Given a scenario, utilize general cryptography concepts
  • 6.2: Given a scenario, use appropriate cryptographic methods
  • 6.3: Given a scenario, use appropriate PKI, certificate management and associated components